WorldWideScience

Sample records for national energy security

  1. Energy security and national policy

    International Nuclear Information System (INIS)

    Martin, W.F.

    1987-01-01

    To achieve an energy secure future, energy cannot be viewed as an isolated concern. It is part and parcel of a nation's economic, social, and political context. In the past important implications for the economy and national security have been ignored. Crash programs to deal with oil shortages in the seventies, crashed. In the eighties, oil surplus has been enjoyed. The energy situation could be quite different in the nineties. Statistics on energy supply and consumption of oil, coal, natural gas and electricity from nuclear power show that much progress has been made worldwide. However, about half of the world's oil will come from the Persian Gulf by 1995. Continued low oil prices could raise US imports to 60% of consumption by 1995. Persian Gulf tensions serve as reminders of the link between energy policy and national security policy. Energy policy must be based on market forces and concerns for national security. Strategic oil reserves will expand along with the availability of domestic oil and gas resources. Increased attention to conservation, diversification of energy resources, and use of alternative fuels can help reduce imports. Continued high-risk long term research and development is needed. Improved technology can reduce environmental impacts. Global markets need global cooperation. Energy has emerged as an important aspect of East-West relations. Europeans need to diversify their sources of energy. The soviets have proposed expanded collaboration in magnetic fusion science. A series of initiatives are proposed that together will ensure that economies will not become overly dependent on a single source of energy

  2. Alternate Energy for National Security.

    Science.gov (United States)

    Rath, Bhakta

    2010-02-01

    Recent price fluctuations at the gas pump have brought our attention to the phenomenal increase of global energy consumption in recent years. It is now evident that we have almost reached a peak in global oil production. Several projections indicate that total world consumption of oil will rise by nearly 60 per cent between 1999 and 2020. In 1999 consumption was equivalent to 86 million barrels of oil per day, which has reached a peak of production extracted from most known oil reserves. These projections, if accurate, will present an unprecedented crisis to the global economy and industry. As an example, in the US, nearly 40 per cent of energy usage is provided by petroleum, of which nearly a third is used in transportation. The US Department of Defense (DOD) is the single largest buyer of fuel, amounting to, on the average, 13 million gallons per day. Additionally, these fuels have to meet different requirements that prevent use of ethanol additives and biodiesel. An aggressive search for alternate energy sources, both renewable and nonrenewable, is vital. The presentation will review national and DOD perspectives on the exploration of alternate energy with a focus on energy derivable from the ocean. )

  3. Nuclear power and national energy security

    International Nuclear Information System (INIS)

    Addae, A.K.

    2001-01-01

    The demand for energy in Ghana is expected to grow rapidly in the next couple of decades if the objectives of the Vision 2020 Programme are to become a reality. In particular, the demand for electric power is expected to increase 3 to 5 fold over 1997 levels by the year 2020.This calls for early planning. Adequate and dependable central station electric power supplies in the next couple of decades is therefore very critical to sustainable development and the achievement of the objective of the Vision 2020 Programme. Curtailment in electric power supplies cause disruption in economic activities and consequent economic losses. The recent cases in point are the 1983/84 and 1997/1998 power curtailments in Ghana due to low water levels in the Akosombo Reservoir. These led not only to substantial disruptions in economic activities but also to the erosion of invest confidence in the economy. It is, therefore, very essential that the country's central station electric power supply system should not continue to depend on hydro-electric power as in the past years but should be based on a mix of energy sources to provide an acceptable level of national energy security under all circumstances

  4. It's Time for a National Energy Security Strategy

    National Research Council Canada - National Science Library

    Wright, George G

    2008-01-01

    .... can preserve that standing in the world. Colonel Greg Wright argues that what is needed to retain our military and economic superpower advantage is a new overarching United States National Energy Security Strategy...

  5. Current energy situation affecting national economy, security, and psyche

    International Nuclear Information System (INIS)

    Blundell, H.; Culbreath, H.L.

    1979-01-01

    Nuclear energy should be perceived by Americans as the energy option that can fill the gap left by petroleum shortages. Opposition to nuclear power symbolizes a drive to slow economic growth and return to a decentralized society, but it overlooks the implications that not going nuclear will have for the economy and national security. The General Accounting Office plotted the consequences for three scenarios and concluded that only nuclear power can provide enough domestic energy to meet projected electrical needs. The impact of higher energy prices that will follow energy-supply shortages will result in social change and in a decline in national security. The issues of import dependence, proliferation, economic competition, and morality are not valid reasons to forego nuclear development because the connections are not valid

  6. A Strategy for American Power: Energy, Climate and National Security

    Science.gov (United States)

    2008-06-01

    For example, Greg Mankiw , Harvard economist and former chair of President Bush’s Council of Economic Advisors, has proposed phasing in a $1 per...International Energy Barrier By Amy Myers Jaffe 77 Chapter V: Overcoming the Economic Barriers to Climate Change and Energy Security By Jason Furman (lead...Hamilton Project. He previously served in the Clinton administration and at the Council of Economic Advisers, the National Economic Council, and the World

  7. Access to primary energy sources - the basis of national energy security

    Science.gov (United States)

    Szlązak, Jan; Szlązak, Rafał A.

    2017-11-01

    National energy security is of fundamental importance for economic development of a country. To ensure such safety energy raw material, also called primary energy sources, are necessary. Currently in Poland primary energy sources include mainly fossil fuels, such as hard coal, brown coal, natural gas and crude oil. Other sources, e.g. renewable energy sources account for c. 15% in the energy mix. Primary energy sources are used to produce mainly electricity, which is considered as the cleanest form of energy. Poland does not have, unfortunately, sufficient energy sources and is forced to import some of them, mainly natural gas and crude oil. The article presents an insightful analysis of energy raw material reserves possessed by Poland and their structure taking account of the requirements applicable in the European Union, in particular, those related to environmental protection. The article also describes demand for electricity now and in the perspective of 2030. Primary energy sources necessary for its production have also been given. The article also includes the possibilities for the use of renewable energy sources in Poland, however, climatic conditions there are not are not particularly favourable to it. All the issues addressed in the article are summed up and ended with conclusions.

  8. Department of Energy award DE-SC0004164 Climate and National Security: Securing Better Forecasts

    Energy Technology Data Exchange (ETDEWEB)

    Reno Harnish

    2011-08-16

    The Climate and National Security: Securing Better Forecasts symposium was attended by senior policy makers and distinguished scientists. The juxtaposition of these communities was creative and fruitful. They acknowledged they were speaking past each other. Scientists were urged to tell policy makers about even improbable outcomes while articulating clearly the uncertainties around the outcomes. As one policy maker put it, we are accustomed to making these types of decisions. These points were captured clearly in an article that appeared on the New York Times website and can be found with other conference materials most easily on our website, www.scripps.ucsd.edu/cens/. The symposium, generously supported by the NOAA/JIMO, benefitted the public by promoting scientifically informed decision making and by the transmission of objective information regarding climate change and national security.

  9. Targeted Modification of Neutron Energy Spectra for National Security Applications

    Science.gov (United States)

    Bevins, James Edward

    At its core, research represents an attempt to break from the "this is the way we have always done it" paradigm. This idea is evidenced from the start in this research effort by the problem formulation to develop a new way to generate synthetic debris that mimics the samples that would be collected for forensics purposes following a nuclear weapon attack on the U.S. or its allies. The philosophy is also demonstrated by the design methodology used to solve the synthetic debris problem, using methods not commonly applied to nuclear engineering problems. Through this research, the bounds of what is deemed possible in neutron spectral shaping are moved ever so slightly. A capability for the production of synthetic debris and fission products was developed for the National Ignition Facility (NIF). Synthetic debris has historically been made in a limited fashion using sample doping techniques since the cessation of nuclear weapons testing, but a more robust alternative approach using neutron spectral shaping was proposed and developed by the University of California-Berkeley and Lawrence Livermore National Laboratory (LLNL). Using NIF as a starting source spectrum, the energy tuning assembly (ETA) developed in this work can irradiate samples with a combined thermonuclear and prompt fission neutron spectrum (TN+PFNS). When used with fissile foils, this irradiation will produce a synthetic fission product distribution that is realistic across all mass chains. To design the ETA, traditional parametric point design approaches were discarded in favor of formal optimization techniques. Finding a lack of suitable algorithms in the literature, a metaheuristic-based optimization algorithm, Gnowee, was developed for rapid convergence to nearly globally optimum solutions for complex, constrained engineering problems with mixed-integer and combinatorial design vectors and high-cost, noisy, discontinuous, black box objective function evaluations. Comparisons between Gnowee and

  10. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  11. Assessing national nutrition security: The UK reliance on imports to meet population energy and nutrient recommendations.

    Science.gov (United States)

    Macdiarmid, Jennie I; Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine

    2018-01-01

    Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961-2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements.

  12. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    International Nuclear Information System (INIS)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-01-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  13. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    Energy Technology Data Exchange (ETDEWEB)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede, E-mail: gwibawa@chem-eng.its.ac.id [Department of Chemical Engineering, Faculty of Industrial Technology, Sepuluh Nopember Institute of Technology (ITS), Kampus ITS Sukolilo, Surabaya 60111 (Indonesia)

    2015-12-29

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  14. Quantitative analysis of Indonesia's reserves and energy security as an evaluation by the nation in facing global competition

    Science.gov (United States)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  15. Securing energy equity

    Energy Technology Data Exchange (ETDEWEB)

    Grimsby, Lars Kare, E-mail: lars.grimsby@umb.no [Department of International Environment and Development Studies, Noragric, Norwegian University of Life Sciences, P.O. Box 5003, 1432 Aas (Norway)

    2011-11-15

    Addressing energy poverty rather than energy equity conveniently evades the problem of the gap in energy consumption per capita in the developed and developing world. For energy security policies to adequately address energy poverty it requires a widening of scope from national to global. This is a comment to the forthcoming presentation of IEA's proposition for a new architecture for financing universal modern energy access to be presented at the conference 'Energy for all-Financing access for the poor' held in Oslo in October 2011. - Highlights: > Addressing energy poverty may elude the disparity in energy consumption between rich and poor. > A minimum threshold of energy for the poor does not itself address inequity in energy consumption. > Energy equity may be secured by widening scope from national to global, from the poorest to us all.

  16. Securing energy equity

    International Nuclear Information System (INIS)

    Grimsby, Lars Kare

    2011-01-01

    Addressing energy poverty rather than energy equity conveniently evades the problem of the gap in energy consumption per capita in the developed and developing world. For energy security policies to adequately address energy poverty it requires a widening of scope from national to global. This is a comment to the forthcoming presentation of IEA's proposition for a new architecture for financing universal modern energy access to be presented at the conference 'Energy for all-Financing access for the poor' held in Oslo in October 2011. - Highlights: → Addressing energy poverty may elude the disparity in energy consumption between rich and poor. → A minimum threshold of energy for the poor does not itself address inequity in energy consumption. → Energy equity may be secured by widening scope from national to global, from the poorest to us all.

  17. An assessment of the effectiveness of fuel cycle technologies for the national energy security enhancement in the electricity sector

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Jun, Eunju; Chang, Soon Heung; Kim, Won Joon

    2009-01-01

    Energy security, in the 21st century, draws significant attention in most countries worldwide, because the national security and sustainable development depend largely on energy security. The anticipated fossil energy depletion and the instability of their supply drive many countries to consider nuclear energy as their alternative energy source for the enhancement of their national energy security. In this study, indicators measuring the level of energy security in the electric power sector are developed and applied for the assessment of the effectiveness of four electric power system schemes which deploy different nuclear fuel cycle technologies, with consideration for the diversification of the energy markets and the vulnerability to economic disruption. Results show that the contribution of the closed fuel cycle scheme is larger than the once-through fuel cycle scheme in the perspective of energy security. In addition, the completely closed fuel cycle with the spent fuel recycling enhances the national energy security to the maximum extent compared to all other fuel cycle schemes. Since a completely closed fuel cycle is hardly affected by the uranium price changes, this scheme is found to be the most favorable scheme, ensuring the stable profit of utilities and stabilizing the electricity tariff. In addition, the completely closed fuel cycle scheme provides the best enhancement of national energy security with respect to energy supply, under reasonable price conditions. The indicators developed in this study can be utilized as a useful instrument for the measurement of the level of the energy security, especially by the countries importing energy resources for the generation of electric power.

  18. Energy security, trans-national pipelines and China's role in Asia

    Energy Technology Data Exchange (ETDEWEB)

    Seaman, J.

    2010-07-01

    In recent decades, China's transformation from a regional energy supplier to one of the world's largest net energy importers, in particular with regards to oil and gas, has led to an increasing sense of energy insecurity in Chinese policy circles. Guaranteeing adequate supplies of energy to fuel economic growth is a central element in Beijing's efforts to maintain legitimacy in the face of economic reform and transformation. To combat energy insecurity a number of initiatives are being undertaken to diversify energy inputs, suppliers, and the means of their transport. Among these initiatives are a series of trans-national pipeline projects that will transport oil and gas from Eastern Siberia, Central Asia, and Southeast Asia, effectively reducing China's overall reliance on international sea lanes and maritime choke-points, in particular the Strait of Malacca. An analysis of these projects can shed light on how China's energy security policies are playing out on a regional level, how they are complicated and aided by various competing and converging interests of regional actors, and how they are re-shaping traditional regional dependencies. Indeed, more complex interdependencies among suppliers, consumers and transit states in continental Asia seem to be emerging as a consequence of China's growing role as an energy consumer. In the end, these pipelines help to diversify China's oil and gas suppliers and transport routes, easing its reliance on Middle Eastern oil and maritime transit, but they are by no means an alternative to the latter. China will continue to rely heavily on international oil markets and maritime shipping routes to deliver Middle Eastern oil. Suring up international markets and finding means to cooperate on international maritime security issues are thus and will remain in China's best interest. (author)

  19. Energy security, trans-national pipelines and China's role in Asia

    International Nuclear Information System (INIS)

    Seaman, J.

    2010-01-01

    In recent decades, China's transformation from a regional energy supplier to one of the world's largest net energy importers, in particular with regards to oil and gas, has led to an increasing sense of energy insecurity in Chinese policy circles. Guaranteeing adequate supplies of energy to fuel economic growth is a central element in Beijing's efforts to maintain legitimacy in the face of economic reform and transformation. To combat energy insecurity a number of initiatives are being undertaken to diversify energy inputs, suppliers, and the means of their transport. Among these initiatives are a series of trans-national pipeline projects that will transport oil and gas from Eastern Siberia, Central Asia, and Southeast Asia, effectively reducing China's overall reliance on international sea lanes and maritime choke-points, in particular the Strait of Malacca. An analysis of these projects can shed light on how China's energy security policies are playing out on a regional level, how they are complicated and aided by various competing and converging interests of regional actors, and how they are re-shaping traditional regional dependencies. Indeed, more complex interdependencies among suppliers, consumers and transit states in continental Asia seem to be emerging as a consequence of China's growing role as an energy consumer. In the end, these pipelines help to diversify China's oil and gas suppliers and transport routes, easing its reliance on Middle Eastern oil and maritime transit, but they are by no means an alternative to the latter. China will continue to rely heavily on international oil markets and maritime shipping routes to deliver Middle Eastern oil. Suring up international markets and finding means to cooperate on international maritime security issues are thus and will remain in China's best interest. (author)

  20. National Security Whistleblowers

    National Research Council Canada - National Science Library

    Fisher, Louis

    2005-01-01

    .... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...

  1. No energy security without climate security

    International Nuclear Information System (INIS)

    Hiller, M.

    2006-06-01

    WWF urges the G8 nations to embark on a serious global 'Climate and Energy Security Plan' akin in dimension to the Marshall plan after the Second World War. The plan would aim at dramatically augmenting energy efficiency measures and renewable energy sources within the next five years

  2. 10 CFR 602.16 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  3. 10 CFR 605.18 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  4. Physics of societal issues calculations on national security, environment, and energy

    CERN Document Server

    Hafemeister, David

    2014-01-01

    This book provides the reader with essential tools needed to analyze complex societal issues and demonstrates the transition from physics to modern-day laws and treaties. This second edition features new equation-oriented material and extensive data sets drawing upon current information from experts in their fields. Problems to challenge the reader and extend discussion are presented on three timely issues:   •        National Security: Weapons, Offense, Defense, Verification, Nuclear Proliferation, Terrorism •        Environment: Air/Water, Nuclear, Climate Change, EM Fields/Epidemiology •        Energy: Current Energy Situation, Buildings, Solar Buildings, Renewable  Energy, Enhanced End-Use Efficiency, Transportation, Economics   Praise for the first edition: "This insight is needed in Congress and the Executive Branch. Hafemeister, a former Congressional fellow with wide Washington experience, has written a book for physicists, chemists and engineers who want to learn science...

