Science.gov

Sample records for national security program

  1. Nevada National Security Site Radiation Protection Program

    SciTech Connect

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  2. Nevada National Security Site Groundwater Program

    ScienceCinema

    None

    2016-07-12

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  3. Nevada National Security Site Groundwater Program

    SciTech Connect

    2010-03-25

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  4. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-12

    ... rule FR Doc. E9-28517, beginning on page 62531 in the issue of November 30, 2009, make the following... RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY: Information Security Oversight Office, NARA....

  5. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy... Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on March 24, 2010 from 10 a.m. to 12 p.m....

  6. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held...

  7. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held...

  8. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting. To discuss National Industrial Security Program policy matters. DATES: The meeting will be...

  9. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  10. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  11. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  12. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  13. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  14. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... ] Industrial Security Program policy matters. Dated: February 23, 2012. Mary Ann Hadyka, Committee Management... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program...

  15. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... committee meeting, to discuss National Industrial Security Program policy matters. DATES: The meeting will... Management Officer. BILLING CODE 7515-01-P...

  16. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-11

    ... From the Federal Register Online via the Government Publishing Office ] NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY... made for the following committee meeting. To discuss National Industrial Security Program...

  17. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-09

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on July...

  18. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    ERIC Educational Resources Information Center

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  19. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-08

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on March 20, 2013 from 10:00...

  20. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... From the Federal Register Online via the Government Publishing Office ] NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2012 from 10:00...

  1. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2013 from 10:00 a... NISPPAC@nara.gov . Dated: October 21, 2013. Patrice Little Murray, Acting Committee Management...

  2. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on July 17, 2013 from 10:00 a.m... NISPPAC@nara.gov . Dated: June 19, 2013. Patrice Little Murray, Acting Committee Management...

  3. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    ERIC Educational Resources Information Center

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  4. From Charity to Security: The Emergence of the National School Lunch Program

    ERIC Educational Resources Information Center

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  5. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  6. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    SciTech Connect

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  7. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    SciTech Connect

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  8. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  9. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  10. 78 FR 45255 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... Programs Directorate, Department of Homeland Security, 245 Murray Lane, Mail Stop 3016B, Arlington,...

  11. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    .... January 13, 2011. Written comments may be sent to the Deputy Manager, National Communications System...-mail message. Fax: (703) 235-4981. Mail: Deputy Manager, National Communications System, National... Executive Officer (CEO), Level 3 Communications, will call the meeting to order and provide opening...

  12. Transition-ready technologies and expertise from the Chemical and Biological National Security Program at LLNL

    SciTech Connect

    Folta, P A; McBride, M T

    2006-02-22

    HSARPA has initiated a new Bioinformatics and Assay Development solicitation, BIAD2 (BAA 06-01), to address a number of technology gaps and requirements for biodetection (www.hsarpabaa.com). This solicitation will leverage the vast research and development capabilities of the private sector and academia in order to meet the needs of HSARPA and Homeland Security. In order to meet these requirements, this solicitation will: (1) Develop and validate actionable assays for the public and private sector; (2) Develop and validate new assays and novel assay methodologies to enhance existing detection systems and enable future detection platforms; (3) Develop next generation assays which are robust against novel, emerging and engineered threats; (4) Develop novel assays that detect low levels of ribonucleic acid (RNA)-based viral threats in complex backgrounds; (5) Develop novel assays to characterize the viability, degree of virulence or toxicity, and countermeasure resistance of a biological agent; and (6) Develop new bioinformatics tools to support assay development and assay validation The Lawrence Livermore National Laboratory (LLNL) Bioassays and Signature Program (BSP) develops nationally-validated detection and identification assays to cover the full range of biological threat agents, starting from human, animal, and plant pathogens on the Select Agent list. The assays that have been co-developed by the CDC and the BSP are used internationally and represent the gold standard for molecular detection of select agent pathogens for the public health community. They are also used in the DHS environmental monitoring operations such as BioWatch and DHS National Security Special Events support. These reagents have been used to process and analyze more than 5 million samples and have delivered exceptional performance for the end users, with zero false positives since their deployment. Currently, highly-multiplexed nucleic acid assays that represent the ''next-generation'' in

  13. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    SciTech Connect

    1995-11-30

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met.

  14. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  15. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  16. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Security program. 601.3 Section 601.3 Public... DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of Administrative Services, is responsible for conducting a security program that ensures effective...

  17. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Security program. 601.3 Section 601.3 Public... DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of Administrative Services, is responsible for conducting a security program that ensures effective...

  18. National Nuclear Security Administration Service Center Environmental Programs Long-Term Environmental Stewardship Baseline Handbook

    SciTech Connect

    Griswold, D. D.; Rohde, K.

    2003-02-26

    As environmental restoration (ER) projects move toward completion, the planning, integration, and documentation of long-term environmental stewardship (LTES) activities is increasingly important for ensuring smooth transition to LTES. The Long-Term Environmental Stewardship Baseline Handbook (Handbook) prepared by the National Nuclear Security Administration (NNSA) Service Center Environmental Programs Department (EPD) outlines approaches for integrating site-specific LTES planning and implementation into site ER baseline documentation. Since LTES will vary greatly from site to site, the Handbook also provides for flexibility in addressing LTES in ER Project life-cycle baselines, while clearly identifying Environmental Management (EM) requirements. It provides suggestions for enacting LTES principles and objectives through operational activities described in site-specific LTES plans and life cycle ER Project baseline scope, cost, and schedule documentation and tools for more thorough planning, better quantification, broader understanding of risk and risk management factors, and more comprehensive documentation. LTES planning applied to baselines in a phased approach will facilitate seamlessly integrating LTES into site operational activities, thereby minimizing the use of resources.

  19. Energy and national security.

    SciTech Connect

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  20. Y-12 National Security Complex Biological Monitoring And Abatement Program 2008 Calendar Year Report

    SciTech Connect

    Peterson, M. J.; Greeley Jr., M. S.; Mathews, T. J.; Morris, G. W.; Roy, W. K.; Ryon, M. G.; Smith, J. G.; Southworth, G. R.

    2009-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located off

  1. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  2. Y-12 National Security Complex Biological Monitoring and Abatement Program 2007 Calendar Yeare Report

    SciTech Connect

    Peterson, M.J.; Greeley, M. S. Jr.; Morris, G. W.; Roy, W. K.; Ryan, M. G.; Smith, J. G.; Southworth, G. R.

    2008-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located off

  3. Graduate Research Assistant Program for Professional Development at Oak Ridge National Laboratory (ORNL) Global Nuclear Security Technology Division (GNSTD)

    SciTech Connect

    Eipeldauer, Mary D; Shelander Jr, Bruce R

    2012-01-01

    The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) was established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.

  4. Nevada National Security Site 2014 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect

    Hudson, David

    2015-02-19

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2014 results. Analysis results for leachate contaminants collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included. During 2014, groundwater samples were collected and static water levels were measured at three wells surrounding the Area 5 RWMS. Groundwater samples were collected at wells UE5PW-1, UE5PW-2, and UE5PW-3 on March 11 and August 12, 2014, and static water levels were measured at each of these wells on March 10, June 2, August 11, and October 14, 2014. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. General water chemistry (cations and anions) was also measured. Results from samples collected in 2014 are within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. The data from the shallow aquifer indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS, and there were no significant changes in measured groundwater parameters compared to previous years. Leachate from above the primary liner of Cell 18 drains into a sump and is collected in a tank at the ground surface. Cell 18 began receiving waste in January 2011. Samples were collected from the tank when the leachate volume approached the 3,000-gallon tank capacity. Leachate samples have been collected 16 times since January 2011. During 2014, samples were collected on February 25, March 5, May 20, August 12, September 16, November 11, and December 16. Each leachate sample was

  5. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect

    Steele, B.J.; Papier, I.I.

    1996-06-20

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  6. Nevada National Security Site 2013 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect

    Hudson, David B

    2014-02-13

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2013 results. Beginning with this report, analysis results for leachate collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included.

  7. National Security Technology Incubator Operations Plan

    SciTech Connect

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  8. Congress and national security

    NASA Astrophysics Data System (ADS)

    Sharfman, Peter

    1983-10-01

    The starting point for any serious discussion of Congress role in matters of national security is the recognition that Congress does some kinds of things very effectively, but generally fails when it tries to do other kinds of things. Consequently, a citizen with a desire to shape national policy may find Congress to be the focal point of national decision, or largely irrelevant, depending almost, entirely on the nature of the issue. As a political scientist, I am tempted to relate this to the provisions of the U.S. Constitution and to the differing structures of the Executive and Legislative institutions; since I am addressing an audience of physicists, I will confine my explanation of causes to the observation that you cannot easily push on a string.

  9. Nuclear Physics for National Security

    NASA Astrophysics Data System (ADS)

    Mayo, Douglass

    2006-10-01

    Being a nuclear physicist and working at a national laboratory provides many opportunities to ply one's skills in support of national security and the benefit of all mankind. Over the last 40 years, Los Alamos National Laboratory has been pioneering the field of Domestic and International Safeguards through the research and development of instrumentation and systems used to monitor nuclear materials and nuclear facilities. With a projected increase in the use of nuclear energy, effective systems must be designed to reduce the possibility that nuclear materials may be diverted for used in weapons. The recent focus has been the many applications of radiation detection used for safeguarding nuclear material and to support Homeland Security. There is a critical need for trained nuclear scientists who can understand and overcome measurement complexities, combinations of multiple sensor inputs, data reduction, and automated analysis for these applications. This talk will focus on the opportunities and experiences afforded physicists in the support of national security, beyond the weapons program and travel to interesting locales.

  10. 76 FR 62311 - Ammonium Nitrate Security Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ... FR 64280 (advance notice of proposed rulemaking); 76 FR 46908 (notice of proposed rulemaking...; ] DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 31 RIN 1601-AA52 Ammonium Nitrate Security.... SUMMARY: The National Protection and Programs Directorate of the Department of Homeland Security...

  11. Y-12 Groundwater Protection Program CY 2009 Triennial Report Of The Monitoring Well Inspection And Maintenance Program, Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    2013-06-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspection events conducted on active and inactive wells at Y-12 during calendar years (CY) 2007 through 2009; it documents well maintenance and plugging and abandonment activities completed since the last triennial inspection event (CY 2006); and provides summary tables of well inspection events, well maintenance events, and well plugging and abandonment events during the reference time period.

  12. 76 FR 34761 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... Classified National Security Information AGENCY: Marine Mammal Commission. ACTION: Notice. SUMMARY: This... information, as directed by Information Security Oversight Office regulations. FOR FURTHER INFORMATION CONTACT..., ``Classified National Security Information,'' and 32 CFR part 2001, ``Classified National Security...

  13. 12 CFR 748.0 - Security program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... crimes, and (5) Prevent destruction of vital records, as defined in 12 CFR part 749. (c) Each Federal... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM,...

  14. 12 CFR 748.0 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... crimes, and (5) Prevent destruction of vital records, as defined in 12 CFR part 749. (c) Each Federal... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM,...

  15. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Information Security Program Review. 2400.45... SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45 Information Security Program Review. (a) The Director, OSTP, shall require an annual formal review of the...

  16. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45... SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45 Information Security Program Review. (a) The Director, OSTP, shall require an annual formal review of the...

  17. National Security Technology Incubator Action Plan

    SciTech Connect

    2008-02-28

    This report documents the action plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). This action plan serves as a tool in measuring progress in the development process and delivery of services for the NSTI program. Continuous review and evaluation of the action plan is necessary in the development process of the NSTI. The action plan includes detailed steps in developing the NSTI program based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Included are tasks required to implement the NSTI, developed within a work breakdown structure. In addition, a timeline is identified for each task.

  18. The medical care programs of the Farm Security Administration, 1932 through 1947: a rehearsal for national health insurance?

    PubMed Central

    Grey, M R

    1994-01-01

    At a time of renewed interest in universal health insurance, an examination of earlier periods when society grappled with the link between socioeconomic status and health is fruitful. Between 1935 and 1947, the federal government sponsored a comprehensive medical care program for low-income farmers, sharecroppers, and migrant workers under the auspices of the Farm Security Administration (FSA). Despite the strong opposition of the American Medical Association, humanitarian and economic concerns at the local level often promoted physicians' participation in the program's group prepayment plans. Many FSA leaders clearly saw the program as a model upon which national health insurance might advance. However, in the wake of World War II, the FSA program declined as physicians' income improved, the rural population declined, and traditional ideological objections to federal intervention in medical care resurfaced. The FSA experience illuminates the complex ideological, economic, and humanitarian motivations of American physicians in the face of health care reform. Images p1680-a p1682-a p1684-a PMID:7943497

  19. Results of Calendar Year 2001 Monitoring Well Inspection and Maintenance Program, Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    Schultz, E.R.

    2003-03-31

    This document is a compendium of results of the calendar year (CY) 2001 Monitoring Well Inspection and Maintenance Program at the US Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report documents the Cy 2001 well inspection events and their subsequent well maintenance requests. Well inspections are performed in order to assess the condition of the monitoring well and any subsequent maintenance needs. Inspections help to ensure that the collection of groundwater samples, and/or hydrologic measurements, are representative of the subsurface and not an artifact of changing downhole conditions. Inspections and maintenance contribute to the effective longevity of each well. Currently, the Y-12 Groundwater Protection Program (GWPP) inspects wells on an annual or triennial basis depending on the status of the well as follows: (1) the well is under the GWPP annual water quality sampling program (active wells); (2) wells where hydrological monitoring (e.g., semi-annual water level measurements, long term water level monitoring, slug test, pumping test, dye tracer test, etc.) is in progress (active or inactive wells); or (3) wells that are not in service (inactive wells), but are not currently scheduled for plugging and abandonment.

  20. Y-12 Groundwater Protection Program CY2012 Triennial Report Of The Monitoring Well Inspection And Maintenance Program Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    2013-09-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspections completed by the GWPP on active and inactive wells at Y-12 during calendar years (CY) 2010 through 2012. In addition, this report also documents well inspections performed under the Y-12 Water Resources Restoration Program, which is administered by URS|CH2M Oak Ridge (UCOR). This report documents well maintenance activities completed since the last triennial inspection event (CY 2009); and provides summary tables of well inspections and well maintenance activities during the reference time period.

  1. 75 FR 71171 - Social Security Disability Program Demonstration Project: Benefit Offset National Demonstration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-22

    ... disability or blindness under title XVI of the Act. However, we are only modifying title II program rules for... disability or blindness does not affect the recipient's disability or blindness status under the SSI program... based on disability and title XVI payments based on disability or blindness. We estimate that the...

  2. National Security Technology Incubator Evaluation Process

    SciTech Connect

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  3. National Security Technology Incubator Business Plan

    SciTech Connect

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  4. National Security Technology Incubation Strategic Plan

    SciTech Connect

    2007-01-01

    This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achieving sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to

  5. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act, any... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions....

  6. 75 FR 69693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... FR 55335). DHS is issuing a Notice of Proposed Rulemaking concurrent with this system of records... Operations Center, to collect, plan, coordinate, report, analyze, and fuse infrastructure information related... National Operations Center (NOC)) to collect, plan, coordinate, report, analyze, and fuse...

  7. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ... States Visitor Indicator Technology (US-VISIT) program's biometric identity management functions to the...'s biometric identity management functions to the Office of Biometric Identity Management (OBIM), a... Records (72 FR 47057, August 22, 2007). This system of records allows the Department of Homeland...

  8. Nevada National Security Site 2012 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect

    NSTec Environmental Management

    2013-02-11

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2012 results. During 2012, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Groundwater samples were collected at UE5PW-1, UE5PW-2, and UE5PW-3 on March 21, August 7, August 21, and September 11, 2012, and static water levels were measured at each of the three pilot wells on March 19, June 6, August 2, and October 15, 2012. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Final results from samples collected in 2012 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  9. Nevada National Security Site 2010 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect

    NSTec Environmental Management

    2011-01-01

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2010 results. During 2010, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Samples were collected at UE5PW-1 on March 10 and August 10, 2010; at UE5PW-2 on March 10, August 10, and August 25, 2010; and at UE5PW-3 on March 31, August 10, and August 25, 2010. Static water levels were measured at each of the three pilot wells on March 1, April 26, August 9, and November 9, 2010. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Results from all samples collected in 2010 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  10. The FBI's Library Awareness Program: National Security vs Government Intrusion into American Libraries [and] The KGB and the Library Target.

    ERIC Educational Resources Information Center

    Information Reports and Bibliographies, 1988

    1988-01-01

    Presents statements made to the House Judiciary Subcommittee on Civil and Constitutional Rights by representatives of the Federal Bureau of Investigation and the library community concerning the surveillance of library users' reading habits as a national security measure. An FBI study on the extent of Soviet intelligence service's utilization of…

  11. Nevada National Security Site 2011 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect

    NSTec Environmental Management

    2012-02-27

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2011 results. During 2011, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Samples were collected at UE5PW-1 on March 8, August 2, August 24, and October 19, 2011; at UE5PW-2 on March 8, August 2, August 23, and October 19, 2011; and at UE5PW-3 on March 8, August 2, August 23, and October 19, 2011. Static water levels were measured at each of the three pilot wells on March 1, June 7, August 1, and October 17, 2011. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Initial total organic carbon and total organic halides results for samples collected in August 2011 were above previous measurements and, in some cases, above the established investigation limits. However, after field sample pumps and tubing were disinfected with Clorox solution, the results returned to normal levels. Final results from samples collected in 2011 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  12. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish...

  13. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish...

  14. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish...

  15. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish...

  16. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  17. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  18. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  19. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  20. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  1. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  2. Diversity Intersects with National Security.

    ERIC Educational Resources Information Center

    Chew, Cassie

    2003-01-01

    Describes how the United Negro College Fund's Institute for International Public Policy is preparing to host a series of open-ended discussions with top government and business officials on the importance of a diverse work force as a national security imperative, as well as a competitive advantage in a global economy. (EV)

  3. National Security Management Correspondence Course.

    ERIC Educational Resources Information Center

    Industrial Coll. of the Armed Forces (DOD), Washington, DC.

    A course of study on the fundamental aspects of the areas of knowledge which are essential to effective management of national security is presented. The course presents the substance of the Industrial College resident curriculum adapted to the correspondence method of study. The subject matter is designed to impart knowledge and understanding of…

  4. Climate Change and National Security

    SciTech Connect

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  5. Teaching Secure Programming

    SciTech Connect

    Bishop, Matt; Frincke, Deb A.

    2005-09-01

    This article discusses issues in teaching secure coding in the context of both academic institutions and training organizations. The emphasis is on the importance of assurance. There is also some discussion of the role of checklists.

  6. Lemnos Interoperable Security Program

    SciTech Connect

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  7. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  8. 12 CFR 568.3 - Security program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Security program. 568.3 Section 568.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...