  5. Physics of societal issues calculations on national security, environment, and energy

    CERN Document Server

    Hafemeister, David

    2007-01-01

    Why this book on the Physics of Societal Issues? The subdivisions of physics - nuclear physics, particle physics, condensed-matter physics, biophysics - have their textbooks, while the subdivision of physics and society lacks an equation-oriented text on the physics of arms, energy and the environment. Physics of Societal Issues is intended for undergraduate and doctoral students who may work on applied topics, or who simply want to know why things are the way they are. Decisions guiding policies on nuclear arms, energy and the environment often seem mysterious and contradictory. What is the science behind the deployment of MIRVed ICBMs, the quest for space-based beam weapons, the fear of powerline EM fields, the wholesale acceptance of SUVs, the issues of climactic change, and the failure of the pre-embargo market to produce buildings and appliances that now save over 50 power plants? Physics of Societal Issues is three "mini-texts" in one: National Security (5 chapters): Weapons, offense, defense, verificat...

  6. Securing India's energy future

    International Nuclear Information System (INIS)

    Raghuraman, V.

    2009-01-01

    India's development aspirations are challenged by energy security and climate change considerations. The integrated energy policy clearly deliberates the need to intensify all energy options with emphasis on maximizing indigenous coal production, harnessing hydropower, increasing adoption of renewables, intensifying hydrocarbon exploration and production and anchoring nuclear power development to meet the long-term requirements. The report also emphasizes the need to secure overseas hydrocarbon and coal assets. Subsequently the National Action Plan on climate change has underscored the need to wean away from fossil fuels, the ambitious National Solar Mission is a case in point. Ultimately securing India's energy future lies in clean coal, safe nuclear and innovative solar. Coal is the key energy option in the foreseeable future. Initiatives are needed to take lead role in clean coal technologies, in-situ coal gasification, tapping coal bed methane, coal to liquids and coal to gas technologies. There is need to intensify oil exploration by laying the road-map to open acreage to unlock the hydrocarbon potential. Pursue alternate routes based on shale, methane from marginal fields. Effectively to use oil diplomacy to secure and diversify sources of supply including trans-national pipelines and engage with friendly countries to augment strategic resources. Technologies to be accessed and developed with international co-operation and financial assistance. Public-Private Partnerships, in collaborative R and D projects need to be accelerated. Nuclear share of electricity generation capacity to be increased 6 to 7% of 63000 MW by 2031-32 and further to 25% (300000 MW) capacity by 2050 is to be realized by operationalizing the country's thorium programme. Nuclear renaissance has opened up opportunities for the Indian industry to meet not only India's requirements but also participate in the global nuclear commerce; India has the potential to emerge as a manufacturing hub

  7. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  8. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  9. Nuclear Power, Energy Economics and Energy Security

    International Nuclear Information System (INIS)

    2013-01-01

    Economic development requires reliable, affordable electricity that is provided in sufficient quantities to satisfy the minimum energy requirements at a local, regional or national level. As simple as this recipe for economic development appears, technological, infrastructural, financial and developmental considerations must be analysed and balanced to produce a national energy strategy. Complicating that task is the historic fact that energy at the desired price and in the desired quantities can be neither taken for granted nor guaranteed. Energy economics and energy security determine the options available to nations working to establish a sustainable energy strategy for the future.

  10. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  11. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  12. Study on the concentration of energy security

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2002-01-01

    'Energy Security' concept has played the central role in Japan's energy policy. However, the definition of the concept is not clear. If energy security will remain a principal policy target, its concept should be clearly defined as a precondition. This dissertation analyzes historical changes in energy security concept and considers their relationship with the development of national security concept in international relations studies. Following an introduction in the first chapter, the second chapter reveals that energy security concept has changed in accord with energy situation and policymakers' concern of the times. As a result, several different definitions of the concept now coexist. The third chapter deals with the relationship between energy security concept and national security concepts in international relations. Three major definitions of energy security concepts correspond to definitions of security concepts by three schools in security theory - realism, liberalism, and globalism. In the fourth chapter, energy security is conceptualized and its policy measures are systematized by addressing the issues appeared in its historical changes and referring to security theory in international relations studies. The fifth chapter discusses the contribution by nuclear energy to Japan's energy security, applying a theoretical framework presented in previous chapters. Characteristics of nuclear energy which enhance energy security are identified, and policy measures for improving those characteristics are proposed. (author)

  13. Reconsidering relations between nuclear energy and security concepts

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2004-01-01

    Relations between nuclear energy and security concepts can be clarified through investigation into the multivocal nature of security concepts. While military uses of nuclear energy significantly influence national security, peaceful uses of nuclear energy contribute energy security, which is an expanded concept of national security. Military and peaceful uses of nuclear energy have reciprocal actions, thus influencing national security and energy security, respectively. Nuclear security, which means security of nuclear systems themselves, recently attracts the attention of the international society. Nuclear security directly influences national security issues. On the other hand, along with nuclear safety, nuclear security becomes a prerequisite for energy security through peaceful uses of nuclear energy. In investigating into relations between nuclear energy and security concepts, the difficulty of translating the English word of 'nuclear security' into Japanese as well as other languages is found. (author)

  14. Measuring Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Brochure provides and overview of the analysis and results. Readers interested in an in-depth discussion of methodology are referred to the MOSES Working Paper.

  15. Student Experiential Opportunities in National Security Careers

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  16. Energy Dependence: The $1.4 Trillion Addiction Threatening National Security

    Science.gov (United States)

    2010-02-01

    shared by executives from major automobile manufacturers to include General Motors, Honda, Nissan and Toyota .52 Toyota , for example, is currently leasing...going away. The vehicles and fuels people use to travel and move goods will have to change in order to solve the problem. 9 Figure 1: Toyota Motor...the viability of new automobile products. Toyota Motor Company and the DOE National Renewable Energy Lab (NREL), for example, used California to

  17. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and the...

  18. China's energy security and strategic choices

    International Nuclear Information System (INIS)

    Pellistrandi, J.

    2010-01-01

    Considering the present day international political and economical situation, China's energy security covers five important aspects: energy supplies security, energy prices security, environment security with respect to energy consumption, energy transport security, R and D security in the domain of energy resources exploration, exploitation and utilisation. Considering the above-mentioned aspects, China's strategic choices should include five major goals: counting on its own energy resources and giving priority to energy saving, participating to the international competition and implementing a national strategic reserves system, readjusting the energy consumption structure and promoting environment protection by developing nuclear energy, harmonizing China's relations with some countries and avoiding political and military conflicts, increasing investment in energy R and D, in particular in clean coal, nuclear, automotive, renewable energy and energy saving technologies. (J.S.)

  19. Conceptualizing energy security

    International Nuclear Information System (INIS)

    Winzer, Christian

    2012-01-01

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy security. They can be characterized according to the sources of risk, the scope of the impacts, and the severity filters in the form of the speed, size, sustention, spread, singularity and sureness of impacts. Using a stylized case study for three European countries, we illustrate how the selection of conceptual boundaries along these dimensions determines the outcome. This can be avoided by more clearly separating between security of supply and other policy objectives. This leads us to the definition of energy security as the continuity of energy supplies relative to demand. - Highlights: ► The widest energy security concept includes all risks that are caused by or have an impact on the energy supply chain. ► Authors narrow this down by choosing different risk sources, impact measures and subjective severity filters in their definitions. ► The selection of conceptual boundaries determines outcome of quantitative studies.

  20. Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)

    International Nuclear Information System (INIS)

    Jesse Schreiber

    2008-01-01

    In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet America's nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization and improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in 'green' technology

  1. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  2. 10 CFR 871.1 - National security exemption.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security...

  3. Indicators for energy security

    International Nuclear Information System (INIS)

    Kruyt, Bert; Van Vuuren, D.P.; De Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability, accessibility, affordability and acceptability of energy and classified indicators for energy security according to this taxonomy. There is no one ideal indicator, as the notion of energy security is highly context dependent. Rather, applying multiple indicators leads to a broader understanding. Incorporating these indicators in model-based scenario analysis showed accelerated depletion of currently known fossil resources due to increasing global demand. Coupled with increasing spatial discrepancy between consumption and production, international trade in energy carriers is projected to have increased by 142% in 2050 compared to 2008. Oil production is projected to become increasingly concentrated in a few countries up to 2030, after which production from other regions diversifies the market. Under stringent climate policies, this diversification may not occur due to reduced demand for oil. Possible benefits of climate policy include increased fuel diversity and slower depletion of fossil resources. (author)

  4. Natural gas and energy security

    International Nuclear Information System (INIS)

    Saga, B.P.

    1996-01-01

    This paper relates to energy security by natural gas supply seen in an International Energy Agency perspective. Topics are: Security of supply, what is it; the role gas on the European energy scene; short term security of supply; long term security of supply; future structural and regulatory developments and possible implications for security of supply. 6 figs

  5. Status, progress and plans for the U.S. Department of Energy, National Nuclear Security Administration, Global Threat Reduction Initiative

    International Nuclear Information System (INIS)

    Bieniawski, Andrew

    2005-01-01

    This presentation discusses the efforts under the US Department of Energy/National Nuclear Security Administration's Global Threat Reduction Initiative, also known as GTRI. On May 26, 2004, then Secretary of Energy Abraham established GTRI. GTRI is a cooperative program to provide international support for countries' national programs to identify, secure, recover or facilitate the disposition of vulnerable nuclear and radiological materials around the world that pose a potential threat to the international community. The formation of GTRI consolidated a number of nonproliferation programs you may be familiar with that work together to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civil nuclear applications worldwide. In particular, the Office of Global Threat Reduction, which was set up to implement GTRI, has oversight of the Reduced Enrichment for Research and Test Reactors program, the Foreign Research Reactor Spent Nuclear Fuel Acceptance program, and the Russian Research Reactor Fuel Return program. This consolidation allows these three programs to work in concert to bring about the elimination of research reactor materials as a source of proliferation concern. This speech is highlighting the work that these programs have undertaken in cooperation with the global research reactor community and the importance placed on fuel development under the RERTR program It contains an update on the work done to support the US - Russian Presidential Bratislava Summit Statement

  6. To The Question Of The Concepts "National Security", "Information Security", "National Information Security" Meanings

    OpenAIRE

    Alexander A. Galushkin

    2015-01-01

    In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.

  7. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  8. National Security and National Development: A Critique

    African Journals Online (AJOL)

    DR Nneka

    There has been the tendency right from independence to view national ... the nation's economic underdevelopment, which has led to social injustice, ... For a nation, security connotes conditions of peace, stability, order ... They are very important for the ... According to Mathew (1989), Global development now suggests.

  9. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  10. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  11. A Crude Reality; Exploring the Interdependencies of Energy (Oil), the Macro-Economy, and National Security

    Science.gov (United States)

    2012-04-11

    Policy (SWEEP) optimizing our own natural resources in the near term (oil, natural gas, coal, nuclear, wind, solar, hydro, geothermal and synthetics... geothermal and synthetics), and displaces the oil based economy with a long term energy transformation plan based on renewable energy, is vital to...climb and supply begins to diminish. Global energy demands will continue to rise as the developing economies of countries like Brazil, Russia, China

  12. The economics of energy security

    International Nuclear Information System (INIS)

    Bohi, D.R.; Toman, M.A.; Walls, M.A.

    1996-01-01

    The results of research on energy security that has been conducted over the past 20 years are brought together and expanded. Chapter 2 lays out basic conceptual arguments regarding the economic externalities and the military premium, as well as the general problem of identifying a market failure. Chapter 3 provides a brief history of the oil price shocks of the 1970s and reviews the empirical evidence on the energy security externalities laid out in Chapter 2. Chapter 4 builds on the material in Chapter 3 to critique published estimates of the overall premium associated with oil imports or oil consumption. Chapter 5 examines how the oil market has changed in the twenty years since the first oil shock of the 1970s and assesses the effect of these changes on price behavior and market efficiency. Chapters 6 and 7 focus on two sectors in which the energy security debate is being carried out through concrete policy measures: the choice of electricity generation technology and the market for transportation fuels. In Chapter 8, we summarize our assessments of potential energy security externalities and examine their implications for a variety of policy measures at the national and subnational levels. 7 figs., 11 tabs., 200 refs

  13. Nuclear energy technology transfer: the security barriers

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1975-08-01

    The problems presented by security considerations to the transfer of nuclear energy technology are examined. In the case of fusion, the national security barrier associated with the laser and E-beam approaches is discussed; for fission, the international security requirements, due to the possibility of the theft or diversion of special nuclear materials or sabotage of nuclear facilities, are highlighted. The paper outlines the nuclear fuel cycle and terrorist threat, examples of security barriers, and the current approaches to transferring technology. (auth)

  14. Concept for Energy Security Matrix

    International Nuclear Information System (INIS)

    Kisel, Einari; Hamburg, Arvi; Härm, Mihkel; Leppiman, Ando; Ots, Märt

    2016-01-01

    The following paper presents a discussion of short- and long-term energy security assessment methods and indicators. The aim of the current paper is to describe diversity of approaches to energy security, to structure energy security indicators used by different institutions and papers, and to discuss several indicators that also play important role in the design of energy policy of a state. Based on this analysis the paper presents a novel Energy Security Matrix that structures relevant energy security indicators from the aspects of Technical Resilience and Vulnerability, Economic Dependence and Political Affectability for electricity, heat and transport fuel sectors. Earlier publications by different authors have presented energy security assessment methodologies that use publicly available indicators from different databases. Current paper challenges viability of some of these indicators and introduces new indicators that would deliver stronger energy security policy assessments. Energy Security Matrix and its indicators are based on experiences that the authors have gathered as high-level energy policymakers in Estonia, where all different aspects of energy security can be observed. - Highlights: •Energy security should be analysed in technical, economic and political terms; •Energy Security Matrix provides a framework for energy security analyses; •Applicability of Matrix is limited due to the lack of statistical data and sensitivity of output.

  15. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  16. Energy technology evaluation report: Energy security

    Science.gov (United States)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  17. ORDER SECURITYNATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  18. The National Security Strategy and National Interests: Quantity or Quality?

    National Research Council Canada - National Science Library

    Mercado, Leo

    2001-01-01

    The national security strategy (NSS), National Security Strategy for a New Century, published in December 1999, categorizes national interests as vital, important, and humanitarian and other interests...

  19. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  20. Nuclear Electricity in the United States : Providing Energy For The Nation's Security and Well-Being

    International Nuclear Information System (INIS)

    Finger, Harold B.

    1988-01-01

    Nuclear energy in the United States has made major contributions since the small Shippingport prototype power plant began operating in 1957. Recent legislative and regulatory actions, as well as research an development, are indicating that additional nuclear capacity can be available in the years ahead. These actions reflect the public's recognition of the importance of nuclear energy. In addition, recent regulatory actions are reaffirming the health and safety of our current nuclear plants, as well as of those being completed. The performance of our current plants is being improved through the conscious dedication of the entire industry to excellence. There is increasing discussion in the United States of the importance of advanced reactor concepts development. The next generation of nuclear plants is already being ordered outside of the United States for example, here in Korea, in Japan, in the United Kingdom and those plants all use light water reactors. We are pleased that U. S. companies are working with you on these new plants. That continues to mean that we never let up on our drive for excellence. Excellence in operations must continue to be the conscious target of all operators. Excellence in communications to the public of the need for electrical capacity, of the benefits of nuclear energy, and of the excellence being achieved in operations is also essential. And excellence in communication to decision makers at all levels of government is also required to assure that sound legalisation and regulation is established and implemented

  1. Energy security strategy and nuclear power

    International Nuclear Information System (INIS)

    Toichi, Tsutomu; Shibata, Masaharu; Uchiyama, Yoji; Suzuki, Tatsujiro; Yamazaki, Kazuo

    2006-01-01

    This special edition of 'Energy security strategy and nuclear power' is abstracts of the 27 th Policy Recommendations 'The Establishment of an International Energy Security System' by the Japan Forum on International Relations, Inc on May 18 th , 2006. It consists of five papers: Energy security trend in the world and Japan strategy by Tsutomu Toichi, Establishment of energy strategy supporting Japan as the focus on energy security by Masaharu Shibata, World pays attention to Japan nuclear power policy and nuclear fuel cycle by Yoji Uchiyama, Part of nuclear power in the energy security - the basic approach and future problems by Tatsujiro Suzuki, and Drawing up the energy strategy focused on the national interests - a demand for the next government by Kazuo Yamazaki. (S.Y.)

  2. Nuclear energy and security

    International Nuclear Information System (INIS)

    Blejwas, Thomas E.; Sanders, Thomas L.; Eagan, Robert J.; Baker, Arnold B.

    2000-01-01

    Nuclear power is an important and, the authors believe, essential component of a secure nuclear future. Although nuclear fuel cycles create materials that have some potential for use in nuclear weapons, with appropriate fuel cycles, nuclear power could reduce rather than increase real proliferation risk worldwide. Future fuel cycles could be designed to avoid plutonium production, generate minimal amounts of plutonium in proliferation-resistant amounts or configurations, and/or transparently and efficiently consume plutonium already created. Furthermore, a strong and viable US nuclear infrastructure, of which nuclear power is a large element, is essential if the US is to maintain a leadership or even participatory role in defining the global nuclear infrastructure and controlling the proliferation of nuclear weapons. By focusing on new fuel cycles and new reactor technologies, it is possible to advantageously burn and reduce nuclear materials that could be used for nuclear weapons rather than increase and/or dispose of these materials. Thus, the authors suggest that planners for a secure nuclear future use technology to design an ideal future. In this future, nuclear power creates large amounts of virtually atmospherically clean energy while significantly lowering the threat of proliferation through the thoughtful use, physical security, and agreed-upon transparency of nuclear materials. The authors must develop options for policy makers that bring them as close as practical to this ideal. Just as Atoms for Peace became the ideal for the first nuclear century, they see a potential nuclear future that contributes significantly to power for peace and prosperity

  3. Nuclear Power Introduction in Indonesia : Securing the National Energy Supply for Sustainable Development

    International Nuclear Information System (INIS)

    Sriyana; Sudi Ariyanto; Arnold Y Soetrisnanto

    2005-01-01

    Nuclear power construction planning study has already done by BATAN. The studies that cover various aspects have also done related to this preparation. The research centers in BATAN that have activities in energy application are directed to this preparation. This paper will generally describe the activities and result of the preparation study, especially related to technology aspect, site aspect, and social-economic impact. The preparation study has taken into account of some aspects, but still need updated and some more complementary study. The choice of technology will determine the ability for technology transfer. Industrial infrastructure and the design and engineering capability are the key role for self reliance in nuclear power technology. But the technology transfer will not succeed without government support. Muria Peninsula, precisely in Ujung Lemahabang has become the first candidate site, while Ujung Grenggengan and Ujung Watu as a second and third candidate sites. Though site could accommodate 7.000 MWe installed capacity, but are need to consider stability and capacity of transmission line to channeling the nuclear power out put in Jawa-Madura-Bali grid interconnection. From the economic impact aspect, nuclear power is competitive among other power plant system in order the role of nuclear power to give a solution in energy optimum mix policy and will reduce oil fuel consumption. (author)

  4. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  5. Ingenuity and National Security

    Science.gov (United States)

    2013-06-01

    is in an unfamiliar situation as the lone super power without a significant existential threat. China is a rising power and Russia aspires to...independence to the most powerful nation on the planet . The time period surrounding World War II demonstrated that governmental processes and

  6. 76 FR 34761 - Classified National Security Information

    Science.gov (United States)

    2011-06-14

    ... MARINE MAMMAL COMMISSION Classified National Security Information [Directive 11-01] AGENCY: Marine... Commission's (MMC) policy on classified information, as directed by Information Security Oversight Office... of Executive Order 13526, ``Classified National Security Information,'' and 32 CFR part 2001...

  7. Rethinking National Security

    Science.gov (United States)

    1990-10-01

    III. ’Proliferation in the 1990m.’ tratomic Rhvii . 17 (Summer 1969): 9-20. 30 McGowan. Pat, and Charles W. Ke.le.. ZuLfMl. weaLpon. mi Foreig L Y...Vayrynen. ads. Militarization #1nd Production . New York: St. Martin’s, 1983. (HC 79 .D4 M54 1983) Twight, Charlotte. *Political Economy of the National

  8. 76 FR 51358 - National Nuclear Security Administration Amended Record of Decision: Disposition of Surplus...

    Science.gov (United States)

    2011-08-18

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Amended Record of Decision... National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of... Manager, Office of Fissile Materials Disposition, National Nuclear Security Administration, U.S...

  9. National Security Strategy

    Science.gov (United States)

    2015-02-01

    students globally every year. We continue to attract immigrants from every corner of the world who renew our country with their energy and...of our manufacturing revolution will create the next generation of high technology manufacturing jobs. Immigration reform that combines smart and...Mexico to enhance our collective economic competitiveness while advancing prosperity in our hemisphere. With Chile , Peru, Mexico, and Canada, we

  10. Energy security: between markets and sovereign politics

    Directory of Open Access Journals (Sweden)

    Dudau Radu

    2016-09-01

    Full Text Available Energy security is a constant presence in the energy-related political discourse all over the world. States strive to secure steady inflows of needed energy supplies, as well as the price affordability of those supplies. However, what are deemed to be the best means to meet such goals depends on one’s theoretical vantage point. On the one hand, economically-minded theorists maintain that energy security is only a matter of market rules and interactions. Thus, they call upon energy markets to deliver both steady supplies and competitive prices. On the other hand, politically-minded scholars emphasize the political and hard-power nature of international energy trades, especially in a global context market by the emergence of state-centered, authoritarian regimes that use large national energy companies as foreign policy instruments. These two positions delineate competing approaches to how energy security risks ought to be managed. The former approaches energy security risks by means similar to portfolio management, requiring diversification of investments in order to insulate them from market shocks. The latter approaches energy security as a matter of foreign policy, by which states envisage interest coordination and favorable alignments within countervailing alliances against the agent of energy security risk. The present paper goes beyond the uncontentious point that these two dimensions are complementary. It argues that, depending on the international context, a more market-driven or a more-politically driven behavior may be adequate.

  11. Diversity Intersects with National Security.

    Science.gov (United States)

    Chew, Cassie

    2003-01-01

    Describes how the United Negro College Fund's Institute for International Public Policy is preparing to host a series of open-ended discussions with top government and business officials on the importance of a diverse work force as a national security imperative, as well as a competitive advantage in a global economy. (EV)

  12. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  13. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2010-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  14. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  15. 14 CFR 1260.31 - National security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance of...

  16. China's energy security: Perception and reality

    International Nuclear Information System (INIS)

    Leung, Guy C.K.

    2011-01-01

    China, now the world's second-largest economy, is worried about energy security, which underpins the core objectives of Beijing and the political legitimacy of the Communist Party of China. The purpose of this study is to explore certain popular myths about China's energy security. The study consists of six parts. After the introduction, it formulates the obscure concept of 'energy security' and attempts to contextualize it with 'Chinese characteristics.' Then it explicitly points out that the largest driver of oil demand by China as the 'World's Factory' is transport instead of industry. Next, it explores the effectiveness of transnational pipelines as a measure of energy security and explains why they are less effective than many observers have previously assumed. Furthermore, it investigates the global expansion of Chinese national oil companies and questions their actual contribution to energy security. A few concluding remarks then follow. - Research highlights: → Oil is the form of energy that has produced most of China's energy insecurity. → Transport sector, rather than industry, is the largest driver of China's oil demand. → The contribution of oil pipelines to China's energy security is smaller than many assumed. → Acquisition of oil reserves abroad cannot necessarily guarantee China a supply of oil that is more reliable and less expensive. → Energy security is a means; it is not a goal.

  17. Energy | Argonne National Laboratory

    Science.gov (United States)

    Skip to main content Argonne National Laboratory Toggle Navigation Toggle Search Energy Batteries and Energy Storage Energy Systems Modeling Materials for Energy Nuclear Energy Renewable Energy Smart Laboratory About Safety News Careers Education Community Diversity Directory Energy Environment National

  18. Ecosystem services for energy security

    Energy Technology Data Exchange (ETDEWEB)

    Athanas, Andrea; McCormick, Nadine

    2010-09-15

    The world is at an energy crossroads. The changes underway will have implications for ecosystems and livelihoods. Energy security is the reliable supply of affordable energy, of which there are two dimensions; reliability and resilience. Changes in ecosystem services linked to degradation and climate change have the potential to impact both on the reliabiity of energy systems and on their resiliance. Investing in ecosystems can help safeguard energy systems, and mitigate unforeseen risks to energy security. The energy and conservation community should come together to build reliable and resilliant energy systems in ways which recognise and value supporting ecosystems.

  19. Nuclear energy and energy security

    International Nuclear Information System (INIS)

    Mamasakhlisi, J.

    2010-01-01

    Do Georgia needs nuclear energy? Nuclear energy is high technology and application of such technology needs definite level of industry, science and society development. Nuclear energy is not only source of electricity production - application of nuclear energy increases year-by-year for medical, science and industrial use. As an energy source Georgia has priority to extend hydro-power capacity by reasonable use of all available water resources. In parallel regime the application of energy efficiency and energy conservation measures should be considered but currently this is not prioritized by Government. Meanwhile this should be taken into consideration that attempts to reduce energy consumption by increasing energy efficiency would simply raise demand for energy in the economy as a whole. The Nuclear energy application needs routine calculation and investigation. For this reason Government Commission is already established. But it seems in advance that regional nuclear power plant for South-Caucasus region would be much more attractive for future

  20. National Security Space Launch Report

    Science.gov (United States)

    2006-01-01

    Company Clayton Mowry, President, Arianespace Inc., North American—“Launch Solutions” Elon Musk , CEO and CTO, Space Exploration Technologies (SpaceX...technologies to the NASA Exploration Initiative (“…Moon, Mars and Beyond.”).1 EELV Technology Needs The Atlas V and Delta IV vehicles incorporate current... Mars and other destinations.” 46 National Security Space Launch Report Figure 6.1 U.S. Government Liquid Propulsion Rocket Investment, 1991–2005

  1. The IEA Model of Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Working Paper is intended for readers who wish to explore the MOSES methodology in depth; there is also a brochure which provides an overview of the analysis and results.

  2. Calendar Year 2008 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC

    2009-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2008 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2008 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2008 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2008 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the

  3. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  4. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization... National Security Personnel System (NSPS) in regulations jointly prescribed by DOD and OPM (Office of...

  5. Public Diplomacy: Enabling National Security Strategy

    National Research Council Canada - National Science Library

    Smith, Russell H

    2007-01-01

    Public diplomacy seeks to promote the national interests of the United States through understanding, informing and influencing foreign audiences in accord with the 2006 National Security Strategy (NSS...

  6. Measuring energy security. A conceptual note

    Energy Technology Data Exchange (ETDEWEB)

    Frondel, Manuel; Schmidt, Christoph M.

    2008-11-06

    Along with the oil price, concerns about the security of energy supply have soared once again in recent years.Yet, more than 30 years after the OPEC oil embargo in 1973, energy security still remains a diffuse concept. This paper conceives a statistical indicator that aims at characterizing the energy supply risk of nations that are heavily dependent on energy imports. Our indicator condenses the bulk of empirical information on the imports of fossil fuels originating from a multitude of export countries as well as data on the indigenous contribution to the domestic energy supply into a single parameter. Applying the proposed concept to empirical energy data on Germany and the U.S. (1980-2004), we find that there is a large gap in the energy supply risks between both countries, with Germany suffering much more from a tensed energy supply situation today than the U.S. (orig.)

  7. Nevada National Security Site Environmental Report 2011

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  8. Nevada National Security Site Environmental Report 2011

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  9. Energy - Sandia National Laboratories

    Science.gov (United States)

    Energy Energy Secure & Sustainable Energy Future Search Icon Sandia Home Locations Contact Us Employee Locator Menu Stationary Power solar Energy Conversion Efficiency Increasing the amount of electricity produced from a given thermal energy input. Solar Energy Wind Energy Water Power Supercritical CO2

  10. Calendar Year 2005 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2006-09-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2005 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2005 monitoring data were obtained from groundwater and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge south of Y-12. The CY 2005 monitoring data were obtained under the Y-12 Groundwater Protection Program (GWPP) managed by BWXT Y-12, L.L.C. (BWXT) and several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Data contained in this report meet applicable requirements of DOE Order 450.1 (Environmental Protection Program) regarding evaluation of groundwater and surface water quality in areas: (1) which are, or could be, affected by operations at Y-12 (surveillance monitoring); and (2) where contaminants from Y-12 are most likely to migrate beyond the boundaries of the ORR (exit pathway/perimeter monitoring). However, detailed analysis, evaluation, and interpretation of the CY 2005 monitoring data is deferred to the ''Y-12 Groundwater Protection Program Groundwater Monitoring Data Compendium'' (BWXT 2006). For each monitoring well, spring, and surface water sampling station included in this report, the GWPP Compendium provides: (1) pertinent well installation and construction information; (2) a complete sampling history, including

  11. Calendar Year 2010 Groundwater Monitoring Report, U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC

    2011-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2010 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2010 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2010 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2010 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the

  12. Calendar Year 2007 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC

    2008-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2007 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2007 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2007 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by BWXT Y-12, L.L.C. (BWXT), and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). In December 2007, the BWXT corporate name was changed to Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12), which is applied to personnel and organizations throughout CY 2007 for this report. Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2007 monitoring results fulfill requirements of

  13. Calendar Year 2004 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    N/A

    2005-09-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2004 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2004 monitoring data were obtained from groundwater and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge south of Y-12. The CY 2004 monitoring data were obtained under the Y-12 Groundwater Protection Program (GWPP) managed by BWXT Y-12, L.L.C. (BWXT) and several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Data contained in this report meet applicable requirements of DOE Order 450.1 (Environmental Protection Program) regarding evaluation of groundwater and surface water quality in areas: (1) which are, or could be, affected by operations at Y-12 (surveillance monitoring); and (2) where contaminants from Y-12 are most likely to migrate beyond the boundaries of the ORR (exit pathway/perimeter monitoring). However, detailed analysis, evaluation, and interpretation of the CY 2004 monitoring data is deferred to the Y-12 Groundwater Protection Program Groundwater Monitoring Data Compendium (BWXT 2005). For each monitoring well, spring, and surface water sampling station included in this report, the GWPP Compendium provides: (1) pertinent well installation and construction information; (2) a complete sampling history, including sampling methods and

  14. Calendar Year 2011 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC,

    2012-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2011 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2011 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12. The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. This report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and known extent of groundwater contamination. The CY 2011 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by the DOE Environmental Management (EM) contractor responsible for environmental cleanup on the ORR. In August 2011, URS | CH2M Oak Ridge LLC (UCOR) replaced Bechtel Jacobs Company LLC (BJC) as the DOE EM contractor. For this report, BJC/UCOR will be referenced as the managing contractor for CY 2011. Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC/UCOR (i.e., coordinating sample collection and sharing data) ensures

  15. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Science.gov (United States)

    2010-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  16. 15 CFR 742.4 - National security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States to...

  17. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  18. Energy security and the IEA ExCo on combustion

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, P. [Hutchinson Consultant (United Kingdom)

    2009-07-01

    Energy security is an issue for those nations which consume more energy than is available from indigenous sources. A failure to secure adequate energy supplies at an acceptable price prejudices both national and economic security. Energy security is therefore a significant policy issue. A discussion of energy security and the International Energy Agency ExCo on combustion was offered in this presentation. The purpose of the discussion was to determine if a task or set of tasks on combustion research related to energy security should be launched; the structure of such a task; topics of interest; who would wish to participate; who would lead the collaboration; and the next steps. The presentation discussed the proper understanding and analysis of energy security and the interactions between international politics; defence; economics and economic development; present and future technologies; national infrastructure; resource distribution; and environmental science and politics. The presentation also discussed whether there was a shortage of energy, world reserves of crude oil, coal, and hydrocarbons. Oil supply disruptions and nominal and real world oil prices were also discussed. Options for addressing energy security were presented, with particular reference to increasing the energy intensity of the economy; using a wide range of different fuels such as coal; developing indigenous supplies such as renewables; and developing a reliable long life energy source. It was concluded that imports of energy can be reduced when energy security improves. tabs., figs.