  9. 12 CFR 568.3 - Security program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...

  10. 12 CFR 391.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for...

  11. 12 CFR 391.3 - Security program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for...

  12. 12 CFR 568.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Security program. 568.3 Section 568.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...

  13. 12 CFR 391.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for...

  14. 12 CFR 168.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...

  15. Status of the National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

  16. Y-12 Groundwater Protection Program Extent Of The Primary Groundwater Contaminants At The Y-12 National Security Complex

    SciTech Connect

    2013-12-01

    This report presents data summary tables and maps used to define and illustrate the approximate lateral extent of groundwater contamination at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The data tables and maps address the primary (i.e., most widespread and mobile) organic, inorganic, and radiological contaminants in the groundwater. The sampling locations, calculated contaminant concentrations, plume boundary values, and paired map format used to define, quantify, delineate, and illustrate the approximate extent of the primary organic, inorganic, and radiological contaminants in groundwater at Y-12 are described.

  17. Input from Key Stakeholders in the National Security Technology Incubator

    SciTech Connect

    2008-01-31

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  18. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Security program. 601.3 Section 601.3 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND... employees concerned with classified information or material. (b) Encouraging Foundation personnel...

  19. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Security program. 601.3 Section 601.3 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND... employees concerned with classified information or material. (b) Encouraging Foundation personnel...

  20. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Security program. 601.3 Section 601.3 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND... employees concerned with classified information or material. (b) Encouraging Foundation personnel...

  1. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-10

    ....m. ADDRESSES: The meeting will be held at the National Security Education Program; 1101 Wilson Blvd..., National Security Education Program, 1101 Wilson Boulevard, Suite 1210, Rosslyn, Virginia 22209-2248;...

  2. 75 FR 14454 - National Protection and Programs Directorate; National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-25

    ... Secretary of Homeland Security with advice on the security of the critical infrastructure sectors and their... 2010 Minutes V. Working Group Status: A Framework for Establishing Critical Infrastructure Resilience... SECURITY National Protection and Programs Directorate; National Infrastructure Advisory Council...

  3. Cooperative global security programs modeling & simulation.

    SciTech Connect

    Briand, Daniel

    2010-05-01

    The national laboratories global security programs implement sustainable technical solutions for cooperative nonproliferation, arms control, and physical security systems worldwide. To help in the development and execution of these programs, a wide range of analytical tools are used to model, for example, synthetic tactical environments for assessing infrastructure protection initiatives and tactics, systematic approaches for prioritizing nuclear and biological threat reduction opportunities worldwide, and nuclear fuel cycle enrichment and spent fuel management for nuclear power countries. This presentation will describe how these models are used in analyses to support the Obama Administration's agenda and bilateral/multinational treaties, and ultimately, to reduce weapons of mass destruction and terrorism threats through international technical cooperation.

  4. Next Generation National Security Leaders

    SciTech Connect

    Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

    2012-07-19

    It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had “right-sized” the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community – or it may lie in more effectively using our existing resources and training programs.

  5. Chemical and Biological National Security Program (CBNP) Annual Report FY2002 Overview Local Integration of NARAC With Cities (LINC)

    SciTech Connect

    Ermak, D L; Nasstrom, J S; Tull, J E; Baskett, R L; Pobanz, B; Mosley-Rovi, R

    2002-11-18

    The objective of the Local Integration of NARAC With Cities (LINC) project is to demonstrate the capability for providing local government agencies with advanced, CBNP-developed operational atmospheric plume prediction capabilities that can be seamlessly integrated with appropriate federal agency support for homeland security. LINC's approach is to integrate Lawrence Livermore National Laboratory's (LLNL) National Atmospheric Release Advisory Center (NARAC) tools and services with local emergency management and response centers. In the event of an airborne chemical or biological agent release in an urban area, large portions of the city and even the surrounding suburbs may be affected by the airborne plume, depending on the type of agent, size of release, dissemination mechanism and ambient meteorological conditions. The goal of LINC is to provide real-time predictions that would be used by emergency managers and responders (fire, police, hazmat, etc.) to map the extent and effects of hazardous airborne material. Prompt predictions are provided to guide first responders in determining protective actions to be taken (use of personal protective equipment, evacuation, sheltering in place, etc.), safe locations for incident command posts, and critical facilities that may be at risk (hospitals, schools, etc.). LINC also provides response teams from multiple jurisdictions (local, state, and federal) with tools to effectively share information regarding the areas and populations at risk. The ultimate goal of LINC is a seamless and coordinated nationwide system that integrates NARAC prediction and situation awareness resources with the appropriate local, state and federal agencies for homeland security applications ranging from planning to emergency response to consequence assessment and attribution.

  6. User Interface Program for secure electronic tags

    SciTech Connect

    Cai, Y.; Koehl, E.R.; Carlson, R.D.; Raptis, A.C.

    1995-05-01

    This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US.

  7. 15 CFR 742.4 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States...

  8. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... national security and emergency preparedness (NS/EP) telecommunications policy. Agenda: The NSTAC...

  9. 78 FR 63232 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... related to national security and emergency preparedness (NS/EP) telecommunications policy. During...

  10. ADP computer security classification program

    SciTech Connect

    Augustson, S.J.

    1984-01-01

    CG-ADP-1, the Automatic Data Processing Security Classification Guide, provides for classification guidance (for security information) concerning the protection of Department of Energy (DOE) and DOE contractor Automatic Data Processing (ADP) systems which handle classified information. Within the DOE, ADP facilities that process classified information provide potentially lucrative targets for compromise. In conjunction with the security measures required by DOE regulations, necessary precautions must be taken to protect details of those ADP security measures which could aid in their own subversion. Accordingly, the basic principle underlying ADP security classification policy is to protect information which could be of significant assistance in gaining unauthorized access to classified information being processed at an ADP facility. Given this policy, classification topics and guidelines are approved for implementation. The basic program guide, CG-ADP-1 is broad in scope and based upon it, more detailed local guides are sometimes developed and approved for specific sites. Classification topics are provided for system features, system and security management, and passwords. Site-specific topics can be addressed in local guides if needed.

  11. Nevada National Security Site Environmental Report 2011

    SciTech Connect

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  12. Bioethics and the national security state.

    PubMed

    Moreno, Jonathan D

    2004-01-01

    In previous work, I have described the history and ethics of human experiments for national security purposes during he cold war and developed the bioethical issues that will be apparent in the "war on terror". This paper is an attempt to bring these two previous lines of work together under the rubric of the "national security state," a concept familiar to Cold War historians and political scientists. The founding of the national security state was associated with the first articulations of informed consent requirements by national security agencies. My analysis indicates that strengthened consent standards, though conventionally thought to be antithetical crisis, can be seen as an attempt by the postwar national security state to protect itself from critics of expanded governmental power. During the coming years the renewed mission of the national security state in the war on terror should impel students of bioethics to consider its implications for the field.

  13. Student Experiential Opportunities in National Security Careers

    SciTech Connect

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  14. Welcome to Los Alamos National Laboratory: A premier national security science laboratory

    SciTech Connect

    Wallace, Terry

    2012-06-25

    Dr Wallace presents visitors with an overview of LANL's national security science mission: stockpile stewardship, protecting against the nuclear threat, and energy security & emerging threats, which are underpinned by excellence in science/technology/engineering capabilities. He shows visitors a general Lab overview of budget, staff, and facilities before providing a more in-depth look at recent Global Security accomplishments and current programs.

  15. National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook

    NASA Technical Reports Server (NTRS)

    Roback, E.

    1991-01-01

    The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.

  16. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will hold its annual... Management Branch, Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615....

  17. 77 FR 44641 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... Security, 245 Murray Lane, Mail Stop 0615, Arlington, VA 20598-0615. Instructions: All submissions...

  18. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-27

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee... meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC) will be...), Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615; Fax:...

  19. Extreme Scale Computing to Secure the Nation

    SciTech Connect

    Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

    2009-11-10

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the absence of nuclear

  20. External Service Providers to the National Security Technology Incubator

    SciTech Connect

    2008-02-28

    This report documents the identification and assessment of external service providers to the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant to Arrowhead Center, New Mexico State University. This report contains 1) a summary of the services to be provided by NSTI; 2) organizational descriptions of external service providers; and 3) a comparison of NSTI services and services offered by external providers.

  1. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    2001-06-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT Y-12), the Y-12 management and operations (M and O) subcontractor for DOE.

  2. The Political Economy of National Security.

    ERIC Educational Resources Information Center

    Kapstein, Ethan B.

    1990-01-01

    Describes a course offered on the political economy of national security. Discusses the objective of the course as the introduction of major economic issues associated with national security. Outlines lecture topics, course readings, and class format. Evaluates course weaknesses and strengths. Includes course assignments and requirements. (RW)

  3. Redefining National Security. Worldwatch Paper 14.

    ERIC Educational Resources Information Center

    Brown, Lester R.

    This paper, an adaption from the author's forthcoming book "The Twenty-Ninth Day: Accomodating Human Needs and Numbers to the Earth's Resources," deals with non-military threats to national security. Since World War II the concept of national security has acquired an overwhelmingly military character. The policy of continual preparedness has led…

  4. Y-12 National Security Complex Water Assessment

    SciTech Connect

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  5. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... (TSC). For more information on the TSDB, see DOJ/FBI--019 Terrorist Screening Records System, 72 FR...-002--Transportation Security Threat Assessment System of Records, 75 FR 28046 (May 19, 2010). DHS/CBP... of Records, 71 FR 20708 (April 21, 2006). DHS/NPPD will also retain records to conduct inspections...

  6. Marketing Plan for the National Security Technology Incubator

    SciTech Connect

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  7. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  8. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  9. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  10. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  11. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  12. 12 CFR 21.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices...

  13. 12 CFR 748.0 - Security program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... crimes, and (5) Prevent destruction of vital records, as defined in 12 CFR part 749. (c) Each Federal... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Security program. 748.0 Section 748.0 Banks and....0 Security program. (a) Each federally insured credit union will develop a written security...

  14. Nevada National Security Site Environmental Report 2012

    SciTech Connect

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  15. Overview of Scientific Freedom and National Security

    NASA Astrophysics Data System (ADS)

    Lerch, Irving

    2000-04-01

    The subject of our scrutiny is very much in the news, punctuated with nouns and modifiers both inflammatory and mundane such as espionage, justice, scientific accountability and scientific freedom. And while our discussion will focus on these issues, I want to raise some of the pragmatic questions that bear on the foundation of our support for international science. Beneath questions of guilt and the loss of secrets in the Wen Ho Lee case lay the inherent tension between the tradition of open exchange in the scientific enterprise and the need to protect the nation's security. How this balance is to be achieved in a democratic society has bedeviled us ever since the Manhattan project heralded the emergence of science and technology as instruments of great national power. If we do not find this balance, we run the risk of damaging some of the most important intellectual treasures that the US has produced the Department of Energy's national laboratories and the entire system that we call the international scientific enterprise. For while the superheated charges of lax security and criminal negligence have led some to call for ``firewalls" to isolate and protect the secrets in our weapons labs, such measures may have severe consequences for weapons and non-weapons labs alike and their many associated universities. It's estimated that from 70% to as much as 80% in the expansion of our economy is technology-driven, derived from the most productive system of scientific innovation in the world. This is also true of our national security. Science is indispensable to the development and maintenance of the nation's arsenals. The Department of Energy's Nuclear Stockpile Stewardship Program is central to the safety and reliability of American nuclear weapons and to our hope for a worldwide ban on nuclear tests. But this program will fail without a continuing intense development effort based on cutting-edge science. And a great deal of the science needed is being pursued in

  16. Space Shuttle security policies and programs

    NASA Technical Reports Server (NTRS)

    Keith, E. L.

    1985-01-01

    The Space Shuttle vehicle consists of the orbiter, external tank, and two solid rocket boosters. In dealing with security two major protective categories are considered, taking into account resource protection and information protection. A review is provided of four basic programs which have to be satisfied. Aspects of science and technology transfer are discussed. The restrictions for the transfer of science and technology information are covered under various NASA Management Instructions (NMI's). There were two major events which influenced the protection of sensitive and private information on the Space Shuttle program. The first event was a manned space flight accident, while the second was the enactment of a congressional bill to establish the rights of privacy. Attention is also given to national resource protection and national defense classified operations.

  17. Space Shuttle security policies and programs

    NASA Astrophysics Data System (ADS)

    Keith, E. L.

    The Space Shuttle vehicle consists of the orbiter, external tank, and two solid rocket boosters. In dealing with security two major protective categories are considered, taking into account resource protection and information protection. A review is provided of four basic programs which have to be satisfied. Aspects of science and technology transfer are discussed. The restrictions for the transfer of science and technology information are covered under various NASA Management Instructions (NMI's). There were two major events which influenced the protection of sensitive and private information on the Space Shuttle program. The first event was a manned space flight accident, while the second was the enactment of a congressional bill to establish the rights of privacy. Attention is also given to national resource protection and national defense classified operations.

  18. National security in the third world

    SciTech Connect

    Al-Mashat, A.M.M.

    1985-01-01

    For nations of the Third World, national security poses serious dilemmas. Unlike Western nations, less-developed countries must balance the complex and often contradictory requirements of socio-economic and political development with problems of internal stability and the requirements of national defense. For these countries, a concept of national security that focuses primarily on the international threat system and its overt manifestations of wars and violence, ignoring domestic well-being, is inadequate on theoretical and pragmatic grounds. This book addresses the security problems of Third World states, arguing for new ways to define and measure national security so that the concept may be appropriately applied to the needs of developing countries. In addition, the author argues that the tranquility of a state, a concept traditionally linked with national security, cannot necessarily be associated with quality of life as measured by conventional means. Dr. Al-Mashat constructs a tranquility index for 95 developing nations and tests its relationship with the physical quality-of-life index to demonstrate this point. Attempts to improve quality of life, he suggests, may in many countries lead to a reduction in security unless simultaneous attempts are made to democratize the regime.

  19. National School Lunch Program

    ERIC Educational Resources Information Center

    US Department of Agriculture, 2009

    2009-01-01

    The National School Lunch Program is a federally assisted meal program operating in over 101,000 public and non-profit private schools and residential child care institutions. It provides nutritionally balanced, low-cost or free lunches to more than 30.5 million children each school day in 2008. In 1998, Congress expanded the National School Lunch…

  20. National Security Agency Accountability Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Calendar Year 2000 Groundwater Monitoring Report for the Groundwater Protection Program, U.S. Department of Energy, Y-12 National Security Complex Oak Ridge, Tennessee

    SciTech Connect

    2001-03-01

    This report contains the groundwater and surface water monitoring data that were obtained at the US Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) in Oak Ridge, Tennessee, during calendar year (CY) 2000. These monitoring data were collected for the specific purposes of DOE Order 5400.1 site surveillance monitoring and exit pathway/perimeter monitoring, as described in the ''Environmental Monitoring Plan for the Oak Ridge Reservation'' (DOE 1996). Site surveillance monitoring provides data regarding the quality of groundwater and surface water in areas that are, or could be, affected by operations at Y-12. Exit pathway/perimeter monitoring provides data regarding the quality of groundwater and surface water where contaminants from Y-12 are most likely to migrate beyond the boundaries of the DOE Oak Ridge Reservation (ORR). The CY 2000 groundwater and surface water monitoring data presented in this report were obtained under the auspices of the Y-12 Groundwater Protection Program (GWPP), managed by Lockheed Martin Energy Systems, Inc. (LMES) (January-October, 2000) and by BWXT Y-12, L.L.C. (November-December, 2000), and the Water Resources Restoration Program (WRRP), which is managed by Bechtel Jacobs Company LLC. Combining the monitoring results obtained under both the Y-12 GWPP and the WRRP enables this report to serve as a consolidated reference for the groundwater and surface water monitoring data obtained at Y-12 during CY 2000.

  2. 77 FR 75182 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-19

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. Agenda: The NSTAC members will receive an update on progress made to date by the...

  3. 76 FR 52672 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. During the conference call, the NSTAC members will receive an update regarding...

  4. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-25

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee AGENCY: National Communications System, DHS. ACTION: Notice of Open Advisory Committee meeting. SUMMARY... Communications System (Government Industry Planning and Management Branch), Department of Homeland Security,...

  5. Nevada National Security Site Radiological Control Manual

    SciTech Connect

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  6. It's No Secret: Fifty-eight Years of National Security Programs at BNL (463rd Brookhaven Lecture)

    SciTech Connect

    Indusi, Joseph

    2010-11-17

    Prepare for a true tale of suspense and international intrigue. A tale that began in 1952, continued through the Cold War, and is not yet complete today. A tale of unexpected allies. Hear the true tale of one Laboratory’s efforts to keep nuclear materials out of the hands of evildoers. Freidlander. Higinbotham. Dodson. Kouts. And many more! See some of BNL’s all-star cast in the defining roles that shaped their careers as they worked toward keeping the nation and the world safe from the proliferation of nuclear weapons.

  7. National Security Technology Incubation Project Continuation Plan

    SciTech Connect

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  8. National Toxicology Program

    MedlinePlus

    ... improved search is live. Try it now! NTP Cell Phone Radiofrequency Radiation Studies The National Toxicology Program (NTP) ... rats and mice on potential health hazards from cell phone radiofrequency radiation. The NTP released a report on ...

  9. Counterproliferation: A National Security Priority. Speech text

    SciTech Connect

    Kaminski, P.G.

    1995-10-27

    Stemming the proliferation of weapons of mass destruction and their missile delivery systems - counterproliferation - is universally recognized as a significant national priority by all elements of the U.S. national security community. President Clinton, for example, emphasized in the National Security Strategy released in February of this year, that a key part of our strategy is to seek to stem the proliferation of such weapons and to develop an effective capability to deal with these threats. In May 1995, the National Military Strategy was issued by our nation`s senior military leader, General Shalikashvili, who described the threat of weapons of mass destruction as one of the ...four principal dangers which our military, in combination with other elements of national power must address.

  10. Y-12 Groundwater Protection Program Monitoring Optimization Plan For Groundwater Monitoring Wells At The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    none,

    2013-09-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The plan describes the technical approach that is implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and groundwater quality monitoring data. The technical approach is based on the GWPP status designation for each well. Under this approach, wells granted "active" status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling, whereas wells granted "inactive" status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP. Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans. This plan applies to groundwater wells associated with Y-12 and related waste management areas and facilities located within three hydrogeologic regimes.

  11. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant... 49 Transportation 9 2013-10-01 2013-10-01 false Airport tenant security programs. 1542.113...

  12. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant... 49 Transportation 9 2014-10-01 2014-10-01 false Airport tenant security programs. 1542.113...

  13. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport...

  14. It's a national security policy, stupid

    SciTech Connect

    Isaacs, J.

    1993-09-01

    This article discusses the first few national security decisions of the Clinton administration. The first decision was to have the United States continue to honor the nuclear testing moratorium through September, 1994 (or until another nation tested first). The second decision of the Clinton administration was the independence of the Arms Control and Disarmament Agency (ACDA) from the State Department. The third decision was to formally denounce the Reagan Administration's interpretation of the US/Soviet Anti-Ballistic Missile Treaty. The issue of the financing of United States involvement in Somalia was also addressed. The implications of these policy decisions as related to national security are evaluated in this article.

  15. Interactive Programming Support for Secure Software Development

    ERIC Educational Resources Information Center

    Xie, Jing

    2012-01-01

    Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…

  16. 76 FR 10262 - Information Security Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-24

    ...: 5 U.S.C. 552, 552a, 552b, 553; 31 U.S.C. 9701; E.O. 13526 of January 5, 2010 (75 FR 707), sections 5... 46 CFR Part 503 RIN 3072-AC40 Information Security Program AGENCY: Federal Maritime Commission... relating to its Information Security Program to reflect the changes implemented by Executive Order...

  17. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 19 2013-07-01 2013-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and...

  18. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 18 2011-07-01 2011-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and...

  19. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 19 2014-07-01 2014-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and...

  20. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and...

  1. National Digital Orthophoto Program

    USGS Publications Warehouse

    ,; ,; ,; ,; ,

    1996-01-01

    A critical component of the National Spatial Data Infrastructure (NSDI) is Framework. Framework provides a base on which to collect, register, and integrate geospatial information accurately and consistently. The Federal Geographic Data Committee (FGDC) proposed that Framework include geodetic control, orthoimagery, elevation, transportation, hydrography, governmental units, and cadastral data. The Mapping Science Committee of the National Research Council recommends that geodetic control, orthoimagery, and elevation data become the critical foundation of the NSDI. The National Digital Orthophoto Program (NDOP) is a working model on how Federal, State, and local government, as well as private industry, can participate to develop the orthoimagery Framework for the Nation.

  2. Nevada National Security Site Environmental Report 2013

    SciTech Connect

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  3. 75 FR 82039 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ...) Port Security Grants. (2) Global Supply Chain Security Policy Efforts. (3) Update to the Maritime... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of meeting. SUMMARY: The National Maritime Security Advisory Committee (NMSAC) will...

  4. Sensor Science for National Security

    SciTech Connect

    Hardy, Jim E; Warmack, Robert J Bruce; Lavrik, Nickolay V; Datskos, Panos G; BRITTONJr., CHARLES L.

    2009-01-01

    Oak Ridge National Laboratory (ORNL) has over 200 professionals engaged in measurement science research and development. This work includes transduction techniques, advanced microelectronics, signal and image processing, modeling and simulation, material synthesis and characterization, and system engineering issues for packaging, miniaturization, integration, and communications (e.g. wireless networks). ORNL is applying this expertise to detecting, preventing, and reversing the proliferation of weapons of mass destruction, deploying integrated systems for incident awareness, detection, and response, providing technology for detection of explosives, and delivering enhanced protection and new capabilities to first responders and warfighters. Sensor systems include micro- and nano-arrays, optical, chemical, and biological technologies. Electronics research has focused on low-power, low-cost, and wireless functionality. Signal processing advancements encompass data flow with conversion to information and knowledge for intelligent decision making.

  5. Nevada National Security Site Environmental Report 2010

    SciTech Connect

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  6. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  7. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS THE OFFICE OF ENERGY RESEARCH FINANCIAL ASSISTANCE.... Correspondence which includes the specific information in question shall be sent by registered mail to...

  8. New rules revamp national security prosecutions

    NASA Astrophysics Data System (ADS)

    Gwynne, Peter

    2016-06-01

    Following the collapse of recent prosecutions of Chinese-American scientists on national security grounds, the US Department of Justice (DOJ) has issued new rules on such lawsuits that will require top officials in Washington to review and supervise all cases that implicitly involve spying - rather than leaving decisions to local prosecutors.

  9. National security in the 1990s

    SciTech Connect

    Rich, M.D.

    1991-02-01

    The Rand Paper contains the text of a speech given at a luncheon co-sponsored by Town Hall of California and the Los Angeles Council of Engineers and Scientists on national security affairs in the 1990s. The speech was given at the Biltmore Hotel, Los Angeles, California, on February 19, 1991.

  10. 75 FR 705 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ... information relating to defense against transnational terrorism. Our democratic principles require that the... national security, which includes defense against transnational terrorism, and the original classification...- art technology within a U.S. weapon system; (5) reveal formally named or numbered U.S. military...

  11. National Diabetes Education Program

    MedlinePlus

    ... Community Organizations​ ​​ HealthSense Alternate Language URL National Diabetes Education Program Page Content Now Available ​ Updated School Guide! ... For Health Care Professionals​​ Clinical Practice Tools Patient Education Resources Practice Transformation for Physicians and Health Care ...

  12. 75 FR 39266 - National Protection and Programs Directorate; National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... Homeland Security with advice on the security of the critical infrastructure sectors and their information.... The NIAC will meet to address issues relevant to the protection of critical infrastructure as directed... SECURITY National Protection and Programs Directorate; National Infrastructure Advisory Council...

  13. Groundwater Protection Program Management Plan For The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    Elvado Environmental, LLC

    2009-09-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of Babcock & Wilcox Technical Services Y-12 LLC (hereafter referenced as B&W Y-12), the Y-12 management and operations (M&O) contractor for DOE. B&W Y-12 is a new corporate name, assumed in January 2007, for the company formerly known as BWXT Y-12, L.L.C., hereafter referenced as BWXT. This GWPP management plan addresses the requirements of DOE Order 450.1A Environmental Protection Program (hereafter referenced as DOE O 450.1A), which emphasize a site-wide approach for groundwater protection at each DOE facility through implementation of groundwater surveillance monitoring. Additionally, this plan addresses the relevant and applicable GWPP elements and goals described in the DOE O 450.1A technical guidance documents issued in June 2004 (DOE 2004) and May 2005 (DOE 2005). This GWPP management plan is a 'living' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP

  14. Alternate Energy for National Security.

    NASA Astrophysics Data System (ADS)

    Rath, Bhakta

    2010-02-01

    Recent price fluctuations at the gas pump have brought our attention to the phenomenal increase of global energy consumption in recent years. It is now evident that we have almost reached a peak in global oil production. Several projections indicate that total world consumption of oil will rise by nearly 60 per cent between 1999 and 2020. In 1999 consumption was equivalent to 86 million barrels of oil per day, which has reached a peak of production extracted from most known oil reserves. These projections, if accurate, will present an unprecedented crisis to the global economy and industry. As an example, in the US, nearly 40 per cent of energy usage is provided by petroleum, of which nearly a third is used in transportation. The US Department of Defense (DOD) is the single largest buyer of fuel, amounting to, on the average, 13 million gallons per day. Additionally, these fuels have to meet different requirements that prevent use of ethanol additives and biodiesel. An aggressive search for alternate energy sources, both renewable and nonrenewable, is vital. The presentation will review national and DOD perspectives on the exploration of alternate energy with a focus on energy derivable from the ocean. )

  15. 76 FR 46907 - Ammonium Nitrate Security Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-03

    ... Federal Bureau of Investigation FR Federal Register HMR Hazardous Materials Regulations HMT Hazardous... ``Secure Handling of Ammonium Nitrate Program'' on October 29, 2008. See 73 FR 64280. The ANPRM solicited... interacting with state and local governments regarding ammonium nitrate security. ] See 73 FR 64280,...

  16. Developing Security Education and Awareness Programs.

    ERIC Educational Resources Information Center

    Payne, Shirley

    2003-01-01

    Discusses how to develop effective security education and awareness programs to help the wide and varied groups of people on campuses understand their role in campus security, examining: target audiences (e.g., students, parents, faculty, researchers, and administrators); effective delivery methods (e.g., online quizzes, handbooks, and videos);…

  17. 76 FR 70366 - Ammonium Nitrate Security Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-14

    ... Department previously announced a series of public meetings on the same topic on October 2, 2011 (see 76 FR... public comment on August 3, 2011. See 73 FR 64280 (advance notice of proposed rulemaking); 76 FR 46908... SECURITY Office of the Secretary 6 CFR Part 31 RIN 1601-AA52 Ammonium Nitrate Security Program...

  18. Developing a computer security training program

    SciTech Connect

    Not Available

    1990-01-01

    We all know that training can empower the computer protection program. However, pushing computer security information outside the computer security organization into the rest of the company is often labeled as an easy project or a dungeon full of dragons. Used in part or whole, the strategy offered in this paper may help the developer of a computer security training program ward off dragons and create products and services. The strategy includes GOALS (what the result of training will be), POINTERS (tips to ensure survival), and STEPS (products and services as a means to accomplish the goals).

  19. National Nuclear Forensics Expertise Development Program

    NASA Astrophysics Data System (ADS)

    Kentis, Samantha E.; Ulicny, William D.

    2009-08-01

    Over the course of the 2009 Federal Fiscal Year the United States (U.S.) Department of Homeland Security (DHS), in partnership with the Departments of Defense (DoD) and Energy (DOE), is continuing existing programs and introducing new programs designed to maintain a highly qualified, enduring workforce capable of performing the technical nuclear forensics mission. These student and university programs are designed to recruit the best and brightest students, develop university faculty and research capabilities, and engage the national laboratories in fields of study with application in nuclear forensics. This comprehensive effort constitutes the National Nuclear Forensics Expertise Development Program.

  20. Scientific Openness and National Security at the National Laboratories

    NASA Astrophysics Data System (ADS)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  1. Nevada National Security Site Environmental Report 2011 Summary

    SciTech Connect

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  2. Noncitizens and the Supplemental Security Income program.

    PubMed

    Parrott, T M; Kennedy, L D; Scott, C G

    1998-01-01

    The Supplemental Security Income (SSI) program, established by the Social Security Amendments of 1972 (Public Law 92-603), was designed to provide cash assistance to needy aged, blind, and disabled citizens, and noncitizens lawfully admitted for permanent residence or permanently residing under color of law. Since then, this means-tested program has undergone many legislative changes that affect the eligibility status of noncitizens. This article, presented in three parts, discusses the legislative history of noncitizen eligibility, and details relevant laws enacted since the program's inception; provides current data on the trends and changes of the noncitizen population; and describes the larger population of foreign-born SSI recipients, of which the noncitizens are a part. Data on the number of SSI recipients born abroad but who had become citizens before applying for SSI payments were not previously available. Analytical data are from the Supplemental Security Record (SSR) matched to the Social Security Number Identification (Numident) file.

  3. Creation of security engineering programs by the Southwest Surety Institute

    NASA Astrophysics Data System (ADS)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  4. Y-12 Groundwater Protection Program Monitoring Optimization Plan For Groundwater Monitoring Wells At The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    Elvado Environmental LLC

    2009-12-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure A.1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and groundwater quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted 'active' status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling (Section 3.0), whereas wells granted 'inactive' status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 3.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 4.0). This plan applies to groundwater wells associated with Y-12 and related waste management areas and facilities located within three hydrogeologic regimes (Figure A.1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime encompasses a section of Chestnut Ridge directly south of Y-12 that is bound on

  5. [System approach to national health security problems].

    PubMed

    Venediktov, D D

    1998-01-01

    P. K. Anokhin's basic works on functional systems, on space-time continuum and advanced reflection of the reality, on the physiological structure of a behavior act, as well as his fundamental philosophical and scientific postulated are most fruitful for analyzing and solving a number of biomedical, societal, and political problems, among them there are problems of national security in general and its demographic and health aspects. Individual and public health as a measure of balance between the organism (population) and its biosocial environment depends on the efficiency of relevant physiological and societal functional systems is one of the basic prerequisites of national security and timely recognition, avoiding and overcoming numerous challenges, dangers, and threats to the nation. General political and socioeconomic crisis in Russia adversely affects the population's dynamics and public health and it is manifested by depopulatory processes, low birth and high mortality and morbidity rates, growing violence and crime, psychoemotional stress, decreased immunity level of vast majority of population, especially that of children, elderly and other vulnerable groups. Environmental pollution and degradation have reached dangerous proportions. The national health system is unable to meet basic needs of the population. To overcome the crisis, systemic measures should be in the foundation of all health reform concepts and strategies. Monitoring national health, including modelling its future status, as well as progress in health system reforms should be another basic condition for overcoming the national health crisis. PMID:9567717

  6. Selecting RMF Controls for National Security Systems

    SciTech Connect

    Witzke, Edward L.

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  7. National Center for Nuclear Security - NCNS

    ScienceCinema

    None

    2016-07-12

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  8. National Center for Nuclear Security - NCNS

    SciTech Connect

    2014-11-12

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  9. 77 FR 26024 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ... SECURITY Coast Guard National Maritime Security Advisory Committee AGENCY: Coast Guard, DHS. ACTION... published in the Federal Register of May 1, 2012, a notice announcing a National Maritime Security Advisory... progress regarding multiple maritime security initiatives. If you have been adversely affected by the...

  10. 77 FR 1710 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-11

    ... SECURITY Coast Guard National Maritime Security Advisory Committee AGENCY: Coast Guard, DHS. ACTION... published in the Federal Register of January 9, 2012, a notice announcing a National Maritime Security... regarding multiple maritime security initiatives. If you have been adversely affected by the delay...

  11. Nuclear Arms and National Security. 1983 National Issues Forum.

    ERIC Educational Resources Information Center

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  12. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  13. 75 FR 45154 - National Security Division; Agency Information Collection Activities:

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... National Security Division; Agency Information Collection Activities: Proposed Collection; Comments... (Foreign Agents). The Department of Justice (DOJ), National Security Division (NSD), will be submitting the... Division, Counterespionage Section/Registration Unit, Bond Building--Room 9300, Washington, DC 20530....

  14. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: • DOE hazardous and non-hazardous non-radioactive classified waste • DOE low-level radioactive waste (LLW) • DOE mixed low-level waste (MLLW) • U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  15. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2012-02-28

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  16. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National...: (1) Form SF-86, Questionnaire for National Security Positions, marked “CON” in Block 1,...

  17. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  18. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  19. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  20. 76 FR 50719 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... 92-463, notice is hereby given of a forthcoming meeting of the National Security Education Board. The... requirements established by the David L. Boren National Security Education Act, Title VII of Public Law...

  1. 77 FR 27739 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102- 183,...

  2. 77 FR 49439 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose ] of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102-183, as...

  3. 76 FR 28960 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102- 183,...

  4. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  5. 14 CFR § 1260.31 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false National security. § 1260.31 Section Â... AGREEMENTS General Provisions § 1260.31 National security. National Security October 2000 Normally, NASA... performing on the grant who will have access to the information must obtain the appropriate...

  6. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  7. Leveraging Safety Programs to Improve and Support Security Programs

    SciTech Connect

    Leach, Janice; Snell, Mark K.; Pratt, R.; Sandoval, S.

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  8. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  9. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  10. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  11. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  12. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  13. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex

    SciTech Connect

    2006-12-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure A.1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling (Section 3.0), whereas wells granted ''inactive'' status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 3.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 4.0). This plan applies to groundwater wells associated with Y-12 and related waste management areas and facilities located within three hydrogeologic regimes (Figure A.1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime encompasses a section of Chestnut Ridge directly south of Y-12 that is bound on the

  14. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    2003-09-30

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure 1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 which provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater sampling (Section 3.0), whereas well granted ''inactive'' status are not used for either purpose. The status designation also determines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 4.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 5.0). This plan applies to groundwater monitoring wells associated with Y-12 and related waste management facilities located within three hydrogeologic regimes (Figure 1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime is directly south of Y-12 and encompasses a section of Chestnut Ridge that is bound to the

  15. Water security-National and global issues

    USGS Publications Warehouse

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  16. Data security on the national fusion grid

    SciTech Connect

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-06-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.

  17. 33 CFR 104.140 - Alternative Security Programs.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Alternative Security Programs. 104.140 Section 104.140 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.140 Alternative Security Programs. A...

  18. 33 CFR 105.140 - Alternative Security Program.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Alternative Security Program. 105.140 Section 105.140 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES General § 105.140 Alternative Security Program. (a)...

  19. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 44 Emergency Management and Assistance 1 2012-10-01 2011-10-01 true Senior FEMA official responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION §...

  20. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION §...

  1. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 44 Emergency Management and Assistance 1 2011-10-01 2011-10-01 false Senior FEMA official responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION §...

  2. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 44 Emergency Management and Assistance 1 2013-10-01 2013-10-01 false Senior FEMA official responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION §...

  3. Security Economics and Critical National Infrastructure

    NASA Astrophysics Data System (ADS)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  4. Materials @ LANL: Solutions for National Security Challenges

    NASA Astrophysics Data System (ADS)

    Teter, David

    2012-10-01

    Materials science activities impact many programmatic missions at LANL including nuclear weapons, nuclear energy, renewable energy, global security and nonproliferation. An overview of the LANL materials science strategy and examples of materials science programs will be presented. Major materials leadership areas are in materials dynamics, actinides and correlated electron materials, materials in radiation extremes, energetic materials, integrated nanomaterials and complex functional materials. Los Alamos is also planning a large-scale, signature science facility called MaRIE (Matter Radiation Interactions in Extremes) to address in-situ characterization of materials in dynamic and radiation environments using multiple high energy probes. An overview of this facility will also be presented.

  5. 78 FR 16699 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... our public dockets in the January 17, 2008 issue of the Federal Register (73 FR 3316) Docket: Any... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The National Maritime Security...

  6. 77 FR 51817 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-27

    ... the January 17, 2008 issue of the Federal Register (73 FR 3316). Docket: Any background information or... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The National Maritime Security...

  7. 78 FR 19277 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-29

    ..., 2008 issue of the Federal Register (73 FR 3316). Docket: Any background information or presentations... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: United States Coast... published a notice of meeting for the National Maritime Security Advisory Committee (NMSAC) in the...

  8. 15 CFR 930.122 - Necessary in the interest of national security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... COASTAL RESOURCE MANAGEMENT FEDERAL CONSISTENCY WITH APPROVED COASTAL MANAGEMENT PROGRAMS Appeal to the Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122... objectives....

  9. 75 FR 52768 - National Protection and Programs Directorate; Agency Information Collection Activities: Office of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... training program to improve security in the chemical industry sector. Information is automatically.... chemical industry direct employment is about 850,000 (2009 per the American Chemistry Council... Infrastructure Protection; Chemical Security Awareness Training Program AGENCY: National Protection and...

  10. 75 FR 81284 - National Protection and Programs Directorate; National Infrastructure Advisory Council Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-27

    ... security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as directed by the President. At this... SECURITY National Protection and Programs Directorate; National Infrastructure Advisory Council...

  11. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., and other groups dealing with national security, intelligence, or counterintelligence matters; (4... components of the Department as appropriate, with regard to intelligence, counterintelligence, or national... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national...