  19. National and international safety, safeguardability and security

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki

    1987-01-01

    All nuclear power and fuel cycle facility development must comply with the predecided national regulation and security codes which each country's Atomic Energy Commission stipulates. Those codes will basically evolve as technologies and the social system will develop, change and shift. It is also to be noted that the IAEA's international guidelines have been adopted particularly by developing countries as a good reference for their proper establishment of their safety codes. The report first discusses the plant safety regulation of the inherently safe reactors in comparison to the existing code (or licensing guide) of the Japanese government. Then the new trend seen now in a regulatory body (the US NRC) is reviewed and a proposal of the smooth transition into the new philosophy is presented. In the second part of the paper, the fuel safeguarding and facility security (or physical protection) are discussed, because in the case of inherently safe reactors like ISER-PIUS, it seems that safety has much more to do with the safeguard and the security. In the third part, the international relevances to the security of the ISER-PIUS are discussed, because any ISER-PIUS will be meaningless unless they are used extensively and freely in any part of the world precluding the security concerns. In collaborative use of the state and international codes, regulatory guides and practices, it is evident that ISER-PIUS system can clear the requirements on all the aspects by ample margin. (Nogami, K.)

  20. Lawrence Livermore National Laboratory safeguards and security quarterly progress report to the US Department of Energy: Quarter ending September 30, 1993

    Energy Technology Data Exchange (ETDEWEB)

    Ruhter, W.D.; Strait, R.S.; Mansur, D.L.; Davis, G.

    1993-10-01

    The Lawrence Livermore National Laboratory (LLNL) carries out safeguards and security activities for the Department of Energy (DOE), Office of Safeguards and Security (OSS), as well as other organizations, both within and outside the DOE. This document summarizes the activities conducted for the OSS during the fourth quarter of Fiscal Year 1993 (July through September, 1993). The nature and scope of the activities carried out for OSS at LLNL require a broad base of technical expertise. To assure projects are staffed and executed effectively, projects are conducted by the organization at LLNL best able to supply the needed technical expertise. These projects are developed and managed by senior program managers. Institutional oversight and coordination is provided through the LLNL Deputy Director`s office. At present, the Laboratory is supporting OSS in five areas: Safeguards Technology, Safeguard System Studies, Computer Security, DOE Automated Physical Security and DOE Automated Visitor Access Control System. The remainder of this report describes the activities in each of these five areas. The information provided includes an introduction which briefly describes the activity, summary of major accomplishments, task descriptions with quarterly progress, summaries of milestones and deliverables and publications published this quarter.

  1. Lawrence Livermore National Laboratory safeguards and security quarterly progress report to the U.S. Department of Energy. Quarter ending December 31, 1996

    Energy Technology Data Exchange (ETDEWEB)

    Davis, G.; Mansur, D.L.; Ruhter, W.D.; Strauch, M.S.

    1997-01-01

    The Lawrence Livermore National Laboratory (LLNL) carries out safeguards and security activities for the Department of Energy (DOE), Office of Safeguards and Security (OSS), as well as other organizations, both within and outside the DOE. This document summarizes the activities conducted for the OSS during the First Quarter of Fiscal Year 1997 (October through December, 1996). The nature and scope of the activities carried out for OSS at LLNL require a broad base of technical expertise. To assure projects are staffed and executed effectively, projects are conducted by the organization at LLNL best able to supply the needed technical expertise. These projects are developed and managed by senior program managers. Institutional oversight and coordination is provided through the LLNL Deputy Director`s office. At present, the Laboratory is supporting OSS in four areas: (1) safeguards technology; (2) safeguards and material accountability; (3) computer security--distributed systems; and (4) physical and personnel security support. The remainder of this report describes the activities in each of these four areas. The information provided includes an introduction which briefly describes the activity, summary of major accomplishments, task descriptions with quarterly progress, summaries of milestones and deliverables and publications published this quarter.

  2. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION... approval and safeguarding of National Security Information and Restricted Data. The requirements for...

  3. THE COSTS OF ENERGY SUPPLY SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Rogner, H.H.; Langlois, L.M.; McDonald, A.; Weisser, D.; Howells, M.

    2007-07-01

    In general, increasing a country's energy supply security does not come for free. It costs money to build up a strategic reserve, to increase supply diversity or even to accelerate energy efficiency improvements. Nor are all investments in increasing energy supply security cost effective, even if the shocks they are designed to insure against can be predicted with 100% accuracy. The first half of the paper surveys different definitions and strategies associated with the concept of energy supply security, and compares current initiatives to establish an 'assured supply of nuclear fuel' to the International Energy Agency's (IEA's) system of strategic national oil reserves. The second half of the paper presents results from several case studies of the costs and effectiveness of selected energy supply security policies. One case study examines alternative strategies for Lithuania following the scheduled closure of the Ignalina-2 nuclear reactor in 2009. The second case study examines, for countries with different energy resources and demand structures, the effectiveness of a policy to increase supply diversity by expanding renewable energy supplies. (auth)

  4. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: • DOE hazardous and non-hazardous non-radioactive classified waste • DOE low-level radioactive waste (LLW) • DOE mixed low-level waste (MLLW) • U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  5. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2012-02-28

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  6. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2012-01-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  7. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2013-01-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: DOE hazardous and non-hazardous non-radioactive classified waste; DOE low-level radioactive waste (LLW); DOE mixed low-level waste (MLLW); and, U.S. Department of Defense (DOD) classified waste. The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  8. Calendar Year 2009 Groundwater Monitoring Report, U.S. Department of Energy, Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC

    2010-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2009 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2009 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12. The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2009 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2009 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the groundwater and

  9. Calendar Year 2006 Groundwater Monitoring Report, U.S Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    N/A

    2007-09-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2006 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2006 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2006 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by BWXT Y-12, L.L.C. (BWXT), and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., preparing SAPs, coordinating sample collection, and sharing data) ensures that the CY 2006 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the groundwater and

  10. Calendar Year 2009 Groundwater Monitoring Report, U.S. Department of Energy, Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    2010-01-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2009 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2009 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12. The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2009 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock and Wilcox Technical Services Y-12, LLC (B and W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2009 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the

  11. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  12. Lawrence Livermore National Laboratory safeguards and security quarterly progress report to the US Department of Energy quarter ending September 30, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Davis, G.; Mansur, D.L.; Ruhter, W.D.; Steele, E.; Strait, R.S.

    1994-10-01

    This report presents the details of the Lawrence Livermore National Laboratory safeguards and securities program. This program is focused on developing new technology, such as x- and gamma-ray spectrometry, for measurement of special nuclear materials. This program supports the Office of Safeguards and Securities in the following five areas; safeguards technology, safeguards and decision support, computer security, automated physical security, and automated visitor access control systems.

  13. Nevada National Security Site Environmental Report 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills (editor), Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    missions. The three major NNSS missions include National Security/Defense, Environmental Management, and Nondefense. The major programs that support these missions are Stockpile Stewardship and Management, Nonproliferation and Counterterrorism, Nuclear Emergency Response, Strategic Partnership Projects, Environmental Restoration, Waste Management, Conservation and Renewable Energy, Other Research and Development, and Infrastructure. The major facilities that support the programs include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility, Dense Plasma Focus Facility, Joint Actinide Shock Physics Experimental Research Facility, Radiological/Nuclear Countermeasures Test and Evaluation Complex, Nonproliferation Test and Evaluation Complex (NPTEC), Radiological/Nuclear Weapons of Mass Destruction Incident Exercise Site, the Area 5 Radioactive Waste Management Complex (RWMC), and the Area 3 Radioactive Waste Management Site (RWMS).

  14. Energy security, energy modelling and uncertainty

    Energy Technology Data Exchange (ETDEWEB)

    Markandya, Anil [Basque Centre for Climate Change (Spain); University of Bath (United Kingdom); Pemberton, Malcolm [University College London (United Kingdom)

    2010-04-15

    The paper develops a framework to analyze energy security in an expected utility framework, where there is a risk of disruption of imported energy. The analysis shows the importance of an energy tax as a tool in maximizing expected utility, and how the level of that tax varies according to the key parameters of the system: risk aversion, probability of disruption, demand elasticity and cost of disruption. (author)

  15. Energy security, energy modelling and uncertainty

    International Nuclear Information System (INIS)

    Markandya, Anil; Pemberton, Malcolm

    2010-01-01

    The paper develops a framework to analyze energy security in an expected utility framework, where there is a risk of disruption of imported energy. The analysis shows the importance of an energy tax as a tool in maximizing expected utility, and how the level of that tax varies according to the key parameters of the system: risk aversion, probability of disruption, demand elasticity and cost of disruption. (author)

  16. The Security Impact of Oil Nationalization: Alternate Futures Scenarios

    Directory of Open Access Journals (Sweden)

    Peter Johnston

    2010-01-01

    Full Text Available This article highlights the security impact of oil nationalization, develops and analyzes four energy security scenarios, and suggests options to reduce the potential negative impact of oil nationalization. In addition to the use of oil as a weapon, nationalization of oil can also lead to competition for scarce resources among states, facilitate the funding of terrorists or insurgents, contribute to destabilizing regional arms races, influence intra-state conflict, and sustain antagonistic political agendas.

  17. Theoreticalaspects ofinformation war and national security

    Directory of Open Access Journals (Sweden)

    A. V. Shumka

    2015-07-01

    Organization of effective ensuring information security system provides centralized control of specific functions that provide monitoring and control of all components of the national information space.

  18. Y-12 National Security Complex Water Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  19. Basic Science for a Secure Energy Future

    Science.gov (United States)

    Horton, Linda

    2010-03-01

    Anticipating a doubling in the world's energy use by the year 2050 coupled with an increasing focus on clean energy technologies, there is a national imperative for new energy technologies and improved energy efficiency. The Department of Energy's Office of Basic Energy Sciences (BES) supports fundamental research that provides the foundations for new energy technologies and supports DOE missions in energy, environment, and national security. The research crosses the full spectrum of materials and chemical sciences, as well as aspects of biosciences and geosciences, with a focus on understanding, predicting, and ultimately controlling matter and energy at electronic, atomic, and molecular levels. In addition, BES is the home for national user facilities for x-ray, neutron, nanoscale sciences, and electron beam characterization that serve over 10,000 users annually. To provide a strategic focus for these programs, BES has held a series of ``Basic Research Needs'' workshops on a number of energy topics over the past 6 years. These workshops have defined a number of research priorities in areas related to renewable, fossil, and nuclear energy -- as well as cross-cutting scientific grand challenges. These directions have helped to define the research for the recently established Energy Frontier Research Centers (EFRCs) and are foundational for the newly announced Energy Innovation Hubs. This overview will review the current BES research portfolio, including the EFRCs and user facilities, will highlight past research that has had an impact on energy technologies, and will discuss future directions as defined through the BES workshops and research opportunities.

  20. Data security on the national fusion grid

    International Nuclear Information System (INIS)

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER

  1. Data security on the national fusion grid

    Energy Technology Data Exchange (ETDEWEB)

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-06-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.

  2. Secure Automated Microgrid Energy System

    Science.gov (United States)

    2016-12-01

    O&M Operations and Maintenance PSO Power System Optimization PV Photovoltaic RAID Redundant Array of Independent Disks RBAC Role...elements of the initial study and operational power system model (feeder size , protective devices, generation sources, controllable loads, transformers...EW-201340) Secure Automated Microgrid Energy System December 2016 This document has been cleared for public release; Distribution Statement A

  3. Nuclear power: energy security and supply assurances

    International Nuclear Information System (INIS)

    Rogner, H.H.; McDonald, A.

    2008-01-01

    Expectations are high for nuclear power. This paper first summarizes recent global and regional projections for the medium-term, including the 2007 updates of IAEA projections plus International Energy Agency and World Energy Technology Outlook projections to 2030 and 2050. One driving force for nuclear power is concern about energy supply security. Two potential obstacles are concerns about increased nuclear weapon proliferation risks, and concerns by some countries about potential politically motivated nuclear fuel supply interruptions. Concerning supply security, the paper reviews different definitions, strategies and costs. Supply security is not free; nor does nuclear power categorically increase energy supply security in all situations. Concerning proliferation and nuclear fuel cut-off risks, the IAEA and others are exploring possible 'assurance of supply' mechanisms with 2 motivations. First, the possibility of a political fuel supply interruption is a non-market disincentive discouraging investment in nuclear power. Fuel supply assurance mechanisms could reduce this disincentive. Second, the risk of interruption creates an incentive for a country to insure against that risk by developing a national enrichment capability. Assurance mechanisms could reduce this incentive, thereby reducing the possible spread of new national enrichment capabilities and any associated weapon proliferation risks. (orig.)

  4. Economics and Security: Resourcing National Priorities

    Science.gov (United States)

    2010-05-21

    Papers Number 5 N um ber 5 Econom ics and Security: R esourcing N ational Priorities http://www.usnwc.edu Report Documentation Page Form ApprovedOMB No...2010 William B. Ruger Chair of National Security Economics Papers Number 5 N um ber 5 Econom ics and Security: R esourcing N ational Priorities http://www.usnwc.edu

  5. 78 FR 8160 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-02-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0002] President's National Security... National Security Telecommunications Advisory Committee (NSTAC) will meet on Thursday, February 21, 2013... matters related to national security and emergency preparedness telecommunications policy. Agenda: The...

  6. National Security Education Program: Background and Issues

    National Research Council Canada - National Science Library

    Kuenzi, Jeffrey J; Riddle, Wayne C

    2005-01-01

    ... knowledgeable about the languages and cultures of foreign nations, especially those which are of national security concern and have not traditionally been the focus of American interest and study...

  7. The National Security Council: An Organizational Assessment

    National Research Council Canada - National Science Library

    Best Jr, Richard A

    2009-01-01

    The National Security Council (NSC) was established by statute in 1947 to create an interdepartmental body to advise the President with respect to the integration of domestic, foreign, and military policies relating to the national...

  8. NATIONAL SECURITY AND THE CONSTITUTIONAL RIGHT TO ...

    African Journals Online (AJOL)

    Such conduct has sacrificed the country's national security at the altar of soldiers' ..... may one day intervene directly or indirectly in politics of the country thereby .... Because this matter does not affect the National Council of Provinces or.

  9. Nevada National Security Site Environmental Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  10. Speaker's presentations. Energy supply security

    International Nuclear Information System (INIS)

    Pierret, Ch.