  12. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., and other groups dealing with national security, intelligence, or counterintelligence matters; (4... components of the Department as appropriate, with regard to intelligence, counterintelligence, or national... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national...

  13. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  14. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  15. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  16. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  17. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  18. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... national security. (c)(1) The Chief, Controls Division, Office of Intelligence Liaison, Directorate for... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National...

  19. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... national security. (c)(1) The Chief, Controls Division, Office of Intelligence Liaison, Directorate for... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National...

  20. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... national security. (c)(1) The Chief, Controls Division, Office of Intelligence Liaison, Directorate for... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National...

  1. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... national security. (c)(1) The Chief, Controls Division, Office of Intelligence Liaison, Directorate for... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National...

  2. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  3. Neuroscience, Ethics, and National Security: The State of the Art

    PubMed Central

    Tennison, Michael N.; Moreno, Jonathan D.

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security. PMID:22448146

  4. Status of Educational Efforts in National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  5. LANL Safeguards and Security Assurance Program. Revision 6

    SciTech Connect

    1995-04-03

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impacts on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms.

  6. Elderhostel: A National Program.

    ERIC Educational Resources Information Center

    O'Donnell, Kathleen M.; Berkeley, William D.

    1980-01-01

    Elderhostel, modeled on the youth hostels of Europe, is a national nonprofit organization offering older adults a week-long learning experience at any one of a national network of participating colleges and universities. The history and reasons for its success are described, along with a profile of its participants and an optimistic projection of…

  7. Employment among Social Security disability program beneficiaries, 1996-2007.

    PubMed

    Mamun, Arif; O'Leary, Paul; Wittenburg, David C; Gregory, Jesse

    2011-01-01

    We use linked administrative data from program and earnings records to summarize the 2007 employment rates of Social Security disability program beneficiaries at the national and state levels, as well as changes in employment since 1996. The findings provide new information on the employment activities of beneficiaries that should be useful in assessing current agency policies and providing benchmarks for ongoing demonstration projects and future return-to-work initiatives. The overall employment rate--which we define as annual earnings over $1,000--was 12 percent in 2007. Substantial variation exists within the population. Disability Insurance beneficiaries and those younger than age 40 were much more likely to work relative to other Social Security beneficiaries. Additionally, substantial regional variation exists across states; employment rates ranged from 7 percent (West Virginia) to 23 percent (North Dakota). Moreover, we find that the employment rates among beneficiaries were sensitive to the business cycle and persistent over time.

  8. 78 FR 48037 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... required security education training for employees of NRC licensees possessing security clearances so that... National Security Information, which was published in the Federal Register on January 5, 2010 (75 FR 707... implementation of the Executive Order, issued a final rule (75 FR 37254; June 28, 2010) amending 32 CFR...

  9. Jimmy Carter's National Security Policy: A World Order Critique.

    ERIC Educational Resources Information Center

    Johansen, Robert C.

    This essay evaluates the Carter administration's behavior on national security questions and appraises the extent to which it meets Carter's initial professed national security goals. These goals include the intention to reduce military expenditures, to halt the nuclear arms buildup of the United States and U.S.S.R., to prevent the spread of…

  10. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    .... Correction In the Federal Register of April 25, 2012, in FR Doc 2012-9979, on page 24728, in the third column... SECURITY President's National Security Telecommunications Advisory Committee; Correction AGENCY: National... Telecommunications Advisory Committee (NSTAC) meeting. The document contained incorrect information regarding...

  11. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE SPARK-IGNITION ENGINES Exclusion and Exemption of Marine SI Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... request a national security exemption for any marine SI engine, otherwise subject to this part, which...

  12. Arms Control and National Security: An Introduction. Advance Edition.

    ERIC Educational Resources Information Center

    Arms Control Association, Washington, DC.

    Suitable for use with high school students, this booklet on arms control and national security provides background information, describes basic concepts, reviews recent history, and offers suggestions for further reading. The first section, on American attitudes toward national security and arms control, defines five types of limits on weapons…

  13. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 501.2 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND... unauthorized disclosure of such information would pose a threat to the national security and that there is a... information would pose a threat to the national security. The authority of the Director under this...

  14. 76 FR 40296 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-08

    ... Order, Classified National Security Information, 75 FR 733, 3 CFR, 2009 Comp., p. 412; 32 CFR part 2001... without proper authority? Authority: 44 U.S.C. 2101 to 2118; 5 U.S.C. 552; E.O. 13526, 75 FR 707, 3 CFR... RECORDS ADMINISTRATION 36 CFR Part 1260 RIN 3095-AB64 Declassification of National Security...

  15. 77 FR 9214 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... Education Board. The purpose of the meeting is to review and make recommendations to the Secretary of Defense concerning requirements established by the David L. Boren National Security Education Act,...

  16. National Geospatial Program

    USGS Publications Warehouse

    Carswell, William J.

    2011-01-01

    increases the efficiency of the Nation's geospatial community by improving communications about geospatial data, products, services, projects, needs, standards, and best practices. The NGP comprises seven major components (described below), that are managed as a unified set. For example, The National Map establishes data standards and identifies geographic areas where specific types of geospatial data need to be incorporated into The National Map. Partnership Network Liaisons work with Federal, State, local, and tribal partners to help acquire the data. Geospatial technical operations ensure the quality control, integration, and availability to the public of the data acquired. The Emergency Operations Office provides the requirements to The National Map and, during emergencies and natural disasters, provides rapid dissemination of information and data targeted to the needs of emergency responders. The National Atlas uses data from The National Map and other sources to make small-scale maps and multimedia articles about the maps.

  17. SDI (Strategic Defense Initiative) and national security policy. Research report

    SciTech Connect

    Davis, R.W.

    1988-04-01

    The paper attempts to answer the fundamental question of Can SDI make a significant contribution to US national security. It uses as its evaluation criteria historical arms-control measurements of stability, reduction in the probability of war, reduction in the consequences of war, economic benefits, and political benefits. A historical discussion of US nuclear strategy development along with Soviet thinking is provided as a backdrop to set the stage for an analysis of the reasons for President Reagan's March 1983 speech. The objectives of SDI are discussed along with the major concerns expressed by the program critics. Using the evaluation criteria defined above, the author analyzes SDI potential position in a long-term integrated national strategy that includes arms control and competitive strategies.

  18. US national security policy. Revision. Final report

    SciTech Connect

    Not Available

    1986-03-01

    This essay is intended to survey the basic framework within which the United States will make national security decisions in the year 2010, focusing especially on American orientation toward the Atlantic (Europe) or the Pacific (Asia). Such a task for projecting the international environment some 30 years into the future is an intrinsically speculative intellectual exercise. The idea of this essay is that the existing international environment will more likely than not continue to be the pattern in 2010 -- primarily because of the constraints established by the existence of nuclear weapons and the probable continuance of the U.S.-Soviet rivalry as the central factor in world politics. This suggests that the relative importance the United States has given to the Atlantic/Europe and the Pacific/Asia since 1945 will not shift dramatically. Section III then examines circumstances that might bring about a significant change or revolution in world politics by 2010, and the impact that this situation might have on the Atlantic-Pacific equation. This situation has two important implications for the US Navy and the associated U.S. power-projection forces. First, in terms of their contribution to the central U.S. alliance system, they should develop the followthrough for the defeat of the Red Fleet that will remain their overriding objective. Second, in terms of its contribution to the peripheral U.S. alliance system, the USN should refine its ability to fight and win limited conflicts.

  19. 33 CFR 106.135 - Alternative Security Program.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Alternative Security Program. 106.135 Section 106.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.135...

  20. 6 CFR 27.235 - Alternative security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... facilities may submit an Alternate Security Program (ASP) pursuant to the requirements of this section. The... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1, Tier 2, or Tier 3 facilities may submit an ASP in lieu of a Site Security Plan. Tier 1, Tier 2,...

  1. 6 CFR 27.235 - Alternative security program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... facilities may submit an Alternate Security Program (ASP) pursuant to the requirements of this section. The... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1, Tier 2, or Tier 3 facilities may submit an ASP in lieu of a Site Security Plan. Tier 1, Tier 2,...

  2. 6 CFR 27.235 - Alternative security program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... facilities may submit an Alternate Security Program (ASP) pursuant to the requirements of this section. The... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1, Tier 2, or Tier 3 facilities may submit an ASP in lieu of a Site Security Plan. Tier 1, Tier 2,...

  3. 6 CFR 27.235 - Alternative security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... facilities may submit an Alternate Security Program (ASP) pursuant to the requirements of this section. The... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1, Tier 2, or Tier 3 facilities may submit an ASP in lieu of a Site Security Plan. Tier 1, Tier 2,...

  4. 6 CFR 27.235 - Alternative security program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... facilities may submit an Alternate Security Program (ASP) pursuant to the requirements of this section. The... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1, Tier 2, or Tier 3 facilities may submit an ASP in lieu of a Site Security Plan. Tier 1, Tier 2,...

  5. 33 CFR 101.125 - Approved Alternative Security Programs.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Approved Alternative Security Programs. 101.125 Section 101.125 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.125 Approved Alternative...

  6. 33 CFR 106.135 - Alternative Security Program.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Alternative Security Program. 106.135 Section 106.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.135...

  7. 33 CFR 106.135 - Alternative Security Program.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Alternative Security Program. 106.135 Section 106.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.135...

  8. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... System DEPARTMENT OF COMMERCE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of... prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National... favorable results. No national security material or documents shall be removed from a Department of...

  9. The Supplemental Security Income Program and Employment for Young Adults with Disabilities: An Analysis of the National Health Interview Survey on Disability.

    ERIC Educational Resources Information Center

    Berry, Hugh G.

    2000-01-01

    A study of 1,640 adults (ages 18-29) with disabilities examined factors associated with employment outcomes. Several factors were significantly associated with employment outcomes, including the following: gender, race, family income, educational attainment, activity limitation, health status, hospitalization, and Supplemental Security Income…

  10. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security awareness training programs. 1552.23... School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight... awareness training in accordance with this subpart; and (2) If an instructor is conducting the...

  11. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security awareness training programs. 1552.23... School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight... awareness training in accordance with this subpart; and (2) If an instructor is conducting the...

  12. 7 CFR 772.7 - Leasing minor program loan security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan security. (a) Eligibility. The Agency may consent to the borrower leasing all or a portion of...

  13. National Kidney Disease Education Program

    MedlinePlus

    ... online catalog . Alternate Language URL National Kidney Disease Education Program (NKDEP) Page Content Improving the understanding, detection, ... Care Promoting Patient Self Management CKD and Nutrition​​ Training for CDEs, RDs, and PharmDs Laboratory Eva​luation ...

  14. National Hansen's Disease (Leprosy) Program

    MedlinePlus

    ... its facility at the Ochsner Medical Center in Baton Rouge. Oversees an ambulatory care network with clinics throughout ... National Hansen's Disease Programs 1770 Physicians Park Drive Baton Rouge, Louisiana 70816 1-800-642-2477 Online Courses ...

  15. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  16. A deeper look at climate change and national security.

    SciTech Connect

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  17. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    SciTech Connect

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  18. ED security: a national telephone survey.

    PubMed

    Ellis, G L; Dehart, D A; Black, C; Gula, M J; Owens, A

    1994-03-01

    To determine current practices regarding security measures in the emergency department (ED), a random sample of 250 hospitals with EDs was surveyed by telephone. Security issues addressed included personnel (in-house security, contract guards, or police), hours of staffing in the ED, how security is armed, whether ED doors are locked at off-hours, and whether alarm buttons, direct phone lines, a paging code, closed circuit surveillance, metal detectors, and seclusion rooms are used. This information was stratified according to hospital size, ED census, rural/suburban/urban setting, teaching/nonteaching status, and region. Generally, on-site security presence increases with increasing hospital size and ED census, suburban and urban locations, and teaching status. Small, rural hospitals are more likely to lock the ED doors at off-hours, whereas the use of security codes does not clearly follow demographic trends. Larger hospitals in suburban and urban settings and having a teaching status are more likely to have secure/detention rooms and closed circuit surveillance. The use of alarm buttons and/or direct telephone lines varies widely, but is generally more common in larger, teaching hospitals, located in urban and suburban settings.

  19. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security information introduced into proceedings. Except as...

  20. Expansion of National Security Agency Oversight Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. 76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-21

    ... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs.... SUMMARY: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD),...

  2. Environmental Programs at Los Alamos National Laboratory

    SciTech Connect

    Jones, Patricia

    2012-07-11

    Summary of this project is: (1) Teamwork, partnering to meet goals - (a) Building on cleanup successes, (b) Solving legacy waste problems, (c) Protecting the area's environment; (2) Strong performance over the past three years - (a) Credibility from four successful Recovery Act Projects, (b) Met all Consent Order milestones, (c) Successful ramp-up of TRU program; (3) Partnership between the National Nuclear Security Administration's Los Alamos Site Office, DOE Carlsbad Field Office, New Mexico Environment Department, and contractor staff enables unprecedented cleanup progress; (4) Continued focus on protecting water resources; and (5) All consent order commitments delivered on time or ahead of schedule.

  3. Composing Alternatives to a National Security Language Policy

    ERIC Educational Resources Information Center

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  4. The Curious National Security Pendulum: Openness and/or Censorship.

    ERIC Educational Resources Information Center

    Marwick, Christine M.

    1979-01-01

    Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)

  5. 75 FR 22151 - National Maritime Security Advisory Committee; Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-27

    ....homeport.uscg.mil under Missions>Maritime Security>National Maritime Security Advisory Committee>Member... serve an additional term of office but must re-apply in accordance with this notice. Applicants with... the mission of the Coast Guard. If you are selected as a non-representative member, or as a member...

  6. A National Partnership for Careers in Public Safety and Security

    ERIC Educational Resources Information Center

    Coffee, Joseph

    2007-01-01

    A partnership of state, local and federal public safety agencies, secondary and postsecondary educational institutions, and professional and educational associations, the National Partnership for Careers in Law, Public Safety, Corrections and Security also serves as the lead organization for the Law, Public Safety, Corrections and Security Career…

  7. The Superpowers: Nuclear Weapons and National Security. Teacher's Guide. National Issues Forums in the Classroom.

    ERIC Educational Resources Information Center

    Levy, Tedd

    This teacher's guide is designed to accompany the National Issues Forums'"The Superpowers: Nuclear Weapons and National Security." Activities and ideas are provided to challenge students to debate and discuss the United States-Soviet related issues of nuclear weapons and national security. The guide is divided into sections that describe: (1)…

  8. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... statement “THIS ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1042.635.”. [73 FR 37243, June 30..., specialized electronic warfare systems, unique stealth performance requirements, and/or unique...

  9. Analytical Chemistry for Homeland Defense and National Security

    SciTech Connect

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  10. Global water risks and national security: Building resilience (Invited)

    NASA Astrophysics Data System (ADS)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  11. Y-12 Groundwater Protection Program Calendar Year 2000 Groundwater Monitoring Data Evaluation Report for the Chestnut Ridge Hydrogeologic Regime at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    2001-09-01

    This report presents an evaluation of the groundwater and surface water monitoring data obtained during calendar year (CY) 2000 from sampling locations in the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Chestnut Ridge Regime encompasses several hazardous and nonhazardous waste management facilities associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) southeast of Oak Ridge, Tennessee (Figure A.1). Prepared by the Y-12 Groundwater Protection Program (GWPP), this monitoring data evaluation report addresses applicable provisions of DOE Order 5400.1 -- General Environmental Protection Program -- that require: (1) an evaluation of the quantity and quality of groundwater in areas that are, or could be, impacted by Y-12 operations, (2) an evaluation of the quality of surface water and groundwater where contaminants from Y-12 facilities are most likely to migrate beyond the DOE Oak Ridge Reservation (ORR) property line, and (3) an evaluation of long-term trends in groundwater quality at Y-12. The following sections of this report contain relevant background information (Section 2.0); describe the results of the respective data evaluations required under DOE Order 5400.1 (Section 3.0); summarize significant findings of each evaluation (Section 4.0); and list the technical reports and regulatory documents cited for more detailed information (Section 5.0). Illustrations (maps and trend graphs) and data summary tables referenced in each section are presented in Appendix A and Appendix B, respectively.

  12. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... segregation and marking of such securities and investments may be accomplished by putting them in separate... of the examination, shall be attached to a completed Form N-17f-1 (17 CFR 274.219) and transmitted to... a member of a national securities exchange of any obligation under existing law or under the...

  13. 10 CFR 37.43 - General security program requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... overall security strategy to ensure the integrated and effective functioning of the security program required by this subpart. The security plan must, at a minimum: (i) Describe the measures and strategies... lessons learned; (iii) Relevant results of NRC inspections; and (iv) Relevant results of the...

  14. The importance of establishing a national health security preparedness index.

    PubMed

    Lumpkin, John R; Miller, Yoon K; Inglesby, Tom; Links, Jonathan M; Schwartz, Angela T; Slemp, Catherine C; Burhans, Robert L; Blumenstock, James; Khan, Ali S

    2013-03-01

    Natural disasters, infectious disease epidemics, terrorism, and major events like the nuclear incident at Fukushima all pose major potential challenges to public health and security. Events such as the anthrax letters of 2001, Hurricanes Katrina, Irene, and Sandy, severe acute respiratory syndrome (SARS) and West Nile virus outbreaks, and the 2009 H1N1 influenza pandemic have demonstrated that public health, emergency management, and national security efforts are interconnected. These and other events have increased the national resolve and the resources committed to improving the national health security infrastructure. However, as fiscal pressures force federal, state, and local governments to examine spending, there is a growing need to demonstrate both what the investment in public health preparedness has bought and where gaps remain in our nation's health security. To address these needs, the Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (PHPR), is creating an annual measure of health security and preparedness at the national and state levels: the National Health Security Preparedness Index (NHSPI). PMID:23506403

  15. The importance of establishing a national health security preparedness index.

    PubMed

    Lumpkin, John R; Miller, Yoon K; Inglesby, Tom; Links, Jonathan M; Schwartz, Angela T; Slemp, Catherine C; Burhans, Robert L; Blumenstock, James; Khan, Ali S

    2013-03-01

    Natural disasters, infectious disease epidemics, terrorism, and major events like the nuclear incident at Fukushima all pose major potential challenges to public health and security. Events such as the anthrax letters of 2001, Hurricanes Katrina, Irene, and Sandy, severe acute respiratory syndrome (SARS) and West Nile virus outbreaks, and the 2009 H1N1 influenza pandemic have demonstrated that public health, emergency management, and national security efforts are interconnected. These and other events have increased the national resolve and the resources committed to improving the national health security infrastructure. However, as fiscal pressures force federal, state, and local governments to examine spending, there is a growing need to demonstrate both what the investment in public health preparedness has bought and where gaps remain in our nation's health security. To address these needs, the Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (PHPR), is creating an annual measure of health security and preparedness at the national and state levels: the National Health Security Preparedness Index (NHSPI).