    2000-01-01

    This document is a collection of most of the papers used by the speakers of the European Seminar on Energy Supply Security organised in Paris (at the French Ministry of Economy, Finance and Industry) on 24 November 2000 by the General Direction of Energy and Raw Materials, in co-operation with the European Commission and the French Planning Office. About 250 attendees were present, including a lot of high level Civil Servants from the 15 European State members, and their questions have allowed to create a rich debate. It took place five days before the publication, on 29 November 2000, by the European Commission, of the Green Paper 'Towards a European Strategy for the Security of Energy Supply'. This French initiative, which took place within the framework of the European Presidency of the European Union, during the second half-year 2000. will bring a first impetus to the brainstorming launched by the Commission. (author)

  11. Terrorist targeting and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter; Duero, Arash; Bieliauskas, Arunas [Institute of Energy, Joint Research Center of the European Commission, P.O. Box 2, 1755 ZG Petten (Netherlands)

    2010-08-15

    Sudden, short-term disruptions seriously endangering energy security can be triggered by a variety of events - among them attacks by terrorists. This study investigates terrorist attack practices against energy infrastructures and discusses how we may understand them. Our results indicate that attacks against energy infrastructures are comparatively few. Also, we find no strong connection between the ideologies of various terrorist groups and their proclivity to attack. In addition, the highly disproportionate number of attacks in a handful of countries highlights the strong geographic concentration of attacks. To explain these findings, we analyze terrorist targeting incentives including intimidation levels, symbolism, attack feasibility, and concerns for stakeholders. We argue that terrorists in general have comparatively few incentives to attack energy supply infrastructures based on our assessment of these factors. Moreover, higher levels of terrorist incidents in states more prone to internal violent conflict may suggest stronger incentives to attack energy infrastructures. When outlining energy security policies, the low frequency of worldwide attacks coupled with the high concentration of attacks in certain unstable countries should be taken into consideration. Energy importing countries could benefit from developing strategies to increase stability in key energy supply and/or transit countries facing risks of internal instability. (author)

  12. Ten national cyber security strategies: A comparison

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Besseling, K. van; Spoelstra, M.; Graaf, P. de

    2013-01-01

    A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper

  13. A broadened typology on energy and security

    International Nuclear Information System (INIS)

    Johansson, Bengt

    2013-01-01

    A broadened typology describing the interconnection between energy and security is developed in this paper, with the aim of improving understanding of the relationship between energy and security by applying different research and policy perspectives. One approach involves studying energy as an object exposed to security threats, using concepts such as security of supply or security of demand. Another approach involves studying the role of the energy system as the subject in generating or enhancing insecurity. The latter approach includes studying the conflict-generating potential inherent in the economic value of energy, the risk of accidents and antagonistic attacks to energy infrastructure and the security risks related to the negative environmental impact of the energy system. In order to make a comprehensive analysis of the security consequences of proposed energy policies or strategies, all these aspects should be taken into account to varying degrees. The typology proposed here could be a valuable tool for ensuring that all security aspects have been considered. - Highlights: • The paper presents a broadened typology of energy and security, useful for policy analysis. • The energy system can be an object for security threats and as a subject generating or contributing to insecurity. • Energy as an object for security threats includes the concepts of security of supply and security of demand. • The economic value of energy can contribute to insecurity. • Technological and environmental risks of specific energy systems also provide potential threats to human security

  14. Proceedings of the national seminar cum workshop on water and energy: sustainability and security for future needs - abstracts and souvenir

    International Nuclear Information System (INIS)

    2012-09-01

    The papers cover a wide range of topics water and energy. They range from water resource management to different aspects of desalination and water purification and from energy options in India consisting of nuclear energy, hybrid solar thermal energy, petrochemical and refinery industries, to enabling technologies for energy generation and optimization. Papers relevant to INIS are indexed separately

  15. South Asia energy security: Challenges and opportunities

    International Nuclear Information System (INIS)

    Kumar Singh, Bhupendra

    2013-01-01

    South Asia has witnessed a growing imbalance between energy demand and its supply from indigenous sources resulting in increased import dependence. Energy endowments differ among the South Asian countries. However, access to the significant energy resources in the neighboring countries is denied, which increases the cost of energy supply and reduces energy security of the individual countries and of the region as a whole. The countries in the region could benefit significantly only by strengthening the mechanism of energy trade through improved connectivity. Therefore, greater cooperation within South Asia could be one of the most effective ways to deal with this Regional Energy deficit and ensure Energy Security of the Region. - Highlights: • No South Asian country is going to be able to meet its energy needs domestically. • Fostering cross border energy trade and promotion of investments opportunities are key solutions. • India’s neighbors have huge potential in hydroelectricity. • Co-operation among nations to tap the energy resource can be a win–win situation for all. • However it faces certain challenges

  16. 76 FR 40296 - Declassification of National Security Information

    Science.gov (United States)

    2011-07-08

    ... Declassification of National Security Information AGENCY: National Archives and Records Administration. ACTION... classified national security information in records transferred to NARA's legal custody. The rule incorporates changes resulting from issuance of Executive Order 13526, Classified National Security Information...

  17. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  18. Shared Solar: Current Landscape, Market Potential, and the Impact of Federal Securities Regulation; NREL (National Renewable Energy Laboratory)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-05-27

    This presentation provides a high-level overview of the current U.S. shared solar landscape, the impact that a given shared solar program's structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.

  19. Energy Security, Innovation & Sustainability Initiative

    Energy Technology Data Exchange (ETDEWEB)

    None

    2010-04-30

    More than a dozen energy experts convened in Houston, Texas, on February 13, 2009, for the first in a series of four regionally-based energy summits being held by the Council on Competitiveness. The Southern Energy Summit was hosted by Marathon Oil Corporation, and participants explored the public policy, business and technological challenges to increasing the diversity and sustainability of U.S. energy supplies. There was strong consensus that no single form of energy can satisfy the projected doubling, if not tripling, of demand by the year 2050 while also meeting pressing environmental challenges, including climate change. Innovative technology such as carbon capture and storage, new mitigation techniques and alternative forms of energy must all be brought to bear. However, unlike breakthroughs in information technology, advancing broad-based energy innovation requires an enormous scale that must be factored into any equation that represents an energy solution. Further, the time frame for developing alternative forms of energy is much longer than many believe and is not understood by the general public, whose support for sustainability is critical. Some panelists estimated that it will take more than 50 years to achieve the vision of an energy system that is locally tailored and has tremendous diversity in generation. A long-term commitment to energy sustainability may also require some game-changing strategies that calm volatile energy markets and avoid political cycles. Taking a page from U.S. economic history, one panelist suggested the creation of an independent Federal Energy Reserve Board not unlike the Federal Reserve. The board would be independent and influence national decisions on energy supply, technology, infrastructure and the nation's carbon footprint to better calm the volatile energy market. Public-private efforts are critical. Energy sustainability will require partnerships with the federal government, such as the U.S. Department of Energy

  20. Energy security in the 21. century

    Energy Technology Data Exchange (ETDEWEB)

    Randall, S.J. [Calgary Univ., AB (Canada)

    2002-07-01

    The traditional and current issues regarding the security of energy supplies is reviewed with particular emphasis on the oil sector and the implications of the terrorist attack on New York and Washington on September 11, 2001. In November 2001, the Committee on Sustainable Energy of the United Nations Economic Commission for Europe (UNECE) issued a press release about energy-related environmental problems and the need to factor in the danger of terrorist attacks on energy installations. The presentation examines the current levels of energy demand, expected areas of growth, and changing patterns of energy supply for the United States. The impact that growth in the industrial states of China will have in the global scheme of the petroleum industry is also discussed. Levels of political stability and security in many parts of the world are reviewed with particular reference to the Near and Middle East, Africa, Asia and Latin America. It is noted that liberalization and globalization are favouring the agglomeration of capital and labour into larger and larger multinational energy companies, which raises the concern about excessive market power. In its 2001 analysis of energy outlook, the International Energy Agency indicated that the reserves of oil, natural gas, coal and uranium are more than adequate to meet projected demand growth until at least 2020, by which time new technologies such as hydrogen-based fuel cells, clean coal burning and carbon sequestration will hold out the prospect of abundant, clean energy supplies. 15 refs., 6 figs.

  1. Energy security in the 21. century

    International Nuclear Information System (INIS)

    Randall, S.J.

    2002-01-01

    The traditional and current issues regarding the security of energy supplies is reviewed with particular emphasis on the oil sector and the implications of the terrorist attack on New York and Washington on September 11, 2001. In November 2001, the Committee on Sustainable Energy of the United Nations Economic Commission for Europe (UNECE) issued a press release about energy-related environmental problems and the need to factor in the danger of terrorist attacks on energy installations. The presentation examines the current levels of energy demand, expected areas of growth, and changing patterns of energy supply for the United States. The impact that growth in the industrial states of China will have in the global scheme of the petroleum industry is also discussed. Levels of political stability and security in many parts of the world are reviewed with particular reference to the Near and Middle East, Africa, Asia and Latin America. It is noted that liberalization and globalization are favouring the agglomeration of capital and labour into larger and larger multinational energy companies, which raises the concern about excessive market power. In its 2001 analysis of energy outlook, the International Energy Agency indicated that the reserves of oil, natural gas, coal and uranium are more than adequate to meet projected demand growth until at least 2020, by which time new technologies such as hydrogen-based fuel cells, clean coal burning and carbon sequestration will hold out the prospect of abundant, clean energy supplies. 15 refs., 6 figs

  2. National Energy Balance - 1985

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    The National Energy Balance - 1985 shows energy fluxes of several primary and secondary energy sources, since the production to the final consumption in the main economic sectors, since 1974 to 1984 (E.G.) [pt

  3. National Energy Balance - 1984

    International Nuclear Information System (INIS)

    Anon.

    1984-01-01

    The National Energy Balance - 1984 shows energy fluxes of several primary and secondary energy sources, since the productions to final consumption in the main economic sectors, since 1973 to 1983. (E.G.) [pt

  4. National Energy Balance-1987

    International Nuclear Information System (INIS)

    Anon.

    1987-01-01

    The National Energy Balance - 1987 showns energy fluxes of several primary and secondary energy sources, since the production to final consumption in the main economic sectors, since 1971 to 1986. (E.G.) [pt

  5. The U.S. Department of Energy, National Nuclear Security Agency's Use of Geographic Information Systems for Nuclear Emergency Response Support

    International Nuclear Information System (INIS)

    Guber, A. L.

    2001-01-01

    The U.S, Department of Energy (DOE), National Nuclear Security Agency's (NNSA) Remote Sensing Laboratory (RSL) provides Geographic Information System (GIS) support during nuclear emergency response activities. As directed by the NNSA, the RSL GIS staff maintains databases and equipment for rapid field deployment during an emergency response. When on location, GIS operators provide information products to on-site emergency managers as well as to emergency managers at the DOE Headquarters (HQ) Emergency Operations Center (EOC) in Washington, D.C. Data products are derived from multiple information sources in the field including radiological prediction models, field measurements taken on the ground and from the air, and pertinent information researched on the Internet. The GIS functions as a central data hub where it supplies the information to response elements in the field, as well as to headquarters officials at HQ during emergency response activities

  6. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2001-06-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT Y-12), the Y-12 management and operations (M and O) subcontractor for DOE.

  7. Batteries and Energy Storage | Argonne National Laboratory

    Science.gov (United States)

    Skip to main content Argonne National Laboratory Toggle Navigation Toggle Search Energy Batteries Security User Facilities Science Work with Us Energy Batteries and Energy Storage Energy Systems Modeling Transportation SPOTLIGHT Batteries and Energy Storage Argonne's all- encompassing battery research program spans

  8. Japan's National Security: Structures, norms, and policies

    International Nuclear Information System (INIS)

    Katzenstein, P.J.; Okawara, N.

    1993-01-01

    Japan's national security policy has two distinctive aspects that deserve analysis. First, Japan's definition of national security goes far beyond traditional military notions. National security is viewed in comprehensive terms that also include economic and political dimensions. The second feature of Japan's security policy worth explanation is a distinctive mixture of flexibility and rigidity in the process of policy adaptation to change: flexibility on issues of economic security, rigidity on issues of military security, and flexibility combined with rigidity on issues of political security. With the end of the Cold War and changes in the structure of the international system, it is only natural that we ask whether and how Japan's national security policy will change as well. Optimists insist that the Asian balance of power and the US-Japan relationship will make Japan aspire to be a competitive, noninterventionist trading state that heeds the universal interest of peace and profit rather than narrow aspirations for national power. Pessimists warn us instead that the new international system will finally confirm Herman Kahn's prediction of 1970: Japan will quickly change to the status of a nuclear superpower, spurred perhaps by what some see as a dangerous rise of Japanese militarism in the 1970s and 1980s

  9. The Superpowers: Nuclear Weapons and National Security. National Issues Forums.

    Science.gov (United States)

    Mitchell, Greg; Melville, Keith

    Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…

  10. Overview of Scientific Freedom and National Security

    Science.gov (United States)

    Lerch, Irving

    2000-04-01

    The subject of our scrutiny is very much in the news, punctuated with nouns and modifiers both inflammatory and mundane such as espionage, justice, scientific accountability and scientific freedom. And while our discussion will focus on these issues, I want to raise some of the pragmatic questions that bear on the foundation of our support for international science. Beneath questions of guilt and the loss of secrets in the Wen Ho Lee case lay the inherent tension between the tradition of open exchange in the scientific enterprise and the need to protect the nation's security. How this balance is to be achieved in a democratic society has bedeviled us ever since the Manhattan project heralded the emergence of science and technology as instruments of great national power. If we do not find this balance, we run the risk of damaging some of the most important intellectual treasures that the US has produced the Department of Energy's national laboratories and the entire system that we call the international scientific enterprise. For while the superheated charges of lax security and criminal negligence have led some to call for ``firewalls" to isolate and protect the secrets in our weapons labs, such measures may have severe consequences for weapons and non-weapons labs alike and their many associated universities. It's estimated that from 70% to as much as 80% in the expansion of our economy is technology-driven, derived from the most productive system of scientific innovation in the world. This is also true of our national security. Science is indispensable to the development and maintenance of the nation's arsenals. The Department of Energy's Nuclear Stockpile Stewardship Program is central to the safety and reliability of American nuclear weapons and to our hope for a worldwide ban on nuclear tests. But this program will fail without a continuing intense development effort based on cutting-edge science. And a great deal of the science needed is being pursued in

  11. National Energy Plan II

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-01-01

    This volume contains the Administration's second National Energy Plan, as required by section 801 of the Department of Energy Organization Act (Public Law 95-91). A second volume will contain an assessment of the environmental trends associated with the energy futures reported here. Detailed appendices to the Plan will be published separately. The eight chapters and their subtitles are: Crisis and Uncertainty in the World Energy Future (The Immediate Crisis and the Continuing Problem, The Emergence of the Energy Problem, The Uncertainties of the World Energy Future, World Oil Prices, Consequences for the U.S.); The U.S. Energy Future: The Implications for Policy (The Near-, Mid-, and Long-Term, The Strategy in Perspective); Conservation (Historical Changes in Energy Use, Post-Embargo Changes - In Detail, Conservation Policies and Programs, The Role of Conservation); Oil and Gas (Oil, Natural Gas); Coal and Nuclear (Coal, Nuclear, Policy for Coal and Nuclear Power); Solar and Other Inexhaustible Energy Sources (Solar Energy, Geothermal, Fusion, A Strategy for Inexhaustible Resources); Making Decisions Promptly and Fairly (Managing Future Energy Crises: Emergency Planning, Managing the Current Shortfall: The Iranian Response Plan, Managing the Long-Term Energy Problem: The Institutional Framework, Fairness in Energy Policy, Public Participation in the Development of Energy Policy); and NEP-II and the Future (The Second National Energy Plan and the Nation's Energy Future, The Second National Energy Plan and the Economy, Employment and Energy Policy, The Second National Energy Plan and Individuals, The Second National Energy Plan and Capital Markets, and The Second National Energy Plan and the Environment). (ERA citation 04:041097)

  12. Liberia: National Security Interests in Transformational Development

    National Research Council Canada - National Science Library

    Coleman, Carolyn I

    2008-01-01

    Liberia is of national security interest to the United States of America. Liberia's 14-year civil war ended in 2003, leaving the country with a collapsed government and failing economic, physical, and social infrastructures...

  13. Guide to National Security Policy and Strategy

    National Research Council Canada - National Science Library

    Bartholomees, Jr, J. B

    2006-01-01

    ...: Theory of War and Strategy and National Security Policy and Strategy. The result for this book is the expansion of the block on strategic theory and the introduction of a block on specific strategic issues...

  14. Achieving National Security Strategy: An Effective Process?

    National Research Council Canada - National Science Library

    Mullery, Brian W

    2008-01-01

    The purpose of this research paper is two-fold: 1) to examine whether the U.S. government is properly organized and equipped at the Executive level, to achieve the goals of the President's National Security Strategy and 2...

  15. Biometric National Identification Number Generation for Secure ...

    African Journals Online (AJOL)

    Biometric National Identification Number Generation for Secure Network Authentication Based Fingerprint. ... Username, Password, Remember me, or Register ... In this paper an authentication based finger print biometric system is proposed ...

  16. US oil dependency and energy security

    International Nuclear Information System (INIS)

    Noel, P.

    2002-01-01

    The three papers of this document were written in the framework of a seminar organized the 30 may 2002 by the IFRI in the framework of its program Energy and Climatic Change. The first presentation deals with the american oil policy since 1980 (relation between the oil dependence and the energy security, the Reagan oil policy, the new oil policy facing the increase of the dependence). The second one deals with the US energy security (oil security, domestic energy security, policy implications). The last presentation is devoted to the US oil dependence in a global context and the problems and policies of international energy security. (A.L.B.)

  17. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while...

  18. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0022] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... notice of a May 22, 2013, meeting of the President's National Security Telecommunications Advisory...