  16. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect

    2009-10-01

    defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to

  17. Swords into plowshares: Military geology and national security projects

    SciTech Connect

    Neal, J.T.

    1994-12-31

    Military geology and national security projects are often comparable, achieving their rai-son d`etre in support of national goals, military operations, and/or systems-all for vital national interests. The application of Geoscience to these ends, especially engineering geology, has occurred from pole to pole and included every conceivable environment and natural condition. In the conduct of such projects, the Geosciences have advanced, and vice versa. Desert trafficability, most notably regarding playa surfaces, is both temporary and variable and not a persistent condition as some early authors believed. Playas in Australia, Iran, and the US show that saline efflorescence is removed following surface water dissolution and subsequent deflation, resulting in very hard crusts. Magadiite, a hydrous sodium silicate and possible precursor of bedded chert, was first discovered in North America at Alkali Lake, OR, during a military project. Pleistocene Lake Trinity, a small and mostly buried evaporate basin in the northern Jornada del Muerto, NM, was discovered during exploratory drilling in support of a military test program.

  18. 76 FR 2700 - National Protection and Programs Directorate; National Emergency Communications Plan (NECP) Goal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-14

    ... SECURITY National Protection and Programs Directorate; National Emergency Communications Plan (NECP) Goal 2... Communications (CS&C)/Office of Emergency Communications (OEC) will submit the following Information Collection... March 15, 2011. This process is conducted in accordance with 5 CFR Part 1320. ADDRESSES:...

  19. Personnel Security Assurance Program: Profile From 1992 through 2000

    SciTech Connect

    Center for Human Reliability Studies

    2001-05-01

    The Personnel Security Assurance Program (PSAP) was initiated to ensure that individuals employed in certain positions in the Department of Energy (DOE) meet and maintain high standards of reliability and trustworthiness. The positions included in the PSAP fall into three groups: (1) positions that provide direct access to, or have direct responsibility for transporting, category I quantities of special nuclear material; (2) positions that afford unescorted access to the control areas of nuclear material production reactors; and (3) positions having the potential for causing unacceptable damage to national security. Although individuals in the PSAP are subject to the customary access authorization criteria, the program establishes a more intensive and frequent review process for maintaining PSAP access authorizations. This report presents information from 1992 through 2000, both overall and stratified by DOE site, on individuals removed from the PSAP. Only a small percentage of removals (generally less than 5% per year) were caused by actions on the part of program participants that brought into question their loyalty, trustworthiness, or reliability. Most removals were due to administrative reasons, such as employees retiring, paperwork delays, or positions being reclassified due to change in scope. In this report the term ''reliability issues'' will be used for causes of removal that are based on derogatory issues delineated in Title 10 Code of Federal Regulations, Part 710 (10 CFR, Part 710), and ''non-reliability issues'' will refer to all other sources for removal of employees from PSAP.

  20. Classified Component Disposal at the Nevada National Security Site

    SciTech Connect

    Poling, J.; Arnold, P.; Saad, M.; DiSanza, F.; Cabble, K.

    2012-11-05

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012.

  1. Disposal Activities and the Unique Waste Streams at the Nevada National Security Site (NNSS)

    SciTech Connect

    Arnold, P.

    2012-10-31

    This slide show documents waste disposal at the Nevada National Security Site. Topics covered include: radionuclide requirements for waste disposal; approved performance assessment (PA) for depleted uranium disposal; requirements; program approval; the Waste Acceptance Review Panel (WARP); description of the Radioactive Waste Acceptance Program (RWAP); facility evaluation; recent program accomplishments, nuclear facility safety changes; higher-activity waste stream disposal; and, large volume bulk waste streams.

  2. DOE National Rideshare Program Plan

    SciTech Connect

    Southworth, F.

    1985-05-01

    This document describes a three-year plan, as developed for the US DOE National Rideshare Program: a research and technology transfer program with the goal of encouraging more commuters to share their vehicles when traveling to and from work. The Plan is the result of an extensive nationwide review of current ridesharing benefits, barriers and activities, and describes an approach to: educating the nation's upper and middle management to the benefits of company-based carpooling and vanpooling, and to promoting the energy and financial benefits of capital investment in rideshare enhancing facilities. The Plan emphasized the means for collecting the information necessary to a successful rideshare marketing campaign, as well as the lines of communication through which the program's research findings will be disseminated.

  3. An Innovative Community College Program and Partnership in Information Security.

    ERIC Educational Resources Information Center

    Howard, Barbara C; Morneau, Keith A.

    This report describes an innovative network security program initiated by Northern Virginia Community College and funded with a grant from the Northern Virginia Regional Partnership. The program educates and trains students in the instillation, configuration, and troubleshooting of the hardware and software infrastructure of information security.…

  4. 5 CFR 1312.12 - Security Program Review Committee.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security Program Review Committee. 1312.12 Section 1312.12 Administrative Personnel OFFICE OF MANAGEMENT AND BUDGET OMB DIRECTIVES... Committee, which will act on suggestions and complaints about the OMB security program....

  5. 78 FR 51192 - Secure Supply Chain Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-20

    ... HUMAN SERVICES Food and Drug Administration Secure Supply Chain Pilot Program AGENCY: Food and Drug Administration, HHS. ACTION: Notice. SUMMARY: The Food and Drug Administration (FDA or the Agency) is announcing the start of the Secure Supply Chain Pilot Program (SSCPP). The SSCPP is intended to assist FDA in...

  6. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false National security-classified information. 1256.46 Section 1256.46 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE ACCESS TO RECORDS AND DONATED HISTORICAL MATERIALS...

  7. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    SciTech Connect

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon sequestration

  8. Purdue University graduate certificate program in Veterinary Homeland Security.

    PubMed

    Amass, Sandra F; Blossom, Thaddaeus D; Ash, Marianne; McCay, Don; Mattix, Marc E

    2008-01-01

    Our nation lacks a critical mass of professionals trained to prevent and respond to food- and animal-related emergencies. Training veterinarians provides an immediate means of addressing this shortage of experts. Achievement of critical mass to effectively address animal-related emergencies is expedited by concurrent training of professionals and graduate students in related areas. Purdue University offers a Web-based Graduate Certificate in Veterinary Homeland Security to address this special area of need. The program is a collaborative effort among the Purdue University School of Veterinary Medicine, the Purdue Homeland Security Institute, the Indiana State Board of Animal Health, the Indiana State Police, and others with the overall goal of increasing capacity and preparedness to manage animal-related emergencies. Individuals with expertise in veterinary medicine, public health, animal science, or homeland security are encouraged to participate. The Web-based system allows courses to be delivered efficiently and effectively around the world and allows participants to continue their graduate education while maintaining full-time jobs. Participants enhance their understanding of natural and intentional threats to animal health, strengthen their skills in managing animal-health emergencies, and develop problem-solving expertise to become effective members of animal emergency response teams and of their communities. Students receive graduate credit from Purdue University that can be used toward the certificate and toward an advanced graduate degree. Currently, 70 participants from 28 states; Washington, DC; Singapore; and Bermuda are enrolled. PMID:18723810

  9. Purdue University graduate certificate program in Veterinary Homeland Security.

    PubMed

    Amass, Sandra F; Blossom, Thaddaeus D; Ash, Marianne; McCay, Don; Mattix, Marc E

    2008-01-01

    Our nation lacks a critical mass of professionals trained to prevent and respond to food- and animal-related emergencies. Training veterinarians provides an immediate means of addressing this shortage of experts. Achievement of critical mass to effectively address animal-related emergencies is expedited by concurrent training of professionals and graduate students in related areas. Purdue University offers a Web-based Graduate Certificate in Veterinary Homeland Security to address this special area of need. The program is a collaborative effort among the Purdue University School of Veterinary Medicine, the Purdue Homeland Security Institute, the Indiana State Board of Animal Health, the Indiana State Police, and others with the overall goal of increasing capacity and preparedness to manage animal-related emergencies. Individuals with expertise in veterinary medicine, public health, animal science, or homeland security are encouraged to participate. The Web-based system allows courses to be delivered efficiently and effectively around the world and allows participants to continue their graduate education while maintaining full-time jobs. Participants enhance their understanding of natural and intentional threats to animal health, strengthen their skills in managing animal-health emergencies, and develop problem-solving expertise to become effective members of animal emergency response teams and of their communities. Students receive graduate credit from Purdue University that can be used toward the certificate and toward an advanced graduate degree. Currently, 70 participants from 28 states; Washington, DC; Singapore; and Bermuda are enrolled.

  10. Risk assessment of climate systems for national security.

    SciTech Connect

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  11. 75 FR 417 - National Protection and Programs Directorate; Statewide Communication Interoperability Plan...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ... SECURITY National Protection and Programs Directorate; Statewide Communication Interoperability Plan...: Statewide Communication Interoperability Plan Implementation Report. Form: Not Applicable. OMB Number: 1670... Emergency Communications Grant Program (IECGP) (6 U.S.C. 579) comply with the Statewide...

  12. 10 CFR 784.6 - National security considerations for waiver of certain sensitive inventions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security considerations for waiver of certain sensitive inventions. 784.6 Section 784.6 Energy DEPARTMENT OF ENERGY PATENT WAIVER REGULATION § 784.6... nuclear weapons programs or other atomic energy defense activities of the Department of Energy,...

  13. 10 CFR 784.6 - National security considerations for waiver of certain sensitive inventions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security considerations for waiver of certain sensitive inventions. 784.6 Section 784.6 Energy DEPARTMENT OF ENERGY PATENT WAIVER REGULATION § 784.6... nuclear weapons programs or other atomic energy defense activities of the Department of Energy,...

  14. Lawrence Livermore National Laboratory safeguards and security quarterly progress report to the US Department of Energy quarter ending September 30, 1994

    SciTech Connect

    Davis, G.; Mansur, D.L.; Ruhter, W.D.; Steele, E.; Strait, R.S.

    1994-10-01

    This report presents the details of the Lawrence Livermore National Laboratory safeguards and securities program. This program is focused on developing new technology, such as x- and gamma-ray spectrometry, for measurement of special nuclear materials. This program supports the Office of Safeguards and Securities in the following five areas; safeguards technology, safeguards and decision support, computer security, automated physical security, and automated visitor access control systems.

  15. 7 CFR 772.7 - Leasing minor program loan security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Leasing minor program loan security. 772.7 Section 772.7 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program...

  16. 12 CFR 168.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., or larceny committed against the association; (3) Provide for initial and periodic training of... law enforcement officers of an attempted or perpetrated robbery or burglary; and (5) Such other... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in...

  17. 12 CFR 568.3 - Security program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., or larceny committed against the association; (3) Provide for initial and periodic training of... law enforcement officers of an attempted or perpetrated robbery or burglary; and (5) Such other... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in...

  18. 12 CFR 568.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., or larceny committed against the association; (3) Provide for initial and periodic training of... law enforcement officers of an attempted or perpetrated robbery or burglary; and (5) Such other... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in...

  19. 12 CFR 168.3 - Security program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., or larceny committed against the association; (3) Provide for initial and periodic training of... law enforcement officers of an attempted or perpetrated robbery or burglary; and (5) Such other... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in...

  20. Y-12 Groundwater Protection Program Calendar Year 2000 Groundwater Monitoring Data Evaluation Report for the Bear Creek Hydrogeologic Regime at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    2001-09-01

    This report presents an evaluation of the groundwater and surface water monitoring data obtained during calendar year (CY) 2000 in the Bear Creek Hydrogeologic Regime (Bear Creek Regime). The Bear Creek Regime encompasses many confirmed and potential sources of groundwater and surface water contamination associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) in Oak Ridge, Tennessee (Figure A.1). Prepared by the Y-12 Groundwater Protection Program (GWPP), this report addresses applicable provisions of DOE Order 5400.1 (General Environmental Protection Program) that require: (1) an evaluation of the quantity and quality of groundwater and surface water in areas that are, or could be, affected by Y-12 operations, (2) an evaluation of groundwater and surface water quality in areas where contaminants from Y-12 operations are most likely to migrate beyond the DOE Oak Ridge Reservation (ORR) property line, and (3) an evaluation of long-term trends in groundwater quality at Y-12. The following sections of this report contain relevant background information (Section 2.0); describe the results of the respective data evaluations required under DOE Order 5400.1 (Section 3.0); summarize significant findings of each evaluation (Section 4.0); and list the technical reports and regulatory documents cited for more detailed information (Section 5.0). Illustrations (maps and trend graphs) are presented in Appendix A. Brief data summary tables referenced in each section are contained within the sections. Supplemental information and extensive data tables are provided in Appendix B.

  1. 77 FR 19970 - Security Zones; 2012 Republican National Convention, Captain of the Port St. Petersburg Zone...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-03

    ... Convention as a National Special Security Event. National Special Security Events are significant events... Republican National Convention as a National Special Security Event. The security zones are necessary to..., 2008, issue of the Federal Register (73 FR 3316). Public Meeting We do not anticipate convening...

  2. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy... achieve national health security and to implement the first quadrennial National Health Security Strategy... the National Health Security Strategy of the United States of America (2009) the U.S. Government...

  3. National Aerospace Plane (NASP) program

    NASA Technical Reports Server (NTRS)

    1990-01-01

    Artists concept of the X-30 aerospace plane flying through Earth's atmosphere on its way to low-Earth orbit. the experimental concept is part of the National Aero-Space Plane Program. The X-30 is planned to demonstrate the technology for airbreathing space launch and hypersonic cruise vehicles. Photograph and caption published in Winds of Change, 75th Anniversary NASA publication (page 117), by James Schultz.

  4. Neutron Detection Alternatives to 3He for National Security Applications

    SciTech Connect

    Kouzes, Richard T.; Ely, James H.; Erikson, Luke E.; Kernan, Warnick J.; Lintereur, Azaree T.; Siciliano, Edward R.; Stephens, Daniel L.; Stromswold, David C.; Van Ginhoven, Renee M.; Woodring, Mitchell L.

    2010-11-21

    One of the main uses for 3He is in gas proportional counters for neutron detection. Large radiation detection systems deployed for homeland security and proliferation detection applications use such systems. Due to the large increase in use of 3He for homeland security and basic research, the supply has dwindled, and can no longer meet the demand. This has led to the search for an alternative technology to replace the use of 3He-based neutron detectors. In this paper, we review the testing of currently commercially available alternative technologies for neutron detection in large systems used in various national security applications.

  5. 76 FR 81359 - National Security Personnel System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ... issued on November 1, 2005 (70 FR 66116). The NSPS law was subsequently amended by section 1106 of Public... amendments resulted in revised DOD/OPM regulations, which were issued on September 26, 2008 (73 FR 56344) and January 16, 2009 (74 FR 2757). Section 1113 of the National Defense Authorization Act for Fiscal Year...

  6. A review of physical security robotics at Sandia National Laboratories

    SciTech Connect

    Roerig, S.C.

    1990-01-01

    As an outgrowth of research into physical security technologies, Sandia is investigating the role of robotics in security systems. Robotics may allow more effective utilization of guard forces, especially in scenarios where personnel would be exposed to harmful environments. Robots can provide intrusion detection and assessment functions for failed sensors or transient assets, can test existing fixed site sensors, and can gather additional intelligence and dispense delaying elements. The Robotic Security Vehicle (RSV) program for DOE/OSS is developing a fieldable prototype for an exterior physical security robot based upon a commercial four wheel drive vehicle. The RSV will be capable of driving itself, being driven remotely, or being driven by an onboard operator around a site and will utilize its sensors to alert an operator to unusual conditions. The Remote Security Station (RSS) program for the Defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior security systems. The RSS consists of an independent sensor pod, a mobile sensor platform and a control and display console. Sensor data fusion is used to optimize the system's intrusion detection performance. These programs are complementary, the RSV concentrates on developing autonomous mobility, while the RSS thrust is on mobile sensor employment. 3 figs.

  7. The Intersection of National Security and Climate Change

    SciTech Connect

    Hund, Gretchen; Fankhauser, Jana G.; Kurzrok, Andrew J.; Sandusky, Jessica A.

    2014-07-29

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  8. Implementing the global health security agenda: lessons from global health and security programs.

    PubMed

    Paranjape, Suman M; Franz, David R

    2015-01-01

    The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.

  9. 75 FR 26171 - Cyber Security Certification Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-11

    ... the Commission has sought to motivate industry to adopt effective cyber security measures has been... how the criteria could be structured to reward greater transparency among service providers so...

  10. U.S. national security through global technical engagement presentation to composite group A : homeland and international operations.

    SciTech Connect

    Abeyta, Henry J.

    2010-05-01

    This talk will discuss Sandia's Global Security Program focused on reducing proliferation and terrorism threats to U.S. national security through global technical engagement. Elements include nuclear and radiological risks, biological and chemical risks, and multi-threat risk reduction. Also, recent work addressing the need to better integrate nonproliferation, arms control, counterterrorism, and nuclear deterrent objectives will be discussed.

  11. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  12. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  13. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  14. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  15. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  16. 17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Bond transactions on national securities exchanges. 240.11a1-4(T) Section 240.11a1-4(T) Commodity and Securities Exchanges SECURITIES AND....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note,...

  17. The Westinghouse Hanford Company Unclassified Computer Security Program

    SciTech Connect

    Gurth, R.J.

    1994-02-01

    This paper describes the evolution of the Westinghouse Hanford Company (WHC) Unclassified Computer Security (UCS) Program over the past seven years. The intent has been to satisfy the requirements included in the DOE Order 1360.2B (DOE 1992) for Unclassified Computer Security in the most efficient and cost-effective manner.

  18. Origin and development of the port security program. Staff study report (Final)

    SciTech Connect

    Bryant, D.L.

    1986-05-01

    The study explores the authorities exercised in the U.S. port security program, particularly as they relate to wars, national emergencies, and the transfer of the Coast Guard to the Navy under such circumstances. The Coast Guard has been responsible for the port security of the United States since the program came into being in 1917. It performed those duties during both World War I and World War II, when it was operating as a service in the Navy. In 1950, port security was made a permanent program, and the duties were assigned to the Coast Guard. Current statutes now insure that port security functions and powers shift from the Department of Transportation to the Department of the Navy simultaneously with the transfer of the Coast Guard.

  19. 77 FR 41688 - Security Zones; 2012 Republican National Convention, Captain of the Port St. Petersburg Zone...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-16

    ... National Special Security Event. National Special Security Events are significant events, which, due to... Convention as a National Special Security Event. The security zones are necessary to protect convention..., FL in the Federal Register (77 FR 64). We received one comment on the proposed rule. Public...

  20. Identifying the Enemy: Social Categorization and National Security Policy

    ERIC Educational Resources Information Center

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  1. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... effectively coordinated; (2) Develop, enforce, and supervise the application of all federal criminal laws... as appropriate, to Government agencies on matters of national security law and policy; (6) Administer... and law; (11) Formulate policy alternatives and recommend action by the Department and other...

  2. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... maneuverability requirements. This applies to both remanufactured and freshly manufactured marine engines. Gas turbine engines are also exempt without a request if they will be owned by an agency of the Federal... ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1042.635.”....

  3. The National Security Language Initiative and the Teaching of Hindi

    ERIC Educational Resources Information Center

    Shinge, Manjula

    2008-01-01

    This article discusses the teaching of Hindi in the USA, with special reference to the National Security Language Initiative (NSLI). Asian Indian languages are briefly described, as are the growth and diversification of the Asian Indian population in the USA. The inclusion of Hindi in the NSLI, and the implications of this decision for the…

  4. Academics and National-Security Experts Must Work Together

    ERIC Educational Resources Information Center

    Gansler, Jacques S.; Gast, Alice P.

    2008-01-01

    In the years since the September 11, 2001, terrorist attacks, the federal government's policies that deal with national security have changed significantly. In an effort to prevent the results of science and engineering research from being misused or falling into the wrong hands, government agencies that support studies are placing restrictions on…

  5. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  6. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  7. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  8. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  9. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  10. National Security and Information Technology: The New Regulatory Option?

    ERIC Educational Resources Information Center

    Irwin, Manley R.

    1987-01-01

    Summarizes recent developments in information technology research and development, telecommunication services, telephone manufacturing, telecommunication networks, information processing, and U.S. import/export policy. It is concluded that government regulation as a policy strategy depends on how one defines national security. (Author/CLB)

  11. Components of a Course on National Security Policy.

    ERIC Educational Resources Information Center

    Quester, George H.

    1987-01-01

    Describes the components of a course on the formation of national security policy. Includes information on the amount of emphasis and instructional approach to take with each component of the course. Components include the nature of strategy, the role of war in international politics, disarmament and arms control, nuclear weapons and nuclear war,…

  12. Achieving Youth Employment and National Security in Nigeria: TVET Imperatives

    ERIC Educational Resources Information Center

    Ogbuanya, T. C.; Ofonmbuk, Michael

    2015-01-01

    The rate of unemployment in Nigeria is alarming and could promote social vices some of which are kidnapping, armed robbery, child trafficking, Cultism, Drug peddling and ritual killing. These social vices could in no small measure constitute a threat to national security as a matter of fact. Therefore, the development of a workable Technical and…

  13. 76 FR 81827 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... Order, Classified National Security Information,'' 75 FR 733, 3 CFR, 2009 Comp., p. 412; 32 CFR Part...@nara.gov . ] SUPPLEMENTARY INFORMATION: On July 8, 2011, NARA published a proposed rule (76 FR 40296... without proper authority? Authority: 44 U.S.C. 2101 to 2118; 5 U.S.C. 552; E.O. 13526, 75 FR 707, 3...

  14. 75 FR 77783 - Designation of National Security Positions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-14

    ... classified information. For example, positions involving protection from terrorism have the potential to... include ``protecting the nation, its citizens and residents from acts of terrorism, espionage, or foreign...--Security Requirements for Government Employment (April 27, 1953), 18 FR 2489, 3 CFR 1949-1953 Comp., p....

  15. NNSA Program Develops the Next Generation of Nuclear Security Experts

    SciTech Connect

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  16. Space robotics programs at Sandia National Laboratories

    SciTech Connect

    Klarer, P.

    1993-01-01

    Existing robotic rover and space satellite technologies at Sandia National Laboratories (SNL), coupled with existing launch vehicles and converted military Multiple Independent Reentry Vehicle (MIRV) technologies, can be applied towards the realization of a robotic lunar rover mission in the near term. SNL`s Advanced Vehicle Development Department has been designing, producing, and operating prototype rover systems at the Robotic Vehicle Range facility since 1984, and has extensive experience with teleoperated and semiautonomous mobile robotic systems. SNL`s Space Systems Directorate has been designing, producing, and operating satellite systems and subsystems in earth orbit for national security missions since the early 1960`s. The facilities and robotic vehicle fleet at SNL`s Robotic Vehicle Range (SNL-RVR) have been used to support technology base development in applications ranging from DoD battlefield and security missions, to multi-agency nuclear emergency response team exercises and the development of a prototype robotic rover for planetary exploration. Recent activities at the SNL-RVR include the Robotic All Terrain Lunar Exploration Rover (RATLER) prototype development program, exploratory studies on a Near Term Lunar Return Mission scenario for small robotic rovers based on existing space hardware technology, and demonstrations of the utility of existing rover technologies for performing remote field geology tasks similar to those envisioned on a robotic lunar rover mission. Specific technologies demonstrated include low data rate teleoperation, multi-vehicle control, remote site and sample inspection, and standard bandwidth stereo vision. The paper describes Sandia National Laboratories` activities in the Space Robotics area, and highlights the laboratory`s supporting technical capabilities.

  17. Department of Energy award DE-SC0004164 Climate and National Security: Securing Better Forecasts

    SciTech Connect

    Reno Harnish

    2011-08-16

    The Climate and National Security: Securing Better Forecasts symposium was attended by senior policy makers and distinguished scientists. The juxtaposition of these communities was creative and fruitful. They acknowledged they were speaking past each other. Scientists were urged to tell policy makers about even improbable outcomes while articulating clearly the uncertainties around the outcomes. As one policy maker put it, we are accustomed to making these types of decisions. These points were captured clearly in an article that appeared on the New York Times website and can be found with other conference materials most easily on our website, www.scripps.ucsd.edu/cens/. The symposium, generously supported by the NOAA/JIMO, benefitted the public by promoting scientifically informed decision making and by the transmission of objective information regarding climate change and national security.

  18. 44 CFR Appendix B to Part 62 - National Flood Insurance Program

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 44 Emergency Management and Assistance 1 2011-10-01 2011-10-01 false National Flood Insurance..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program SALE OF INSURANCE AND ADJUSTMENT OF CLAIMS Pt. 62, App. B Appendix B to Part 62—National Flood Insurance Program...

  19. 44 CFR Appendix B to Part 62 - National Flood Insurance Program

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 44 Emergency Management and Assistance 1 2014-10-01 2014-10-01 false National Flood Insurance..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program SALE OF INSURANCE AND ADJUSTMENT OF CLAIMS Pt. 62, App. B Appendix B to Part 62—National Flood Insurance Program...

  20. 44 CFR Appendix B to Part 62 - National Flood Insurance Program

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 44 Emergency Management and Assistance 1 2013-10-01 2013-10-01 false National Flood Insurance..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program SALE OF INSURANCE AND ADJUSTMENT OF CLAIMS Pt. 62, App. B Appendix B to Part 62—National Flood Insurance Program...

  1. 44 CFR Appendix B to Part 62 - National Flood Insurance Program

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 44 Emergency Management and Assistance 1 2012-10-01 2011-10-01 true National Flood Insurance..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program SALE OF INSURANCE AND ADJUSTMENT OF CLAIMS Pt. 62, App. B Appendix B to Part 62—National Flood Insurance Program...

  2. 78 FR 48076 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... National Security Information and Restricted Data AGENCY: Nuclear Regulatory Commission. ACTION: Proposed... INFORMATION AND RESTRICTED DATA 0 1. The authority citation for part 95 continues to read as follows... Information (75 FR 707; January 5, 2010), before derivatively classifying information and at least once...

  3. 78 FR 69286 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... Information and Restricted Data AGENCY: Nuclear Regulatory Commission. ACTION: Direct final rule; confirmation...; telephone: 301-415-3501; email: Daniel.Lenehan@nrc.gov . SUPPLEMENTARY INFORMATION: On August 7, 2013 (78 FR..., Classified National Security Information. In addition, this direct final rule allowed licensees...

  4. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    ERIC Educational Resources Information Center

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  5. 49 CFR 1546.105 - Acceptance of and amendments to the security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.105 Acceptance of and amendments to the security program. (a... 49 Transportation 9 2013-10-01 2013-10-01 false Acceptance of and amendments to the...

  6. 49 CFR 1546.105 - Acceptance of and amendments to the security program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.105 Acceptance of and amendments to the security program. (a... 49 Transportation 9 2014-10-01 2014-10-01 false Acceptance of and amendments to the...

  7. 49 CFR 1546.103 - Form, content, and availability of security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a... 49 Transportation 9 2013-10-01 2013-10-01 false Form, content, and availability of...

  8. 49 CFR 1546.103 - Form, content, and availability of security program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a... 49 Transportation 9 2014-10-01 2014-10-01 false Form, content, and availability of...

  9. National Security Letters, the USA PATRIOT Act, and the Constitution: The Tensions between National Security and Civil Rights

    ERIC Educational Resources Information Center

    Gorham-Oscilowski, Ursula; Jaeger, Paul T.

    2008-01-01

    In response to the terrorist attacks of 9/11, the USA PATRIOT Act greatly expanded the ability of the Federal Bureau of Investigation to use National Security Letters (NSLs) in investigations and the contexts in which they could be used by relaxing the standards under which NSLs could be employed. NSLs allow investigators to acquire a significant…

  10. 78 FR 46256 - Security Program, Report of Suspected Crimes, Suspicious Transactions, Catastrophic Acts and Bank...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office NATIONAL CREDIT UNION ADMINISTRATION 12 CFR Part 748 Security Program, Report of Suspected Crimes, Suspicious Transactions, Catastrophic Acts and Bank Secrecy Act Compliance CFR Correction In Title 12 of the Code of Federal...

  11. 78 FR 4393 - Applications for New Awards; Minorities and Retirement Security Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-22

    ... SOCIAL SECURITY ADMINISTRATION Applications for New Awards; Minorities and Retirement Security Program... Policy, Social Security Administration. ACTION: Notice. Overview Information: Minorities and Retirement... Education (ED or the Department) and the United States Social Security Administration (SSA). The MRS...

  12. National space program in Australia

    NASA Astrophysics Data System (ADS)

    Brennan, G. M.

    1992-11-01

    An overview of the Australian space activity history and present status is presented in the following aspects: (1) full-scale space activities since the establishment of the Australian Space Board in 1987 and the start of governmental budgetary support to national space program; (2) cooperation with NASA and ESA through satellite ground stations in satellite communication and ground support; (3) Australian private enterprises contract to provide launch support for INTERSAT and other satellites and schedule to start mobile satellite communication all over the country; and (4) supporting the second ground station construction to facilitate acquisition of the southern Pacific Ocean data of the wide area covering from the end of Antarctic continent to the eastern end of New Zealand. The remote sensing equipment development, launch service business plan, present status of supersonic technology in Australia and Australian space policy are outlined.

  13. United States national security policy making and Vietnam

    SciTech Connect

    Davidson, M.W.

    1985-01-01

    The United States failed to achieve its goals in waging a war in Vietnam. This thesis endeavors to show that this failure was due to errors in the formulation of American national security policy regarding Vietnam. The policy making process went astray, at least in part, due to a narrowing of the role of senior military officers as national security policy makers. The restricted role of senior officers as national security policy makers adversely affected American policy formulation regarding Vietnam. The United States response to the coup against Diem in 1963 and the deployment of conventional American forces to ground combat in Vietnam, in 1965 were undertaken without a clear recognition of the considerable costs of the commitments being assumed. Senior military officers had prompted such a recognition in similar previous crises but were not in a policy making position to do so concerning Vietnam. The policymaking input that was absent was ethical counsel of a fundamental nature. Clausewitz viewed the mortality of a war as being embodied in the national will to fight that war. The absence of an accurate appreciation of the costs of a military solution in Vietnam denied civilian officials a critical policy making factor and contributed significantly to the defeat of the American purpose there.

  14. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level. PMID:25076773

  15. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level.

  16. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.25 Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... Information and/or Restricted Data depending upon the matter authorized to be stored in the security...

  17. A brief history of Sandia's National security missions.

    SciTech Connect

    Drewien, Celeste A.; O'Canna, Myra Lynn; Stikar, John Anthony.

    2014-09-01

    To help members of the workforce understand what factors contribute to Sandia National Laboratories national security mission, the authors describe the evolution of Sandias core mission and its other mission components. The mission of Sandia first as a division of Los Alamos and later as Sandia Corporation underlies our core nuclear weapon mission of today. Sandias mission changed in 1963 and twice more in the 1970s. This report should help staff and management appreciate the need for mission evolution. A clear definition and communication of a consistent corporate mission statement is still needed.

  18. Heavy Lift for National Security: The Ares V

    NASA Technical Reports Server (NTRS)

    Sumrall, Phil

    2009-01-01

    The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.

  19. A flexible framework for secure and efficient program obfuscation.

    SciTech Connect

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  20. 75 FR 9607 - National Protection and Programs Directorate; Guidance Document Request and Evaluation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-03

    ... SECURITY National Protection and Programs Directorate; Guidance Document Request and Evaluation AGENCY... guidance document request form and the guidance document evaluation form will help OEC stakeholders to... stakeholders. OEC will use the evaluation information for continuous improvement to its documents....

  1. 75 FR 9608 - National Protection and Programs Directorate; Technical Assistance Request and Evaluation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-03

    ... SECURITY National Protection and Programs Directorate; Technical Assistance Request and Evaluation AGENCY... territory. OEC will use the Technical Assistance Evaluation Form to support quality improvement of its technical assistance services. Registration forms will be submitted electronically. Evaluation forms may...

  2. 75 FR 21011 - National Protection and Programs Directorate; Statewide Communication Interoperability Plan...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-22

    ... SECURITY National Protection and Programs Directorate; Statewide Communication Interoperability Plan... concerning New Information Collection Request, Statewide Communication Interoperability Plan Implementation... January 5, 2010, at 75 FR 417, for a 60-day public comment period. DHS received no comments. The...

  3. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    SciTech Connect

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  4. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... the strength of our national economy and the capacity of the United States to meet national security... imports on the national security. 705.4 Section 705.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE...

  5. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the strength of our national economy and the capacity of the United States to meet national security... imports on the national security. 705.4 Section 705.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE...

  6. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data... Restricted Data or other National Security Information to the issues in the preceeding, and its...

  7. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice... Restricted Data or National Security Information into the proceeding, it will file a notice of intent...

  8. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data...

  9. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Protection of restricted data and national security... Special Procedures Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing...

  10. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Protection of restricted data and national security... Special Procedures Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing...

  11. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data...

  12. The Impact of Migration Processes on the National Security of Kazakhstan

    ERIC Educational Resources Information Center

    Korganova, Saipzhamal S.; Taubayeva, Mirash Y.; Sultanov, Serik A.; Rysbayeva, Saule Zh.; Sultanova, Valida I.; Zhumabekov, Madiyr U.; Raximshikova, Mavluda K.

    2016-01-01

    The purpose of this study is to analyze the impact of migration processes on the national security of Kazakhstan. However, it should be noted that national security is an expression of national interests and it is provided by means of resources and efforts of a particular state. Consequently, social security is an expression of the public…

  13. 78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... of the Secretary National Security Education Board; Notice of Federal Advisory Committee Meeting AGENCY: Under Secretary of Defense for Personnel and Readiness, Defense Language and National Security... following Federal advisory committee meeting of the National Security Education Board will take place....

  14. Repositioning Technical and Vocational Education and Training (TVET) for Youths Employment and National Security in Nigeria

    ERIC Educational Resources Information Center

    Ogbunaya, T. C.; Udoudo, Ekereobong S.

    2015-01-01

    The paper focused on repositioning Technical and Vocational Education and Training (TVET) for youth's employment and national security in Nigeria. It examined briefly the concepts of technical vocational education and training (TVET), youths, unemployment and national security as well as the effects of unemployment on national security in Nigeria.…

  15. Public perspectives on nuclear security. US national security surveys, 1993--1997

    SciTech Connect

    Herron, K.G.; Jenkins-Smith, H.C.

    1998-08-01

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  16. Oil market power and United States national security

    PubMed Central

    Stern, Roger

    2006-01-01

    It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt2004 collections by Persian Gulf states ≈ $132-178 × 109. We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded. PMID:16428291

  17. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security.

  18. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. PMID:22841592

  19. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    SciTech Connect

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  20. Literacy Program. National Issues Forums Special Report.

    ERIC Educational Resources Information Center

    National Issues Forums, Dayton, OH.

    In the spring of 1988, 33 representatives from 20 institutions or organizations sponsoring National Issues Forum (NIF) literacy programs attended a national conference in Washington, D.C. Throughout the conference, representatives from the organizations sponsoring NIF literacy programs made statements on the importance of NIF as a tool for…

  1. Supporting secure programming in web applications through interactive static analysis

    PubMed Central

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2013-01-01

    Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

  2. An Undergraduate Information Security Program: More than a Curriculum

    ERIC Educational Resources Information Center

    Woodward, Belle; Imboden, Thomas; Martin, Nancy L.

    2013-01-01

    This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…

  3. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES...

  4. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 3 2013-01-01 2013-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES...

  5. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 3 2014-01-01 2014-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES...

  6. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 3 2011-01-01 2011-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES...

  7. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 3 2012-01-01 2012-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES...

  8. Supporting secure programming in web applications through interactive static analysis.

    PubMed

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

  9. Supporting secure programming in web applications through interactive static analysis.

    PubMed

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  10. 78 FR 59706 - Secure Supply Chain Pilot Program; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-27

    ... HUMAN SERVICES Food and Drug Administration Secure Supply Chain Pilot Program; Correction AGENCY: Food and Drug Administration, HHS. ACTION: Notice; correction. SUMMARY: The Food and Drug Administration (FDA) is correcting a document that appeared in the Federal Register of August 20, 2013 (78 FR...

  11. 32 CFR 728.44 - Members of security assistance training programs, foreign military sales, and their ITO...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Members of security assistance training programs, foreign military sales, and their ITO authorized dependents. 728.44 Section 728.44 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL MEDICAL AND DENTAL CARE FOR ELIGIBLE PERSONS AT NAVY MEDICAL...

  12. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    SciTech Connect

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  13. Toward a National Job Training Program.

    ERIC Educational Resources Information Center

    Grede, John F.

    Contending that the nation's community colleges should improve the training of future workers by building a national job training program based on successful components already in existence, this paper reviews seven monographs published by the National Council for Occupational Education (NCOE) since 1985 which identify, highlight, or address…

  14. [The national food and nutrition policy and its dialogue with the national food and nutrition security policy].

    PubMed

    Alves, Kelly Poliany de Souza; Jaime, Patricia Constante

    2014-11-01

    Food is one of the determinants and conditions of health and an inherent right of all people. The consequences of food and nutrition insecurity in the population, such as obesity, malnutrition and specific nutritional deficiencies, impact the health sector and have historically meant that it has assumed the responsibility for food and nutrition programs and policies in Brazil. However, ensuring food and nutrition security requires a combination of public policies, among which the National Food and Nutrition Policy of the Unified Health System (SUS) plays a fundamental role. This paper seeks to contribute to the debate on intersectoriality and health promotion based on presenting the National Food and Nutrition Policy and discussing its role as interface between the SUS and the National Food and Nutrition Security Policy and System. This perspective strongly suggests the combination of efforts to promote health and food and nutrition security in order to optimize initiatives developed in different sectors and accompanied by different policy councils that are not interrelated, enabling enhanced government and civil society action on the determinants of health and nutrition.