  19. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Science.gov (United States)

    2012-05-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security Telecommunications Advisory Committee; Correction AGENCY: National Protection and Programs Directorate, DHS. [[Page... April 25, 2012, concerning the President's National Security Telecommunications Advisory Committee...

  20. 75 FR 45154 - National Security Division; Agency Information Collection Activities:

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0003] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...

  1. A Call for National Security System Transformation

    Science.gov (United States)

    2012-06-01

    Gabriel Marcella . Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2008. Fox News Corporation. “Last American Troops Leave Iraq...by Gabriel Marcella . Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2008. Stewart, Douglas. “Constructing the Iron Cage: The...1947 National Security Act.” In Affairs of State: The Interagency and National Security. Edited by Gabriel Marcella . Carlisle, PA: Strategic

  2. 31 CFR 500.325 - National securities exchange.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 500.325... Definitions § 500.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act of...

  3. 31 CFR 515.325 - National securities exchange.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act of...

  4. 10 CFR 2.903 - Protection of restricted data and national security information.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or...

  5. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  6. Nevada National Security Site Radiological Control Manual

    International Nuclear Information System (INIS)

    2012-01-01

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  7. Nevada National Security Site Radiological Control Manual

    Energy Technology Data Exchange (ETDEWEB)

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  8. 78 FR 48037 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-08-07

    ... Clearance and Safeguarding of National Security Information and Restricted Data AGENCY: Nuclear Regulatory... the objectives of Executive Order 13526, Classified National Security Information. The rule allows... signed Executive Order 13526, Classified National Security Information, which was published in the...

  9. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  10. Los Alamos National Lab: National Security Science

    Science.gov (United States)

    SKIP TO PAGE CONTENT Los Alamos National Laboratory Delivering science and technology to protect Museum New Hires Publications Research Library Mission Science & Innovation Science & Innovation Facilities Science Pillars Research Library Science Briefs Science News Lab Organizations Science Programs

  11. Fossil energy and food security

    International Nuclear Information System (INIS)

    Folke, G.

    2001-01-01

    To fulfil the basic goal of delivering food for the tables of the citizens, modern Western agriculture is extremely dependent on supporting material flows, infrastructure, and fossil energy. According to several observers, fossil fuel production is about to peak, i.e., oil extraction is no longer capable of keeping pace with the increasing demand. This situation may trigger an unprecedented increase in fossil energy prices, which may make the current highly energy dependent food production-distribution system highly vulnerable. The paper starts with a survey of this vulnerability. Also, the supply of phosphorus, a key factor in agriculture, may be at stake under such circumstances. The paper analyses this situation and discusses settlement structures integrated with agriculture that might increase food security by reducing energy demands. In the proposed ideal societal structure, agriculture is integrated with settlements and most of the food needed by the population is produced locally, and the nutrients for food production are recycled from households and animals by means of biological processes demanding considerably less mechanical investment and fossil support energy than the conventional type of agriculture. The vulnerability of this structure would be considerably lower, than that of the current system. (author)

  12. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  13. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  14. Establishing a National Nuclear Security Support Centre

    International Nuclear Information System (INIS)

    2014-02-01

    The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the State. The nuclear security regime resembles the layers of an onion, with the equipment and personnel securing the borders and ports representing the outer layer, and nuclear power, research reactors and nuclear medicine facilities representing the inner layers, and the actual target material representing the core. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, including hardware and software. This publication provides practical guidance on the establishment and maintenance of a national nuclear security support centre (NSSC) as a means to ensure nuclear security sustainability in a State. An NSSC's basic purpose is to provide a national focal point for passing ownership of nuclear security knowledge and associated technical skills to the competent authorities involved in nuclear security. It describes processes and methodologies that can be used by a State to analyse the essential elements of information in a manner that allows several aspects of long term, systemic sustainability of nuclear security to be addressed. Processes such as the systematic approach to training, sometimes referred to as instructional system design, are the cornerstone of the NSSC concept. Proper analysis can provide States with data on the number of personnel requiring training and instructors needed, scale and scope of training, technical and scientific support venues, and details on the type and number of training aids or simulators required so that operational systems are not compromised in any way. Specific regulatory guidance, equipment or technology lists, or specifications/design of protection systems are not included in this publication. For such details, the following IAEA publications should be consulted

  15. Energy Security in Asia: Prospects for Regional Cooperation

    OpenAIRE

    Lucas, Nigel

    2014-01-01

    Three case studies illustrate some of the secondary consequences of the search for energy security and its relationship to regional trade and cooperation: the role of the People’s Republic of China, the emerging market in biofuels in Southeast Asia, and diverse feed-in tariffs for renewable energy. The three main ways regional cooperation can strengthen national policies on energy security are (i) sharing information and knowledge to create a sound evidence base for policies, (ii) agreeing on...

  16. National energy balance - 1976

    International Nuclear Information System (INIS)

    1976-01-01

    Based on available data from IBGE, CNP/Petrobras, Eletrobras, Nuclebras and other governmental enterprises the National Energy Balance was done. This publication covers since 1965 to 1975. In conformity to the international rules, the energy resources used for non-energy purposes were excluded. The energy production and consumption for the next ten years were forecasted, considering the actual brazilian energy policy. (E.G.) [pt

  17. Extreme Scale Computing to Secure the Nation

    Energy Technology Data Exchange (ETDEWEB)

    Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

    2009-11-10

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the

  18. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  19. Security Implications Of Italian Nationalism

    Science.gov (United States)

    2016-03-01

    www.economist.com/news/europe/21635792-beppe-grillo-says-he-tired-and-his-movement-tired-his- autocratic - leadership -falling-star. 114 “Italy’s Five Star Movement...and-his-movement-tired-his- autocratic - leadership -falling-star. ———. “Salve Salvini: The Northern League Could Overtake Forza Italia as Italy’s Right...their passionate and flamboyant style , yet there are many more layers underlying the national character. Regional divides within the nation are distinct

  20. Energy security and sustainability in Northeast Asia

    International Nuclear Information System (INIS)

    Hippel, David von; Suzuki, Tatsujiro; Williams, James H.; Savage, Timothy; Hayes, Peter

    2011-01-01

    'Energy Security' has typically, to those involved in making energy policy, meant mostly securing access to oil and other fossil fuels. With increasingly global, diverse energy markets, however, and increasingly transnational problems resulting from energy transformation and use, old energy security rationales are less salient, and other issues, including climate change and other environmental, economic, and international considerations are becoming increasingly important. As a consequence, a more comprehensive operating definition of 'Energy Security' is needed, along with a workable framework for analysis of which future energy paths or scenarios are likely to yield greater Energy Security in a broader, more comprehensive sense. Work done as a part of the Nautilus Institute's 'Pacific Asia Regional Energy Security' (PARES) project developed a broader definition of Energy Security, and described an analytical framework designed to help to compare the energy security characteristics - both positive and negative - of different quantitative energy paths as developed using software tools such as the LEAP (Long-range Energy Alternatives Planning) system.

  1. National energy balance - 1978

    International Nuclear Information System (INIS)

    1978-01-01

    The national energy balance of 1978 shows some modifications in relation to the last year. New tables were included aiming to show the brazilian energy situation, such as the hydraulic potential and the non-renewable energy resources. (E.G.) [pt

  2. National energy balance - 1977

    International Nuclear Information System (INIS)

    1977-01-01

    The national energy balance of the 1976 shows several modifications in relation to the last year. The historical serie is based in more confiable information, from several energy companies. The most greater modifications are on energy source of hard control, such as lignite and charcoal for non-siderurgic uses. (E.G.) [pt

  3. National Energy Balance - 1986

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    The National Energy Balance - 1986 shows energy fluxes of several primary and secondary energy sources, since the production to the final consumption in the main economic sectors, since 1970 to 1985. The incorporation of a new brazilian information is done. (E.G.) [pt

  4. National Energy Balance - 1981

    International Nuclear Information System (INIS)

    Anon.

    1981-01-01

    The National Energy Balance - 1981, shows a new metodology and information in level of several economic sectors, as well as a separation of primary and secondary energy sources, its energy fluxes, i.e. production, imports, exports, consumption, etc...(E.G.) [pt

  5. CSIR ScienceScope: An Energy-secure South Africa

    CSIR Research Space (South Africa)

    CSIR

    2009-06-01

    Full Text Available issues, especially as buildings use more than 25% of national energy consumption. "An Energy-secure South Africa" the theme of this ScienceScope, features a multidisciplinary projects of the R&D work done on alternative energy solutions, clean and cleaner...

  6. Contribution of Renewables to Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    The environmental benefits of renewable energy are well known. But the contribution that they can make to energy security is less widely recognised. This report aims to redress the balance, showing how in electricity generation, heat supply, and transport, renewables can enhance energy security and suggesting policies that can optimise this contribution.

  7. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    Schill, David

    Like civilian infrastructure, Air Force installations are dependent on electrical energy for daily operations. Energy shortages translate to decreased productivity, higher costs, and increased health risks. But for the United States military, energy shortages have the potential to become national security risks. Over ninety-five percent of the electrical energy used by the Air Force is supplied by the domestic grid, which is susceptible to shortages and disruptions. Many Air Force operations require a continuous source of energy, and while the Air Force has historically established redundant supplies of electrical energy, these back-ups are designed for short-term outages and may not provide sufficient supply for a longer, sustained power outage. Furthermore, it is the goal of the Department of Defense to produce or procure 25 percent of its facility energy from renewable sources by fiscal year 2025. In a government budget environment where decision makers are required to provide more capability with less money, it is becoming increasingly important for informed decisions regarding which energy supply options bear the most benefit for an installation. The analysis begins by exploring the field of energy supply options available to an Air Force installation. The supply options are assessed according to their ability to provide continuous and reliable energy, their applicability to unique requirements of Air Force installations, and their costs. Various methods of calculating energy usage by an installation are also addressed. The next step of this research develops a methodology and tool which assesses how an installation responds to various power outage scenarios. Lastly, various energy supply options are applied to the tool, and the results are reported in terms of cost and loss of installation capability. This approach will allow installation commanders and energy managers the ability to evaluate the cost and effectiveness of various energy investment options.

  8. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  9. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities exchange...

  10. Secure Energy Supply 2009. Welcome address

    International Nuclear Information System (INIS)

    Slugen, V.

    2009-01-01

    In this invitation lecture professor Slugen (President of Slovak Nuclear Society and President of European Nuclear Society) invited the participants of the International Conference: Secure Energy Supply 2009.

  11. S.1220: This Act may be referred to as the National Energy Security Act of 1991, introduced in the Senate of the United States, One Hundred Second Congress, First Session, June 5, 1991

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    This bill would reduce the Nation's dependence on imported oil and provide for the energy security of the US. The contents of this bill are extensive. The Titles are as follows: Findings and purposes; Definitions; Corporate average fuel economy; Fleets and alternative fuels; Renewable energy; Energy efficiency; Oil and gas leasing in the Arctic National Wildlife Refuge; Advanced nuclear reactor commercialization; Nuclear reactor licensing; Uranium; Natural gas; Outer continental shelf; Research, development, demonstration and commercialization activities; Coal, coal technology, and electricity; Public Utility Holding Company Act reform; and Strategic petroleum reserve

  12. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  13. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Science.gov (United States)

    2010-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  14. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Science.gov (United States)

    2010-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice...

  15. The overseas acquisitions and equity oil shares of Chinese national oil companies: A threat to the West but a boost to China's energy security?

    International Nuclear Information System (INIS)

    Zhang Zhongxiang

    2012-01-01

    This paper argues that both China and the Western countries need to de-politicize China's global quest for energy security. The Western politicians need to recognize that their rhetoric in relation to China's efforts to secure energy supplies overseas has done nothing but intensify China's fear that they might seek to deny China's access to the oil it needs for the development. China needs to reconsider its stance of distrusting global oil markets and to recognize that the reliance on aggressive acquisitions of overseas oil fields and equity oil production has been of little help in strengthening its energy security. Given that China's energy security depends increasingly and deeply on the stability of global oil markets and reliable and growing oil supplies to the market, China shares with other major oil importing countries profound common interests in maintaining and strengthening the stability of global oil markets and reducing the chance of potential disruptions to oil supply and the resulting damaging oil price shocks.

  16. Comprehensive national energy strategy

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-04-01

    This Comprehensive National Energy Strategy sets forth a set of five common sense goals for national energy policy: (1) improve the efficiency of the energy system, (2) ensure against energy disruptions, (3) promote energy production and use in ways that respect health and environmental values, (4) expand future energy choices, and (5) cooperate internationally on global issues. These goals are further elaborated by a series of objectives and strategies to illustrate how the goals will be achieved. Taken together, the goals, objectives, and strategies form a blueprint for the specific programs, projects, initiatives, investments, and other actions that will be developed and undertaken by the Federal Government, with significant emphasis on the importance of the scientific and technological advancements that will allow implementation of this Comprehensive National Energy Strategy. Moreover, the statutory requirement of regular submissions of national energy policy plans ensures that this framework can be modified to reflect evolving conditions, such as better knowledge of our surroundings, changes in energy markets, and advances in technology. This Strategy, then, should be thought of as a living document. Finally, this plan benefited from the comments and suggestions of numerous individuals and organizations, both inside and outside of government. The Summary of Public Comments, located at the end of this document, describes the public participation process and summarizes the comments that were received. 8 figs.

  17. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership status of any of...

  18. China's energy security: Perception and reality

    Energy Technology Data Exchange (ETDEWEB)

    Leung, Guy C.K., E-mail: guyleung@gmail.co [Hong Kong Energy Studies Centre, Hong Kong Baptist University, Kowloon Tong, Hong Kong Special Administrative Region (Hong Kong)

    2011-03-15

    China, now the world's second-largest economy, is worried about energy security, which underpins the core objectives of Beijing and the political legitimacy of the Communist Party of China. The purpose of this study is to explore certain popular myths about China's energy security. The study consists of six parts. After the introduction, it formulates the obscure concept of 'energy security' and attempts to contextualize it with 'Chinese characteristics.' Then it explicitly points out that the largest driver of oil demand by China as the 'World's Factory' is transport instead of industry. Next, it explores the effectiveness of transnational pipelines as a measure of energy security and explains why they are less effective than many observers have previously assumed. Furthermore, it investigates the global expansion of Chinese national oil companies and questions their actual contribution to energy security. A few concluding remarks then follow. - Research highlights: {yields} Oil is the form of energy that has produced most of China's energy insecurity. {yields} Transport sector, rather than industry, is the largest driver of China's oil demand. {yields} The contribution of oil pipelines to China's energy security is smaller than many assumed. {yields} Acquisition of oil reserves abroad cannot necessarily guarantee China a supply of oil that is more reliable and less expensive. {yields} Energy security is a means; it is not a goal.

  19. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  20. Climate Change and Risks to National Security

    Science.gov (United States)

    Titley, D.

    2017-12-01

    Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.

  1. National energy efficiency programme

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper focusses on energy conservation and specifically on energy efficiency which includes efficiency in the production, delivery and utilisation of energy as part of the total energy system of the economy. A National Energy Efficiency Programme is being launched in the Eighth Plan that will take into account both macro level and policy and planning considerations as well as micro level responses for different category of users in the industry, agriculture, transport and domestic sectors. The need for such a National Energy Efficiency Programme after making an assessment of existing energy conservation activities in the country is discussed. The broad framework and contents of the National Energy Efficiency Programme have been outlined and the Eighth Plan targets for energy conservation and their break-up have been given. These targets, as per the Eighth Plan document are 5000 MW in electricity installed capacity and 6 million tonnes of petroleum products by the terminal year of the Eighth Plan. The issues that need to be examined for each sector for achieving the above targets for energy conservation in the Eighth Plan are discussed briefly. They are: (a) policy and planning, (b) implementation arrangements which include the institutional setup and selective legislation, (c) technological requirements, and (d) resource requirements which include human resources and financial resources. (author)

  2. G-8 leaders tackle global energy security

    International Nuclear Information System (INIS)

    Quevenco, R.