  15. National Aeronautics and Space Administration Science and Engineering Apprentice Program

    NASA Technical Reports Server (NTRS)

    1997-01-01

    The National Aeronautics and Space Administration's Science and Engineering Apprentice Program for high school students is one of NASA's many efforts toward a goal of scientific literacy. It embraces science, mathematics, and technology as keys to purposeful and sustained progress and security for our nation and its people. It serves as a model for helping reform education by striving to address mechanisms to influence the knowledge, skills, and attitudes of our students. It focuses on what to do today to meet the challenges of tomorrow.

  16. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-01

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration...

  17. Program directors' opinions in regard to Didactic Program in Dietetics graduates' failure to secure placement in Supervised Practice Programs.

    PubMed

    Parham, E; Robinson, L; Quinn, J

    2001-09-01

    This study investigated program directors' perspectives on Didactic Program in Dietetics graduates' inability to secure positions in Supervised Practice Programs. The sample included all 229 program directors listed in the Directory of Dietetics Programs 1997-98. Directors contacted by electronic mail or fax completed a 4-part survey instrument including 3 Likert scale sections exploring the effects of the situation and strategies suggested to lessen them. The fourth part reported current practices. Response rate was 56%. Graduates' failure to secure Supervised Practice Program positions was found to be a significant or somewhat significant problem regardless of program size or affiliation. Strategies to increase the likelihood of Supervised Practice Program acceptance included work experience, application coaching, graduate coursework, and reapplication. We found that program directors have a high level of concern about their graduates' futures and are frustrated by their limited ability to improve the situation. Helping graduates who do not secure Supervised Practice Program assignments identify career options is essential. PMID:11573758

  18. 2015 Key Wind Program and National Laboratory Accomplishments

    SciTech Connect

    Office of Energy Efficiency and Renewable Energy

    2015-12-01

    The U.S. Department of Energy (DOE) Wind Program is committed to helping the nation secure cost-competitive sources of renewable energy through the development and deployment of innovative wind power technologies. By investing in improvements to wind plant design, technology development, and operation as well as developing tools to identify the highest quality wind resources, the Wind Program serves as a leader in making wind energy technologies more competitive with traditional sources of energy and a larger part of our nation’s renewable energy portfolio.

  19. National Ignition Facility Quality Assurance Program Plan. Revision 1

    SciTech Connect

    Wolfe, C.R.; Yatabe, J.

    1996-09-01

    The National Ignition Facility (NIF) is a key constituent of the Department of Energy`s Stockpile Stewardship Program. The NIF will use inertial confinement fusion (ICF) to produce ignition and energy gain in ICF targets, and will perform weapons physics and high-energy- density experiments in support of national security and civilian objectives. The NIF Project is a national facility involving the collaboration of several DOE laboratories and subcontractors, including Lawrence Livermore National Laboratory (LLNL), Los Alamos National Laboratory (LANL), Sandia National Laboratory (SNL), and the University of Rochester Laboratory for Laser Energetics (UR/LLE). The primary mission of the NIF Project is the construction and start-up operation of laser-based facilities that will demonstrate fusion ignition in the laboratory to provide nuclear-weapons-related physics data, and secondarily, to propagate fusion burn aimed at developing a potential source of civilian energy. To support the accomplishment of this very important mission, the LLNL Laser Directorate created the NIF Project Office to organize and bring about the Project. The NIF Project Office has established this Quality Assurance Program to ensure its success. This issue of the Quality Assurance Program Plan (QAPP) adds the requirements for the conduct of Title 11 design, construction, procurement, and Title III engineering. This QAPP defines and describes the program-the management system-for specifying, achieving, and assuring the quality of all NIF Project work consistent with the policies of the Laboratory and the Laser Directorate.

  20. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Information and Restricted Data. 95.35 Section 95.35 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data....

  1. Potential National Security Applications of Nuclear Resonance Fluorescence Methods

    SciTech Connect

    Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

    2009-06-09

    The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

  2. Ares V: Game Changer for National Security Launch

    NASA Technical Reports Server (NTRS)

    Sumrall, Phil; Morris, Bruce

    2009-01-01

    NASA is designing the Ares V cargo launch vehicle to vastly expand exploration of the Moon begun in the Apollo program and enable the exploration of Mars and beyond. As the largest launcher in history, Ares V also represents a national asset offering unprecedented opportunities for new science, national security, and commercial missions of unmatched size and scope. The Ares V is the heavy-lift component of NASA's dual-launch architecture that will replace the current space shuttle fleet, complete the International Space Station, and establish a permanent human presence on the Moon as a stepping-stone to destinations beyond. During extensive independent and internal architecture and vehicle trade studies as part of the Exploration Systems Architecture Study (ESAS), NASA selected the Ares I crew launch vehicle and the Ares V to support future exploration. The smaller Ares I will launch the Orion crew exploration vehicle with four to six astronauts into orbit. The Ares V is designed to carry the Altair lunar lander into orbit, rendezvous with Orion, and send the mated spacecraft toward lunar orbit. The Ares V will be the largest and most powerful launch vehicle in history, providing unprecedented payload mass and volume to establish a permanent lunar outpost and explore significantly more of the lunar surface than was done during the Apollo missions. The Ares V consists of a Core Stage, two Reusable Solid Rocket Boosters (RSRBs), Earth Departure Stage (EDS), and a payload shroud. For lunar missions, the shroud would cover the Lunar Surface Access Module (LSAM). The Ares V Core Stage is 33 feet in diameter and 212 feet in length, making it the largest rocket stage ever built. It is the same diameter as the Saturn V first stage, the S-IC. However, its length is about the same as the combined length of the Saturn V first and second stages. The Core Stage uses a cluster of five Pratt & Whitney Rocketdyne RS-68B rocket engines, each supplying about 700,000 pounds of thrust

  3. 76 FR 78814 - National Voluntary Laboratory Accreditation Program; Operating Procedures

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-20

    ... National Institute of Standards and Technology 15 CFR Part 285 RIN 0693-AB61 National Voluntary Laboratory... Voluntary Laboratory Accreditation Program, National Institute of Standards and Technology, 100 Bureau Drive... Chief, National Voluntary Laboratory Accreditation Program, National Institute of Standards...

  4. 49 CFR 1548.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security program. 1548.5 Section 1548.5 Transportation Other Regulations Relating to Transportation (Continued... CARRIER SECURITY § 1548.5 Adoption and implementation of the security program. (a) Security...

  5. 49 CFR 1548.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security program. 1548.5 Section 1548.5 Transportation Other Regulations Relating to Transportation (Continued... CARRIER SECURITY § 1548.5 Adoption and implementation of the security program. (a) Security...

  6. 49 CFR 1548.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security program. 1548.5 Section 1548.5 Transportation Other Regulations Relating to Transportation (Continued... CARRIER SECURITY § 1548.5 Adoption and implementation of the security program. (a) Security...

  7. 49 CFR 1548.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security program. 1548.5 Section 1548.5 Transportation Other Regulations Relating to Transportation (Continued... CARRIER SECURITY § 1548.5 Adoption and implementation of the security program. (a) Security...

  8. 49 CFR 1548.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Adoption and implementation of the security program. 1548.5 Section 1548.5 Transportation Other Regulations Relating to Transportation (Continued... CARRIER SECURITY § 1548.5 Adoption and implementation of the security program. (a) Security...

  9. 75 FR 76512 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Discontinue the Cost Basis Reporting Service December...

  10. Enhancing Nutrition Security via India's National Food Security Act: Using an Axe instead of a Scalpel?§

    PubMed Central

    Desai, Sonalde; Vanneman, Reeve

    2016-01-01

    In September 2013, India passed a historic National Food Security Act. This paper examines the potential impact of the two central pillars of this act - expansion of the Public Distribution System and strengthening of the Integrated Child Development Schemes – on child nutrition. Using new data from the India Human Development Survey of 2011-12, this paper shows that access to subsidized grains via PDS is not related to improved child nutrition, and while ICDS seems to be related to lower child undernutrition, it has a limited reach in spite of the universalization of the program. The paper suggests that a tiered strategy in dealing with child undernutrition that starts with the identification of undernourished children and districts and follows through with different strategies for dealing with severe, acute malnutrition, followed by a focus on moderate malnutrition, could be more effective than the existing focus on cereal distribution rooted in the NFSA. PMID:27034596

  11. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  12. 40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PROTECTION AGENCY (CONTINUED) AIR POLLUTION CONTROLS GENERAL COMPLIANCE PROVISIONS FOR ENGINE PROGRAMS... following items: (1) The label heading “EMISSION CONTROL INFORMATION”. (2) Your corporate name and trademark... ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” (ii) “THIS EQUIPMENT HAS...

  13. [Methods of analysis of food and nutritional security programs: an experience in Brazil].

    PubMed

    Carvalho, Alice Teles de; Almeida, Erika Rodrigues de; Nilson, Eduardo Augusto Fernandes; Ubarana, Juliana Amorim; Fernández, Irela Mazar; Immink, Maarten

    2013-02-01

    The development of methods that enable analysis of programs and public policies is a key point for their objectives to be attained. This study presents a Brazilian experience of analysis of two food and nutritional security programs in cities in Brazil's northeast region, namely the National Program for Vitamin A Supplementation, and monitoring health conditions of those included in the Family Allowance Program. The methodological stages included the definition of programs to be analyzed, data collection locations, the population participating in the research, collection procedures and data analysis. The methodology used made it possible to ascertain the perception of the different social actors involved in the operationalization of these programs, proving to be an important tool for the insertion of these actors, not only as objects of analysis, but also mainly as subjects of self-evaluation. PMID:23358757

  14. Get Your Automotive Program Nationally Certified!

    ERIC Educational Resources Information Center

    Lundquist, Patricia A.

    2000-01-01

    Automotive programs that nationally certified enhance student recruitment and give students better employment opportunities. Technicians who earn the Automotive Service Excellence credential have joined the ranks of professionals in the automotive service industry. (Author/JOW)

  15. Nevada National Security Site Environmental Report 2012 Attachment A: Site Description

    SciTech Connect

    Wills, Cathy A

    2013-09-11

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  16. Nevada National Security Site Environmental Report 2013 Attachment A: Site Description

    SciTech Connect

    Wills, C.

    2014-09-09

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  17. Sustainability of a Nuclear Security Educational Program at Tomsk Polytechnic University

    SciTech Connect

    Boiko, Vladimir I.; Silaev, Maxim E.; Duncan, Cristen L.; Hazel, Michael J.; Heinberg, Cynthia L.; Goodey, Kent O.; Butler, Gilbert W.

    2012-06-07

    Educational programs for training of specialists in the area of material protection, control and accounting (MPC&A) for Russian nuclear facilities have been implemented at the National Research Tomsk Polytechnic University over the last eight years. The initial stage of creating the program, which can be deemed as successfully functioning, has been completed. The next stage entails further improvement of the program in order to create conditions for its sustainability and steady improvement. The educational program sustainability plan contains a number of steps, including the following: - Analysis of the status, standards and prospects for development of nuclear security educational programs in the world; - Analysis of the current educational program, level of its functionality and the demand for the program as well as its capability to react adequately to external influences; - Analysis of the factors influencing program development at its current stage and in the future; - Assessment of needs and development of proposals for the program’s sustainability; - Assessment of needs and development of proposals for improving quality and increasing the demand for the program by potential employers; - Assessment of needs and development of proposals for expansion of the program’s content and the scope of its application; - Development of short-term and long-term plans for functioning and development. Strategic prospects for development are associated with the transition from MPC&A to a broader range of tasks covered by the specialization in the area of nuclear security.

  18. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national...

  19. A Marine Fisheries Program for the Nation.

    ERIC Educational Resources Information Center

    Department of Commerce, Washington, DC.

    This government publication describing the national plan for marine fisheries is divided into two parts. The first part contains a statement by the Secretary of Commerce, Elliot L. Richardson; the goals for the national marine fisheries plan; a description of the six parts of the plan; and a cost estimate for the program. The goals for the plan…

  20. Magnetic Imaging: a New Tool for UK National Nuclear Security

    PubMed Central

    Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications. PMID:25608957

  1. Magnetic imaging: a new tool for UK national nuclear security.

    PubMed

    Darrer, Brendan J; Watson, Joe C; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.

  2. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security program. 1549.5 Section 1549.5 Transportation Other Regulations Relating to Transportation (Continued... SCREENING PROGRAM General § 1549.5 Adoption and implementation of the security program. (a) Security...

  3. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security program. 1549.5 Section 1549.5 Transportation Other Regulations Relating to Transportation (Continued... SCREENING PROGRAM General § 1549.5 Adoption and implementation of the security program. (a) Security...

  4. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security program. 1549.5 Section 1549.5 Transportation Other Regulations Relating to Transportation (Continued... SCREENING PROGRAM General § 1549.5 Adoption and implementation of the security program. (a) Security...

  5. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Adoption and implementation of the security program. 1549.5 Section 1549.5 Transportation Other Regulations Relating to Transportation (Continued... SCREENING PROGRAM General § 1549.5 Adoption and implementation of the security program. (a) Security...

  6. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security program. 1549.5 Section 1549.5 Transportation Other Regulations Relating to Transportation (Continued... SCREENING PROGRAM General § 1549.5 Adoption and implementation of the security program. (a) Security...

  7. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    SciTech Connect

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  8. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  9. Evolving perceptions of security - US National Security surveys 1993--1995. Progress report, September 30, 1995--November 14, 1995

    SciTech Connect

    Herron, K.G.; Jenkins-Smith, H.C.

    1996-06-01

    This study analyzes findings from a national survey of 2,490 randomly selected members of the US public conducted between September 30 and November 14, 1995. It provides an over time comparison of public perceptions about nuclear weapons risks and benefits and key nuclear policy issues between 1993 and 1995. Other areas of investigation include policy preferences regarding nuclear proliferation, terrorism, US/Russian nuclear cooperation, and personal security. Public perceptions of post-cold war security were found to be evolving in unexpected ways. The perceived threat of nuclear conflict involving the US had not declined, and the threat of nuclear conflict between other countries and fears of nuclear proliferation and terrorism had increased. Perceived risks associated with managing the US nuclear arsenal were also higher. Perceptions of external and domestic benefits from US nuclear weapons were not declining. Support was found for increasing funding for nuclear weapons safety, training, and maintenance, but most respondents favored decreasing funding for developing and testing new nuclear weapons. Strong support was evident for programs and funding to prevent nuclear proliferation and terrorism. Though skeptical that nuclear weapons can be eliminated, most respondents supported reducing the US nuclear arsenal, banning nuclear test explosions, and ending production of fissile materials to make nuclear weapons. Statistically significant relationships were found between perceptions of nuclear weapons risks and benefits and policy and spending preferences. Demographic variables and basic social and political beliefs were systematically related both to risk and benefit perceptions and policy and spending options.

  10. The first 50 years: A review of the Department of Energy domestic safeguards and security program

    SciTech Connect

    Desmond, W.J.; Zack, N.R.; Tape, J.W.

    1997-12-01

    World War II not only brought the United States rapidly into the nuclear age, but it also brought a new term, {open_quotes}safeguards.{close_quotes} By that time, physical security was an already established activity that dealt with the protection of possessions such as property, vehicles, and other valuables. A secret nuclear project under a stadium at the University of Chicago would add a new dimension to physical security. Similarly, a community known only by its post office box at a location 27 miles from Santa Fe, New Mexico (PO Box 1663) would initiate new programs to protect information and technology while their programs changed the science and warfare around the world. The Manhattan Project and what was to become the Los Alamos Scientific Laboratory (now Los Alamos National Laboratory) would extend the applications of physical security and, soon to be implemented, safeguards to produce important technical advances for the protection, accounting, control, and nonproliferation of fissile nuclear materials. Security for nuclear materials and weapons information began as a foremost consideration with the start of the nuclear programs in the early 1940s. In the 1960s, the Atoms for Peace Program promoted the peaceful use of nuclear energy and made the US a supplier of nuclear materials and peaceful-use nuclear technology to other states. This program also changed the focus on nuclear materials from that of worldwide control to inspection by an independent agency, the proposed International Atomic Energy Agency. At this same time the nuclear weapons states increased from three to five. Other nations worked to obtain a nuclear weapons capability, resulting in increasing concerns about nuclear proliferation.

  11. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    SciTech Connect

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  12. Special Milk Program Evaluation and National School Lunch Program Survey.

    ERIC Educational Resources Information Center

    Food and Nutrition Service (USDA), Washington, DC.

    This evaluation of the Special Milk Program (SMP) was undertaken in order to assess the impact of the free milk provision on the National School Lunch Program (NSLP) and on student milk consumption. Other objectives of the study included (1) assessing milk waste in schools and factors affecting this waste; (2) updating data from previous surveys…

  13. The US national isotope program: current status and strategy for future success.

    PubMed

    Rivard, Mark J; Bobek, Leo M; Butler, Ralph A; Garland, Marc A; Hill, David J; Krieger, Jeanne K; Muckerheide, James B; Patton, Brad D; Silberstein, Edward B

    2005-08-01

    Since their introduction in the 1940s, peaceful use of stable isotopes and radioisotopes in the United States has expanded continuously. Today, new isotopes for diagnostic and therapeutic uses are not being developed, critical isotopes for national security are in short supply, and demand for isotopes critical to homeland security exceeds supply. While commercial suppliers, both domestic and foreign, can only meet specific needs, the nation needs a consistent, reliable supply of radioactive and stable isotopes for research, medical, security, and space power applications. The national isotope infrastructure, defined as both facilities and trained staff at national laboratories and universities, is in danger of being lost due to chronic underfunding. With the specific recommendations given herein, the US Department of Energy may realign and refocus its Isotope Program to provide a framework for a successful National Isotope Program. PMID:15935681

  14. Consolidated Fuel Reprocessing Program. National Program Plan, FY 1985

    SciTech Connect

    Not Available

    1985-03-01

    This FY 1985 National Program Plan for the Consolidated Fuel Reprocessing Program (CFRP) provides specific guidance from the Department of Energy (DOE) for FY 1985 CFRP activities and a baseline for activities in future years. This is the third issue of the Plan, which is updated annually and summarizes program objectives, plans, and schedules, budget allocations, contractor involvements, and interfaces with other research programs. The National Program Plan is a controlling document for the Technical Program Plan, which is prepared annually by the CFRP at Oak Ridge National Laboratory (ORNL) and is one of a hierarchical group of planning documents. The CFRP is a part of the DOE's program of research and development (R and D) on nuclear fission systems and is directed by the LMFBR Fuel Cycle Projects Division, Office of Spent Fuel Management and Reprocessing Systems at DOE-Headquarters through the Oak Ridge Operations Office (ORO). The strategy of the program is to maintain the capability to commit to a breeder option through a strong fuel cycle R and D program and international technical exchanges.

  15. Consolidated Fuel Reprocessing Program. National Program Plan FY 1984

    SciTech Connect

    Not Available

    1984-01-01

    This FY 1984 National Program Plan for the Consolidated Fuel Reprocessing Program (CFRP) provides specific guidance from the Department of Energy (DOE) for FY 1984 CFRP activities and a baseline for activities in future years. This is the second issue of the Plan, which is updated anually and summarizes program objectives, summary plans and schedules, budget allocations, contractor involvement, and interfaces with other research programs. The National Program Plan is a controlling document for the Technical Program Plan, which is prepared annually by the CFRP at Oak Ridge National Laboratory (ORNL) and is one of the hierarchical group of planning documents. The CFRP is a part of the DOE's program of research and development (R and D) on nuclear fission systems and is directed by the LMFBR Fuel Cycle Projects Division, Office of Spent Fuel Management and Reprocessing Systems at DOE-Headquarters through the Oak Ridge Operations Office (ORO). The strategy of the program is to maintain the capability to commit to a breeder option through a strong R and D program on breeder reprocessing and alternate fuels and fuel cycles in order to achieve operating and economic advantages.

  16. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  17. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  18. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  19. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  20. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... association promptly files a report on Form X-17A-19 including therewith, inter alia, information sufficient... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges...

  1. Simulating human behavior for national security human interactions.

    SciTech Connect

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

    2007-01-01

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

  2. A National Climate Change Adaptation Network for Protecting Water Security

    NASA Astrophysics Data System (ADS)

    Weaver, A.; Sauchyn, D.; Byrne, J. M.

    2009-12-01

    Water security and resource-dependent community-survival are being increasingly challenged as a consequence of climate change, and it is urgent that we plan now for the security of our water supplies which support our lives and livelihoods. However, the range of impacts of climate change on water availability, and the consequent environmental and human adaptations that are required, is so complex and serious that it will take the combined work of natural, health and social scientists working with industries and communities to solve them. Networks are needed that will identify crucial water issues under climate change at a range of scales in order to provide regionally-sensitive, solutions-oriented research and adaptation. We suggest national and supra-national water availability and community sustainability issues must be addressed by multidisciplinary research and adaptation networks. The work must be driven by a bottom-up research paradigm — science in the service of community and governance. We suggest that interdisciplinary teams of researchers, in partnership with community decision makers and local industries, are the best means to develop solutions as communities attempt to address future water demands, protect their homes from infrastructure damage, and meet their food, drinking water, and other essential resource requirements. The intention is to cover: the impact of climate change on Canadian natural resources, both marine and terrestrial; issues of long-term sustainability and resilience in human communities and the environments in which they are embedded; the making and moving of knowledge, be that between members of Indigenous and non-Indigenous communities, researchers of different disciplines, communities, industry, policymakers and the academy and the crucial involvement of the various orders of government in the response to water problems, under conditions of heightened uncertainty. Such an adaptation network must include a national

  3. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    SciTech Connect

    Greene, David L; Leiby, Paul Newsome

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described in this report has been specifically developed to

  4. 77 FR 10542 - Revision of the National Preparedness for Response Exercise Program (PREP) Guidelines

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-22

    ... Federal Register (73 FR 3316). Public meeting: After considering public comments and developing a revised... SECURITY Coast Guard Revision of the National Preparedness for Response Exercise Program (PREP) Guidelines... Response Exercise Program (PREP) is designed to facilitate the periodic testing of oil spill response...

  5. 44 CFR Appendix B to Part 62 - National Flood Insurance Program

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... company is customarily subject to examinations and audits performed by the company's internal audit or... Program B Appendix B to Part 62 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program SALE...

  6. Timely integration of safeguards and security with projects at Los Alamos National Laboratory

    SciTech Connect

    Price, R.; Blount, P. M.; Garcia, S. W.; Gonzales, R. L.; Salazar, J. B.; Campbell, C. H.

    2004-01-01

    The Safeguards and Security (S&S) Requirements Integration Team at Los Alamos National Laboratory (LANL) has developed and implemented an innovative management process that will be described in detail. This process systematically integrates S&S planning into construction, facility modifications or upgrades, mission changes, and operational projects. It extends and expands the opportunities provided by the DOE project management manual, DOE M 413.3-1. Through a series of LANL documents, a process is defined and implemented that formally identifies an S&S professional to oversee, coordinate, facilitate, and communicate among the identified S&S organizations and the project organizations over the life cycle of the project. The derived benefits, namely (1) elimination/reduction of re-work or costly retrofitting, (2) overall project cost savings because of timely and improved planning, (3) formal documentation, and (4) support of Integrated Safeguards and Security Management at LANL, will be discussed. How many times, during the construction of a new facility or the modification of an existing facility, have the persons responsible for the project waited until the last possible minute or until after construction is completed to approach the security organizations for their help in safeguarding and securing the facility? It's almost like, 'Oh, by the way, do we need access control and a fence around this building and just what are we going to do with our classified anyway?' Not only is it usually difficult; it's also typically expensive to retrofit or plan for safeguards and security after the fact. Safeguards and security organizations are often blamed for budget overruns and delays in facility occupancy and program startup, but these problems are usually due to poor front-end planning. In an effort to help projects engage safeguards and security in the pre-conceptual or conceptual stages, we implemented a high level formality of operations. We established institutional

  7. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-17

    ... Advisory Committee Meeting; Correction. SUMMARY: The Department of Homeland Security published a document... Alternate Designated Federal Officer, Department of Homeland Security, telephone (703) 235-5469. Correction... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF...

  8. National Water‐Use Information Program

    USGS Publications Warehouse

    Mann, W.B., IV; Moore, J.E.; Chase, E.B.

    1983-01-01

    The US National Water-Use Information Program is a cooperative program between the states and the Federal Government. The purpose of the program is to determine how much fresh and saline surface water and ground water is withdrawn and for what purpose, how much water is consumed during use, and how much water is returned to a water body after use. To accomplish its purpose, the program's goals are to: 1) collect and compile water-use data; 2) develop and refine computerized water-use data systems; 3) improve the collection and analysis of water-use information; and 4) disseminate information.-from ASCE Publications Information

  9. Security guide for subcontractors

    SciTech Connect

    Not Available

    1988-01-01

    The objectives of security in the Department of Energy (DOE) contractor/subcontractor program are: (1) to ensure the protection of information which, if related, would endanger the common defense and security of the nation; and (2) to safeguard the plants and installations of the DOE and its contractors in order that research and production programs will not be interrupted. To achieve these objectives, security responsibilities have been divided into three interdependent categories: personnel security, physical security, and security education and quality audits. This guide presents instructions for implementing a security program at a contractor/subcontractor site.

  10. 75 FR 38536 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ...) Sub-Committee. (3) DHS Global Supply Chain Security Strategy initiative. (4) Maritime Transportation Security Act update. (5) Update from CDC Strategy Working Group. (6) Update on the Small Vessel Security Strategy. Procedural This meeting is open to the public for the morning session and will also be...

  11. A national water-use information program

    USGS Publications Warehouse

    Mann, William B.; Moore, John E.; Chase, Edith B.

    1982-01-01

    The U.S. Geological Survey has compiled estimates of water use every five years since 1950. These estimates have been derived from many sources, and have a wide range of accuracy. Therefore, they fall short of providing a national data base that is both current and reliable. In 1977, the Congress of the United States recognized the need for uniform information on water use and directed the U.S. Geological Survey to establish a National Water-Use Information Program to complement the Survey's data on the availability and quality of the Nation's water resources. The National Water-Use Information Program was designed as a cooperative program between the States and the Federal Government. The goals of the program are: to collect and compile water-use data; to develop and refine computerized water-use data systems at both the State and national levels; to devise new methods and techniques to improve the collection and analysis of water-use information; and to disseminate this information to those involved in establishing water-resources policy and to those managing the resources. The program that started in 1978 in 20 States now includes participation by 47 States. Water-Use information is being compiled for 12 categories of use. Each State will have a automated data system that contains site-specific information about the water use in each category. The National Water-Use Data System will contain information for the 12 categories of use summarized by counties and river basins within each State. The national system will aid in defining how much fresh and saline surface water and ground water is withdrawn and for what purpose, how much water is consumed during use, and how much water is returned to a water body (stream, lake, or aquifer) after use.

  12. Deterrence and National Security in the Face of an Amorphous Threat

    SciTech Connect

    Werne, R

    2001-01-05

    The National Security threats that we face today and, in turn, the National Security . requirements, are more diverse and complex than they were during the Cold-War from 1945-1990. During that period, and bolstered by the experiences of World Wars I and II, US National Security policy was focused on the stabilization of post WW II country boundaries and containment of the Soviet block and China. The result was the bipolar world in which the nuclear and conventional forces of the United States, the Soviet Union, and their respective allies ensured a measure of political stability through a military stalemate of world wide proportions. The practical result was that large scale changes in national borders were unlikely, but internal conflict within countries, and local conflicts between neighboring countries could still occur, albeit with participation from one or both of the Superpower camps. US National Security Policy was designed primarily for stabilization of the bipolar world on the military front and for competition with the Soviet Union and China on economic and political fronts. The collapse of the Soviet Union changed the global picture. The bipolar world and its military stalemate appear to be gone for the moment and the threat which was the foundation for US National Security policy has changed significantly. Some will argue that China has intentions of replacing the Soviet Union as a military superpower and thus recreate the bipolar world. Furthermore, Russia still has significant nuclear forces and has recently talked of lowering the nuclear threshold in an apparent attempt to make up for its weakened conventional forces. Clearly the threat of large scale nuclear war is much reduced, but not gone entirely. Having acknowledged the Chinese and Russian threats, what does the global picture look like today? The boundaries of most countries are secure but there are significant frictions, that have, or could lead, to armed conflict. Most of these are today

  13. Consolidated Fuel Reprocessing Program: National Program Plan, FY 1983

    SciTech Connect

    Not Available

    1983-01-01

    This FY 1983 National Program Plan for the Consolidated Fuel Reprocessing Program (CFRP) provides specific guidance from the Department of Energy (DOE) for FY 1983 CFRP activities and a baseline for future year activities. This initial issue of the Plan, which will be updated annually, summarizes program objectives, summary plans and schedules, budget allocations, contractor involvement, and interfaces with other research programs. The National Program Plan is a controlling document for the Technical Program Plan, which is prepared annually by the CFRP at ORNL and is one of a hierarchical group of planning documents. The CFRP is a part of the DOE's program of research and development (R and D) on nuclear fission systems and is directed by the LMFBR Fuel Cycle Projects Division, Office of Spent Fuel Management and Reprocessing Systems at DOE-Headquarters through the Oak Ridge Operations Office (ORO). The strategy of the program is to maintain the capability to commit to a breeder option through a strong R and D program on breeder reprocessing and alternate fuels and fuel cycles to achieve operating and economic advantages.

  14. American History and National Security: Supplementary Lessons for High School Courses.

    ERIC Educational Resources Information Center

    Patrick, John J., Ed.; And Others

    Effective citizen participation implies the acquisition of skills and knowledge necessary for discussing and deciding national security issues. This book was developed to provide teachers with resources to design and strengthen national security education. The 30 self-contained lessons supplement and enrich current textbook treatment of national…

  15. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-08

    .... SUMMARY: On May 11, 2012 (77 FR 27739), Department of Defense announced a meeting of the National Security... and National Security Education Office, 1101 Wilson Boulevard, Suite 1210, Arlington, VA 22209... Education Office (DLNSEO), 1101 Wilson Boulevard, Suite 1210, Arlington, Virginia 22209-2248; (703)...

  16. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  17. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2011-01-01 2011-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  18. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  19. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  20. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    ERIC Educational Resources Information Center

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  1. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division; interpretation of Executive Orders. 17.13 Section 17.13 Judicial Administration DEPARTMENT OF JUSTICE CLASSIFIED... Division; interpretation of Executive Orders. (a) The Assistant Attorney General for National Security or...

  2. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... National Security Division Systems—limited access. (a) The following system of records is exempted...

  3. 75 FR 43492 - Federal Advisory Committee; National Security Education Board; Charter Renewal

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... of the Secretary Federal Advisory Committee; National Security Education Board; Charter Renewal... notice that it is renewing the charter for the National Security Education Board (hereafter referred to... desiring scholarships or fellowships, and institutions of higher education desiring grants under chapter...

  4. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    ERIC Educational Resources Information Center

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  5. National Security Science and Technology Initiative: Air Cargo Screening

    SciTech Connect

    Bingham, Philip R; White, Tim; Cespedes, Ernesto; Bowerman, Biays; Bush, John

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three explosive

  6. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of...

  7. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of...

  8. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of...

  9. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of...

  10. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of...

  11. 78 FR 13691 - Guidance Regarding Inspection and Certification of Vessels Under the Maritime Security Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-28

    ... 01-13 and requesting public comments on the draft (See 77 FR 2741). The Coast Guard recognized the... Vessels Under the Maritime Security Program (MSP).'' The MSP serves as a means for establishing a fleet of... of a Maritime Security Fleet under the Maritime Security Program (MSP). The MSP serves as a means...

  12. Lawrence Livermore National Security Cost Model Functional Management Assessment

    SciTech Connect

    Tevis, J; Hirahara, J; Thomas, B; Mendez, M

    2008-06-12

    is to make it easier to analyze the true cost of overhead so the costs can be effectively managed. For the current year, the overall the goal of keeping the total cost of an FTE to FY07 levels. This approach reflects the past practice of managing to rates rather than focusing on costs, although streamlined with the more simplified rate structure. Given all the challenges being faced with the contract transition, this was a reasonable interim tactic for dealing with the known cost increases such as fees and taxes. Nonetheless, in order to take full advantage of the opportunities that exist for making sound decisions for further reducing the rates themselves, the Laboratory needs to implement an ongoing and disciplined approach to understanding and managing overhead cost. ISSUE 2: The NIF has a significantly different rate structure than other Laboratory work. Because of its significant size and unique organizational structure as a major construction project, the National Ignition Facility (NIF) has indirect charges that vary from the norm. These variations were reviewed and approved by and disclosed to the NNSA in the Laboratory's past annual Disclosure Statements. In mid-FY 09, NIF will begin transition from a construction line item to an operational center. The reallocation of costs when this occurs could significantly impact the Laboratory's rates and rate structure planning for that transition from a cost- and rate- impact standpoint should begin soon. ISSUE 3: The new rate model must be finalized shortly in order to implement the model beginning in FY 09. As noted in Issue No.1, a Working Group has developed a simplified rate structure for the Lab to use for FY09. The Working Group has evaluated the cost impacts of the simplified rate structure at the major program level and identified a disparate impact in the Safeguards and Security area where a substantial increase in overhead cost allocation may need to be mitigated. The simplified rate structure will need to

  13. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  14. Inspection of the Lawrence Livermore National Laboratory's Drug-Free Workplace Program

    SciTech Connect

    Not Available

    1990-04-11

    The subject report is provided to discuss findings and recommendations on the inspection of Lawrence Livermore National Laboratory (LLNL). The purpose of this inspection was to review (1) implementation of drug abuse policies and procedures at the Lawrence Livermore National Laboratory (LLNL), (2) the role of the San Francisco Operations Office (SAN) in planning and implementing LLNL's drug abuse policies and procedures, and (3) the role of the various drug-related program activities at DOE Headquarters, i.e., the Personnel Assurance Program (PAP), the Personnel Security Assurance Program (PSAP), the Federal Drug-Free Workplace Program (DFW/F), and the Contractor Drug-Free Workplace Program (DFW/C).

  15. National Aero-Space Plane (NASP) program

    NASA Technical Reports Server (NTRS)

    Tank, Ming H.

    1991-01-01

    A program to develop the technology for reusable airbreathing hypersonic/transatmospheric vehicles is addressed. Information on the following topics is presented in viewgraph form: (1) the National Aerospace Plane (NASP) program schedule; (2) the NASP program organization; (3) competitive strategy; (4) propulsion options; (5) wind tunnel data available for NASP; (6) ground track of envelope expansion; and (7) altitude vs. Mach number. A NASP/Space Shuttle comparison, NASP configuration matrix, and the propulsion concept of a high speed scramjet are also briefly addressed.

  16. NIST commitment to national MQA programs

    SciTech Connect

    Caswell, R.S.

    1993-12-31

    The program of the Ionizing Radiation Division, Physics Laboratory is discussed, especially relating to standards, calibrations, and measurement quality assurance (MQA). The NIST program is {open_quotes}vertically integrated,{close_quotes} meaning that activities extend from fundamental research to measurement research to supplying services and data. Typical methods NIST uses to assure the quality of the national standards are presented. Some of the programs in x-ray, gamma-ray, electron, neutron, and radioactivity research which support MQA are presented. Examples are given of MQA activities.

  17. 3 CFR - Implementation of the Executive Order, “Classified National Security Information”

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security education and training programs, self-inspection programs, and measures designed to hold personnel... identity of a confidential human source or a human intelligence source; or (b) key design concepts...

  18. National Geodetic Satellite Program, Part 1

    NASA Technical Reports Server (NTRS)

    Henriksen, S. W. (Editor)

    1977-01-01

    The work performed by individual contributors to the National Geodetic Satellite Program is presented. The purpose of the organization, the instruments used in obtaining the data, a description of the data itself, the theory used in processing the data, and evaluation of the results are detailed for the participating organizations.

  19. Lunch Programs in the Nation's Schools.

    ERIC Educational Resources Information Center

    Economic Research Service (USDA), Washington, DC.

    This study of lunch services in public and private elementary and secondary schools is one of a group evaluating selected aspects of public food assistance programs. During a survey in March 1968, noontime food services were provided in about 75 percent of the nation's schools, serving about 80 percent of all pupils enrolled. Results of the survey…

  20. The National Vaccine Injury Compensation Program.

    PubMed

    Cook, Katherine M; Evans, Geoffrey

    2011-05-01

    The National Childhood Vaccine Injury Act of 1986 established the National Vaccine Injury Compensation Program to compensate people thought to be injured by certain vaccines. The act's goals are to ensure an adequate supply of vaccines, to stabilize vaccine costs, and to establish and maintain an accessible and efficient setting for providing compensation to people found to have been injured by certain childhood vaccines. In addition, the legislation called for the reporting of adverse events after vaccination, the creation of vaccine-information materials that detail vaccine benefits and risks, and Institute of Medicine studies of possible vaccine-related injuries and encouraged research and development of new and safer vaccines. Over its 22-year history, the National Vaccine Injury Compensation Program has been a key component in stabilizing the US vaccine market through liability protection to both vaccine companies and health care providers and by providing a forum for people, no matter what age, to seek compensation.