    2006-01-01

    Leaders of the Group of 8 countries backed the IAEA's work at their annual summit held 15-17 July 2006 in St. Petersburg, Russia. A concluding summary statement endorsed IAEA programmes and initiatives in areas of nuclear safety, security, and safeguards. The G8 nations adopted a St. Petersburg Plan of Action to increase transparency, predictability and stability of the global energy markets, improve the investment climate in the energy sector, promote energy efficiency and energy saving, diversify energy mix, ensure physical safety of critical energy infrastructure, reduce energy poverty and address climate change and sustainable development. In a statement on global energy security, the G8 said countries who have or are considering plans for nuclear energy believe it will contribute to global energy security while reducing air pollution and addressing climate change. The G8 said it acknowledged the efforts made in development by the Generation IV International Forum (GIF) and the IAEA's International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO). GIF and INPRO both bring together countries to develop next generation nuclear energy systems, including small reactors, very high temperature reactors and supercritical water-cooled reactors. The G8 reaffirmed its full commitment to all three pillars of the NPT and called on all States to comply with their NPT obligations, including IAEA safeguards as well as developing effective measures aimed at preventing trafficking in nuclear equipment, technology and materials. The G8 is seeking universal adherence to IAEA comprehensive safeguards agreements and is actively engaged in efforts to make comprehensive safeguards agreements together with an Additional Protocol the universally accepted verification standard. The G8 noted that an expansion of the peaceful use of nuclear energy must be carried forward in a manner consistent with nuclear non-proliferation commitments and standards. It discussed concrete

  3. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  4. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    Managers' Council, Radiological Control

    2018-03-12

    This is a shared document required by 10 CFR 835 for all contractors conducting radiological work at the Nevada National Security Site. Please record the Author as "Radiological Control Managers' Council" for consistency with previous RPPs and Rad Con Manuals.

  5. The Internal Aspects of Ukrainian National Security

    National Research Council Canada - National Science Library

    Bazhenov, Igor

    1997-01-01

    .... Poor economic conditions, organized crime, high levels of corruption within the government, and an irresponsible parliament are the primary causes of instability in Ukraine. Resolution of these issues is vital to Ukrainian National Security as well as the continuation of Ukrainian independence.

  6. 78 FR 45255 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-07-26

    ... Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. [[Page 45256... President's National Security Telecommunications Advisory Committee (NSTAC) will meet on Tuesday, August 20... related to national security and emergency preparedness (NS/EP) telecommunications policy. Agenda: The...

  7. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-01-25

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Communications System... Telecommunications Advisory Committee (NSTAC) will be meeting by teleconference; the meeting will be open to the... implementing national security and emergency preparedness telecommunications policy. Notice of this meeting is...

  8. Energy security externalities and fuel cycle comparisons

    International Nuclear Information System (INIS)

    Bohi, D.; Toman, M.

    1994-01-01

    Externalities related to 'energy security' may be one way in which the full social costs of energy use diverge from the market prices of energy commodities. Such divergences need to be included in reckoning the full costs of different fuel cycles. In this paper we critically examine potential externalities related to energy security and issues related to the measurement of 2 these externalities, in the context of fuel cycle comparisons

  9. Energy security externalities and fuel cycle comparisons

    Energy Technology Data Exchange (ETDEWEB)

    Bohi, D; Toman, M

    1994-07-01

    Externalities related to 'energy security' may be one way in which the full social costs of energy use diverge from the market prices of energy commodities. Such divergences need to be included in reckoning the full costs of different fuel cycles. In this paper we critically examine potential externalities related to energy security and issues related to the measurement of 2 these externalities, in the context of fuel cycle comparisons.

  10. Transboundary natural area protection: Broadening the definition of national security

    Science.gov (United States)

    Haven B. Cook

    2007-01-01

    This paper looks at the definition and concept of national security, and examines how the environment is linked with national security. The traditional, state view of national security that guides most foreign policy includes the concepts of military power, sovereignty and geopolitical stability. This paper advocates broadening the definition of security to include...

  11. Nevada National Security Site Environmental Report 2011 Summary

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  12. Nevada National Security Site Environmental Report 2011 Summary

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  13. Viability of Hydrogen Pathways that Enhance Energy Security: A Comparison of China and Denmark

    DEFF Research Database (Denmark)

    Ren, Jingzheng; Andreasen, Kristian Peter; Sovacool, Benjamin

    2014-01-01

    When designed and built properly, hydrogen energy systems can enhance energy security through technological diversification and minimizing dependence on foreign imports of energy fuels. However, hydrogen can be produced from different feedstocks according to separate pathways, and these different...... pathways create particular consequences on a nation's overall energy security. The objective of this study is to investigate the superiorities and inferiorities of hydrogen pathways from the perspective of China and Denmark, and to determine which pathways best contribute to national energy security...

  14. ESCAPE. Energy Security and ClimAte Policy Evaluation

    International Nuclear Information System (INIS)

    Kessels, J.R.; Bakker, S.J.A.

    2005-05-01

    Climate change and energy supply security policy are currently not integrated in most countries, despite possible synergies. The ESCAPE approach suggests that linking climate change policy with security of energy supply could improve climate change policy at both a national and international level. The report explores the interaction between policies of energy security and climate change and the options of inclusion of energy security issues into national and international post-2012 climate negotiations. It emphasises the importance of the US in this regard and takes a close look at US energy policy documents. It appears that current US energy policy is not directed towards reducing its reliance on imported fossil fuel, even though the government has a strong preference for this. This study shows that measures to reduce import dependency are mostly synergetic with climate policy and gives some options that can be implemented. On an international level, linkages of energy security into post-2012 climate policy may be possible in sectoral bottom-up approaches or technology frameworks. As well, inclusion of a security of supply criterion in international emission trading instruments may provide potential benefits

  15. Conceptualizing and measuring energy security: A synthesized approach

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Mukherjee, Ishani

    2011-01-01

    This article provides a synthesized, workable framework for analyzing national energy security policies and performance. Drawn from research interviews, survey results, a focused workshop, and an extensive literature review, this article proposes that energy security ought to be comprised of five dimensions related to availability, affordability, technology development, sustainability, and regulation. We then break these five dimensions down into 20 components related to security of supply and production, dependency, and diversification for availability; price stability, access and equity, decentralization, and low prices for affordability; innovation and research, safety and reliability, resilience, energy efficiency, and investment for technology development; land use, water, climate change, and air pollution for sustainability; and governance, trade, competition, and knowledge for sound regulation. Further still, our synthesis lists 320 simple indicators and 52 complex indicators that policymakers and scholars can use to analyze, measure, track, and compare national performance on energy security. The article concludes by offering implications for energy policy more broadly. -- Highlights: → Energy security should consist of five dimensions related to availability, affordability, technology development, sustainability, and regulation. → The dimensions of energy security can be broken down into 20 components. → These components can be distilled into 320 simple indicators and 52 complex indicators.

  16. Energy Security and Sub-Saharan Africa

    Directory of Open Access Journals (Sweden)

    Emily Meierding

    2013-02-01

    Full Text Available Published by Palgrave MacmillanOver the last decade the topic of energy security has reappeared on global policy agendas. Most analyses of international energy geopolitics examine the interests and behaviour of powerful energy-importing countries like the US and China. This chapter begins by examining foreign powers’ expanded exploitation of oil and uranium resources in Sub-Saharan Africa. It goes on to examine how energy importers’ efforts to enhance their energy security through Africa are impacting energy security within Africa. It assesses Sub-Saharan states’ attempts to increase consumption of local oil and uranium reserves. Observing the constraints on these efforts, it then outlines some alternative strategies that have been employed to enhance African energy security. It concludes that, while local community-based development projects have improved the well-being of many households, they are not a sufficient guarantor of energy security. Inadequate petroleum access, in particular, remains a development challenge. Foreign powers’ efforts to increase their oil security are undermining the energy security of Sub-Saharan African citizens.

  17. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC; Environmental Compliance Department Environment, Safety, and Health Division Y-12 National Security Complex

    2004-03-31

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT), the Y-12 management and operations (M&O) contractor for DOE. This GWPP management plan addresses the requirements of DOE Order 450.1 (BWXT Y12 S/RID) regarding the implementation of a site-wide approach for groundwater protection at each DOE facility. Additionally, this plan is a ''living'' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP, and an overview of ongoing Y-12 groundwater monitoring activities. Section 3 describes the key elements of the GWPP management strategy. Organizational roles and responsibilities of GWPP personnel are outlined in Section 4. Section 5 presents an overview of the GWPP project plans for applicable programmatic elements. Section 6 lists the reports, plans, and documents that are referenced for technical and administrative details.

  18. MEMS and MOEMS for national security applications

    Science.gov (United States)

    Scott, Marion W.

    2003-01-01

    Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.

  19. Critical Infrastructure Protection: Maintenance is National Security

    Directory of Open Access Journals (Sweden)

    Kris Hemme

    2015-10-01

    Full Text Available U.S. critical infrastructure protection (CIP necessitates both the provision of security from internal and external threats and the repair of physically damaged critical infrastructure which may disrupt services. For years, the U.S. infrastructure has been deteriorating, triggering enough damage and loss of life to give cause for major concern. CIP is typically only addressed after a major disaster or catastrophe due to the extreme scrutiny that follows these events. In fact, CIP has been addressed repeatedly since Presidential Decision Directive Sixty-Three (PDD Sixty-Three signed by President Bill Clinton on May Twenty-Second, 1998.[1] This directive highlighted critical infrastructure as “a growing potential vulnerability” and recognized that the United States has to view the U.S. national infrastructure from a security perspective due to its importance to national and economic security. CIP must be addressed in a preventive, rather than reactive, manner.[2] As such, there are sixteen critical infrastructure sectors, each with its own protection plan and unique natural and man-made threats, deteriorations, and risks. A disaster or attack on any one of these critical infrastructures could cause serious damage to national security and possibly lead to the collapse of the entire infrastructure. [1] The White House, Presidential Decision Directive/NSC–63 (Washington D.C.: The White House, May 22, 1998: 1–18, available at: http://www.epa.gov/watersecurity/tools/trainingcd/Guidance/pdd-63.pdf. [2] Ibid, 1.

  20. National hydrogen energy roadmap

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2002-11-01

    This report was unveiled by Energy Secretary Spencer Abraham in November 2002 and provides a blueprint for the coordinated, long-term, public and private efforts required for hydrogen energy development. Based on the results of the government-industry National Hydrogen Energy Roadmap Workshop, held in Washington, DC on April 2-3, 2002, it displays the development of a roadmap for America's clean energy future and outlines the key barriers and needs to achieve the hydrogen vision goals defined in

  1. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal

  2. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Science.gov (United States)

    2010-10-01

    ... requirements-national security contracts. 1352.237-72 Section 1352.237-72 Federal Acquisition Regulations... Provisions and Clauses 1352.237-72 Security processing requirements—national security contracts. As prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National...

  3. Scientific Openness and National Security at the National Laboratories

    Science.gov (United States)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  4. 40 CFR 1042.635 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false National security exemption. 1042.635... Compliance Provisions § 1042.635 National security exemption. The standards and requirements of this part and... government responsible for national defense. (b) Manufacturers may request a national security exemption for...

  5. 40 CFR 85.1708 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense. [39 FR 32611, Sept. 10...

  6. Selecting RMF Controls for National Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Witzke, Edward L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  7. A study on energy security and nuclear energy role

    International Nuclear Information System (INIS)

    Ujita, Hiroshi

    2011-01-01

    Energy security was a major concern for OECD governments in the early 1970s. Since then, successive oil crises, volatility of hydrocarbon prices, as well as terrorist risks and natural disasters, have brought the issue back to the centre stage of policy agendas. Here, an energy security concept has been proposed, which is defined by time frame and space frame as well. Wide-meaning energy security is divided broadly into two categories. One is short-term (∼10 y) energy crisis, which is narrow-meaning energy security. Short-term energy crisis is further divided into contingent crisis, such as energy supply chain (sealane) interruption due to conflict, accident, terrorism, etc., and structural crisis, such as price fluctuations, supply shortage, energy demand increase in Asia, technology development stagnation, etc. The other is long-term (∼100 y) energy crisis and global energy problems, such as fossil fuel exhaustion and global warming. (author)

  8. Neutron and Gamma Imaging for National Security Applications

    Science.gov (United States)

    Hornback, Donald

    2017-09-01

    The Department of Energy, National Nuclear Security Administration (NNSA), Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D/NA-22) possesses, in part, the mission to develop technologies in support of nuclear security efforts in coordination with other U.S. government entities, such as the Department of Defense and the Department of Homeland Security. DNN R&D has long supported research in nuclear detection at national labs, universities, and through the small business innovation research (SBIR) program. Research topics supported include advanced detector materials and electronics, detection algorithm development, and advanced gamma/neutron detection systems. Neutron and gamma imaging, defined as the directional detection of radiation as opposed to radiography, provides advanced detection capabilities for the NNSA mission in areas of emergency response, international safeguards, and nuclear arms control treaty monitoring and verification. A technical and programmatic overview of efforts in this field of research will be summarized.

  9. Wildlife on the Nevada National Security Site

    Science.gov (United States)

    Longshore, Kathleen M.; Wessells, Stephen M.

    2017-09-05

    Mountain lions, desert bighorn sheep, mule deer, and a variety of other wildlife live on and pass through the Nevada National Security Site each day. It is a highly restricted area that is free of hunting and has surprisingly pristine areas. This 22-minute program highlights an extraordinary study on how mountain lions interact with their prey. It shows how the scientists use helicopters and classical lion tracking to check on these animals' health, follow their movements, and fit them with GPS collars. Results from this work provide impressive insight into how these animals survive. The video is also available at the following YouTube link: Wildlife on the Nevada National Security Site.

  10. Materials @ LANL: Solutions for National Security Challenges

    Science.gov (United States)

    Teter, David

    2012-10-01

    Materials science activities impact many programmatic missions at LANL including nuclear weapons, nuclear energy, renewable energy, global security and nonproliferation. An overview of the LANL materials science strategy and examples of materials science programs will be presented. Major materials leadership areas are in materials dynamics, actinides and correlated electron materials, materials in radiation extremes, energetic materials, integrated nanomaterials and complex functional materials. Los Alamos is also planning a large-scale, signature science facility called MaRIE (Matter Radiation Interactions in Extremes) to address in-situ characterization of materials in dynamic and radiation environments using multiple high energy probes. An overview of this facility will also be presented.

  11. Nuclear Arms and National Security. 1983 National Issues Forum.

    Science.gov (United States)

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  12. Theoreticalaspects ofinformation war and national security

    OpenAIRE

    A. V. Shumka; P. H. Chernyk

    2015-01-01

    A wide and comprehensive analysis of methods of conducting information war to create an effective mechanism of counteraction has extremely important significance. Information warfare ­ acts committed to achieve information superiority in support of national military strategy due to the impact of information and information systems enemy while ensuring the security of its own information and information systems. Today the term «information war» is used in two areas: in the broadest sense ­ ...

  13. Security Clearances and the Protection of National Security Information: Law and Procedures

    National Research Council Canada - National Science Library

    Cohen, Sheldon

    2000-01-01

    ... designed to protect National Security information. The report provides an authoritative compendium for lawyers, security officers and for managers of corporations who must deal with the legal and procedural aspects of security clearances...

  14. The national security dividend of global carbon mitigation

    International Nuclear Information System (INIS)

    Mignone, Bryan K.

    2007-01-01

    Energy and environmental security objectives are often conflated in political circles and in the popular press. Results from a well-established integrated assessment model suggest that policies designed to stabilize atmospheric carbon dioxide concentrations at levels above ∼500 ppm generally do not align with policies to curb global oil dependence, because these atmospheric objectives can be achieved largely through reductions in global coal consumption. Policies designed to stabilize atmospheric carbon dioxide at levels below ∼500 ppm, on the other hand, directly facilitate the alignment of environmental and security objectives because atmospheric targets in this range demand significant reductions in both coal and oil use. Greater recognition that investment in carbon mitigation can yield significant security dividends may alter the political cost-benefit calculus of energy-importing nations and could increase the willingness of some key global actors to seek binding cooperative targets under any post-Kyoto climate treaty regime

  15. 75 FR 82039 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2010-12-29

    ... Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public. DATES: The Committee will meet on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-1005] National Maritime Security Advisory...

  16. 75 FR 38536 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2010-07-02

    ... Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public. DATES: The Committee will meet on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0586] National Maritime Security Advisory...

  17. 77 FR 51817 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-08-27

    ... the information sharing efforts of the Coast Guard and DHS. (2) Cyber-Security. The Committee will... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0797] National Maritime Security Advisory...: The National Maritime Security Advisory Committee (NMSAC) will meet on September 11-12, 2012 in the...

  18. Energy security - how far possible in reality?

    International Nuclear Information System (INIS)

    Das, Pradip Kumar; Bera, R.; Chaki, Dibabasu

    2014-01-01

    In the context of depletion of fossil fuels and continuous increase of global warming, future energy security is under a big question. Generation of energy in conventional method and utilization of energy always produces huge amount of pollution. That is why alternative sources of energy i.e. renewable power is highly solicited. But different factors like man, market, politics, population etc. play very important role in this chain. The authors are advocating that energy security problem is a techno-economic socio-political problem. (author)

  19. Energy security in ASEAN: A quantitative approach for sustainable energy policy

    International Nuclear Information System (INIS)

    Tongsopit, Sopitsuda; Kittner, Noah; Chang, Youngho; Aksornkij, Apinya; Wangjiraniran, Weerin

    2016-01-01

    We investigate energy security of the Association of Southeast Asian Nations (ASEAN) under the 4-A’s framework. The ASEAN Economic Community (AEC) agreement launched in 2015 renewed a regional focus on energy security and sustainability. We employ an analytic framework to quantitatively assess progress in different categories including availability, acceptability, affordability, and applicability. Key metrics include the documentation of CO_2 emissions, energy access measures, and energy supply reserves from 2005–2010. We identify relevant energy indicators using high quality historical data from the IEA and World Bank. We find that ASEAN made little progress toward establishing energy security in the previous five-year planning period (2005–2010) as it regressed in most categories except applicability. Therefore, we suggest that increased development of renewable energy and energy efficiency technologies would move ASEAN in a positive direction toward achieving energy security and sustainable energy policy goals. - Highlights: • We investigate energy security in ASEAN across four dimensions. • Energy security in ASEAN has mostly regressed from 2005–2010. • Future cooperative agreements will help ASEAN improve energy security.

  20. National Security and the Right to Information in Europe

    DEFF Research Database (Denmark)

    Jacobsen, Amanda Lynn

    2013-01-01

    Full text available at: http://cast.ku.dk/pdf/National_Security_and_the_Right_to_Information.pdf/......Full text available at: http://cast.ku.dk/pdf/National_Security_and_the_Right_to_Information.pdf/...

  1. 77 FR 75182 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-12-19

    ... Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... Security Telecommunications Advisory Committee (NSTAC) will meet on Friday, January 11, 2013, via... related to national security and emergency preparedness telecommunications policy. Agenda: The NSTAC...

  2. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-05-27

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs... Security Telecommunications Advisory Committee (NSTAC) will be meeting by teleconference; the meeting will... telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee Act (FACA), Public...

  3. CNSS: Interagency Partnering to Protect Our National Security Systems

    National Research Council Canada - National Science Library

    Grimes, John G

    2008-01-01

    .... The CNSS performs the vital function of mobilizing the full, interagency National Security Community for the protection of telecommunications and information systems that support U.S. national security...

  4. Groundwater Protection Program Management Plan For The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental, LLC

    2009-09-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of Babcock & Wilcox Technical Services Y-12 LLC (hereafter referenced as B&W Y-12), the Y-12 management and operations (M&O) contractor for DOE. B&W Y-12 is a new corporate name, assumed in January 2007, for the company formerly known as BWXT Y-12, L.L.C., hereafter referenced as BWXT. This GWPP management plan addresses the requirements of DOE Order 450.1A Environmental Protection Program (hereafter referenced as DOE O 450.1A), which emphasize a site-wide approach for groundwater protection at each DOE facility through implementation of groundwater surveillance monitoring. Additionally, this plan addresses the relevant and applicable GWPP elements and goals described in the DOE O 450.1A technical guidance documents issued in June 2004 (DOE 2004) and May 2005 (DOE 2005). This GWPP management plan is a 'living' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP

  5. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  6. Energy Security in a Time of Plenty

    National Research Council Canada - National Science Library

    Clawson, Patrick

    1997-01-01

    Energy supply trends are good for Western security. Dependence on the volatile Persian Gulf may increase only slightly, as additional supplies come from stable pro-Western areas, such as Norway and Latin America...

  7. Energy security and climate policy. Assessing interactions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-03-28

    World energy demand is surging. Oil, coal and natural gas still meet most global energy needs, creating serious implications for the environment. One result is that CO2 emissions, the principal cause of global warming, are rising. This new study underlines the close link between efforts to ensure energy security and those to mitigate climate change. Decisions on one side affect the other. To optimise the efficiency of their energy policy, OECD countries must consider energy security and climate change mitigation priorities jointly. The book presents a framework to assess interactions between energy security and climate change policies, combining qualitative and quantitative analyses. The quantitative analysis is based on the development of energy security indicators, tracking the evolution of policy concerns linked to energy resource concentration. The 'indicators' are applied to a reference scenario and CO2 policy cases for five case-study countries: The Czech Republic, France, Italy, the Netherlands, and the United Kingdom. Simultaneously resolving energy security and environmental concerns is a key challenge for policy makers today. This study helps chart the course.

  8. Energy security in China and in India

    International Nuclear Information System (INIS)

    2014-04-01

    In the first part, this report addresses the issue of energy security in China. The authors first consider renewable energies by discussing the Chinese policy (incentive policies, delayed reforms, issue of a legal framework to promoter these energies), and by commenting the case of wind energy (a too strong emergence, promotion policies, wind energy industry, a disordered growth, quality vs quantity) and the case of solar energy (a recent but strong lift off, uncertainty about the international context and focus on the domestic market). The authors outline the necessity of a reform, the difficulties faced on the short term, and some suggested solutions. They more briefly address the cases of hydraulic energy and biomass. They address the case of fossil energies for which China is facing an increasing demand but also technical and institutional challenges which limit the development of this sector. Therefore, China uses foreign supplies: this a source of partnerships but also of conflicts. Opportunities for the French expertise are outlined. The specific case of coal is analysed: a pillar of energy security for China, a new industry, with necessary reforms, and opportunities for foreign companies. The second part of the report addresses the issue of energy security in India. The authors first comment the Indian energy mix. They outline that energy security is weakened by governance problems, and that imports are used to address domestic shortages

  9. Exploring propositions about perceptions of energy security: An international survey

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Valentine, Scott Victor; Jain Bambawale, Malavika; Brown, Marilyn A.; Fátima Cardoso, Terezinha de; Nurbek, Sayasat; Suleimenova, Gulimzhan; Li Jinke; Xu Yang; Jain, Anil; Alhajji, A.F.; Zubiri, Andrew

    2012-01-01

    This study investigates how energy users from government, industry, civil society, and academia perceive of energy security challenges. It also analyzes how demographic characteristics influence such perceptions, and how geography, economic structure, modes of domestic energy production, and culture shape energy security priorities. Its primary source of data is a four-part survey distributed in seven languages (English, Mandarin, Portuguese, Russian, Arabic, German, and Japanese) to 2167 respondents in Brazil, China, Germany, India, Kazakhstan, Japan, Papua New Guinea, Saudi Arabia, Singapore, and the United States. These countries were selected because they represent a mix of urban and rural populations, developed and developing economies, import- and export-oriented energy trading flows, communist and capitalist societies, liberalized and state-owned energy markets, and small and large geographic sizes. The survey results are used to test four propositions about energy security related to the education, age, occupation, and gender of respondents, as well five propositions about national energy priorities and the interconnected attributes of security of supply, energy efficiency, energy research and development, energy trade, diversification and decentralization, affordability, environmental quality, climate change, and energy governance.

  10. Nuclear energy in Romania - a road to energy security

    International Nuclear Information System (INIS)

    Chirica, T.; Lucaciu, G.

    2009-01-01

    The Nuclear Program in Romania is a part of the national and European energy policy: sustainable development, security of energy supply and competitiveness; Romania has a proven experience in construction, commissioning and operation of NPPs, as well as the necessary support infrastructure: Unit 2 completion represents the major project of Nuclearelectrica during its first decade of existence; Innovative approach of Nuclearelectrica related is applied to Cernavoda NPP Units 3 and 4 completion: Major project for the second decade of company life; Risks management and allocation – major tool for project management and financing closure; Support from the political class is crucial, considering that the completion of such projects are covering more than one elections cycle

  11. Nuclear energy and the security of energy supply

    International Nuclear Information System (INIS)

    Bertel, E.

    2005-01-01

    Security of energy supply was a major concern for OECD governments in the early 1970. Since then, successive oil crises, volatility of hydrocarbon prices, as well as terrorist risks and natural disasters, have brought the issue back to the centre stage of policy agendas. In this paper, the author discusses the problem of energy supply security. Can security of supply be measured? What is the role of government and of nuclear energy? And what are measures for ensuring security of supply? (A.L.B.)

  12. Exogenous shocks and governing energy security

    OpenAIRE

    Diriöz, Ali Oğuz

    2017-01-01

    Cataloged from PDF version of article. Thesis (Ph.D.): Bilkent University, Department of International Relations, İhsan Doğramacı Bilkent University, 2017. Includes bibliographical references (leaves 219-248). The research examines how governments maintain energy security when faced with exogenous shocks. The main focus of inquiry examines the relative influence of markets vs. geopolitics in the area of energy security using the comparative case studies of Turkey, France, and Netherl...

  13. 78 FR 48076 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-08-07

    ...-2011-0268] RIN 3150-AJ07 Facility Security Clearance and Safeguarding of National Security Information..., Classified National Security Information. The rule would allow licensees flexibility in determining the means... licensee security education and training programs and enhances the protection of classified information...

  14. Indicators of energy security in industrialised countries

    International Nuclear Information System (INIS)

    Loeschel, Andreas; Moslener, Ulf; Ruebbelke, Dirk T.G.

    2010-01-01

    Energy security has become a popular catch phrase, both in the scientific arena as well as in the political discussion. Yet, in general the applied concepts of energy security are rather vague. This paper sheds some light on concepts and indicators of energy security. First, we conceptually discuss the issue of energy supply security and explain why it is not to handle by one science alone and what economics may contribute in order to structure the topic. After providing a brief survey of existing attempts to define or measure energy security we suggest an additional dimension along which indicators of energy security may be classified: ex-post and ex-ante indicators. Finally, we illustrate our concept on the basis of several simplified indicators. While ex-post indicators are mostly based on price developments, ex-ante indicators are to a greater extent aimed at illustrating potential problems. Our illustration suggests that it is worthwhile to take into account the market structure along with the political stability of exporting countries. (author)

  15. Evaluation of nuclear energy in the context of energy security

    International Nuclear Information System (INIS)

    Irie, Kazutomo; Kanda, Keiji

    2002-01-01

    This paper analyzes the view expressed by the Japanese government on the role of nuclear energy for energy security through scrutiny of Japan's policy documents. The analysis revealed that the contribution by nuclear energy to Japan's energy security has been defined in two ways. Nuclear energy improves short-term energy security with its characteristics such as political stability in exporting countries of uranium, easiness of stockpiling of nuclear fuels, stability in power generation cost, and reproduction of plutonium and other fissile material for use by reprocessing of spent fuel. Nuclear energy also contributes to medium- and long-term energy security through its characteristics that fissile material can be reproduced (multiplied in the case of breeder reactor) from spent fuels. Further contribution can be expected by nuclear fusion. Japan's energy security can be strengthened not only by expanding the share of nuclear energy in total energy supply, but also by improving nuclear energy's characteristics which are related to energy security. Policy measures to be considered for such improvement will include (a) policy dialogue with exporting countries of uranium, (b) government assistance to development of uranium mines, (c) nuclear fuel stockpiling, (d) reprocessing and recycling of spent fuels, (e) development of fast breeder reactor, and (f) research of nuclear fusion. (author)

  16. 78 FR 69286 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-11-19

    ... Clearance and Safeguarding of National Security Information and Restricted Data AGENCY: Nuclear Regulatory... Executive Order 13526, Classified National Security Information. In addition, this direct final rule allowed... licensees (or their designees) to conduct classified [[Page 69287

  17. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...

  18. 48 CFR 6.302-6 - National security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the agency...

  19. 48 CFR 606.302-6 - National security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  20. 39 CFR 267.5 - National Security Information.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false National Security Information. 267.5 Section 267.5... § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide regulations implementing Executive Order 12356 National Security Information (hereinafter referred to as the...

  1. 28 CFR 501.2 - National security cases.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is a...

  2. 40 CFR 90.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request for...

  3. 40 CFR 92.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must be...

  4. 76 FR 28960 - National Security Education Board Members Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  5. 40 CFR 91.1008 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  6. 3 CFR 101.4 - National Security Council.

    Science.gov (United States)

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI. ...

  7. 40 CFR 205.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2... PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security... a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  8. 40 CFR 211.110-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 211.110... ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A new product which is produced to conform with specifications developed by national security agency...

  9. 40 CFR 94.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary. (2...

  10. 77 FR 49439 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-08-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Secretary of Defense concerning requirements established by the David L. Boren National Security Education...

  11. 77 FR 9214 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-02-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... meeting of the National Security Education Board. The purpose of the meeting is to review and make... p.m. ADDRESSES: Defense Language and National Security Education Office, 1101 Wilson Boulevard...

  12. 77 FR 27739 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-05-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  13. 36 CFR 1256.46 - National security-classified information.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National Security...

  14. 48 CFR 204.470-2 - National security exclusion.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false National security... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... associated with such activities, with direct national security significance. (b) In order to ensure that all...

  15. 40 CFR 204.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  16. 40 CFR 89.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  17. Energy exchange increases supply security

    International Nuclear Information System (INIS)

    Van Baarle, D.

    2004-01-01

    Since October 5, 2004, Endex is an official futures market for energy. All the energy businesses and large-scale consumers in the Netherlands can trade electricity, and in the future also gas, anonymously [nl

  18. Water security-National and global issues

    Science.gov (United States)

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  19. Evolution of gas markets and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Mitrova, Tatiana

    2007-07-01

    Questions of energy security and international gas trade became indissolubly connected during the last years. Paradoxically during the evolution of natural gas markets concerns about security issues in gas trade are only growing at the same time as transaction costs. Market participants have developed several mechanisms of adaptation (vertical integration, mutual penetration of capital and long-term contracts) which should be regarded not as a market failure but as an essential part of energy security guarantees at the moment. Further gas market evolution will demand more unified institutional framework to decrease threats to energy security and transaction costs. But this framework should be a result of mutual compromise of all market participants. (auth)

  20. Development of Nuclear Energy Security Code

    International Nuclear Information System (INIS)

    Shimamura, Takehisa; Suzuki, Atsuyuki; Okubo, Hiroo; Kikuchi, Masahiro.

    1990-01-01

    In establishing of the nuclear fuel cycle in Japan that have a vulnerability in own energy structure, an effectiveness of energy security should be taken into account as well as an economy based on the balance of supply and demand of nuclear fuels. NMCC develops the 'Nuclear Energy Security Code' which was able to evaluate the effectiveness of energy security. Evaluation method adopted in this code is 'Import Premium' which was proposed in 'World Oil', EMF Report 6. The viewpoints of evaluation are as follows: 1. How much uranium fuel quantity can be reduced by using plutonium fuel? 2. How much a sudden rise of fuel cost can be absorbed by establishing the plutonium cycle beforehand the energy crisis? (author)

  1. Energy security in a competitive world

    International Nuclear Information System (INIS)

    Stevenson, M.G.

    1989-01-01

    The world is shrinking and becoming increasingly interconnected. Events in one part of the world quickly impact other parts of the world. Rising standards of living in developed countries, along with rapid communications and growing, mobile populations, go hand in hand with greater worldwide interconnectedness but at the same time are leading to a greater rate of resource depletion. Adequate and economical energy resources are one of the crucial factors in maintaining and increasing standards of living around the world, yet nonrenewable energy resources are being depleted. The international marketplace is also becoming more tightly interconnected and competitive. Increasing trade competition among nations may lead to greater economic efficiency and, on the whole, to improved living standards in successful countries, but competition also contributes to barriers against cooperation. International trade competition may be leading to a tendency for competing nations to become more parochial in technology research and development. The impact of growing populations and rising living standards on the world's environment is also increasing and becoming more pervasive. Solid waste disposal is an increasingly aggravating problem, and hazardous waste and toxic wastes are even more difficult to deal with. Acid rain, global climate change, ozone-layer depletion, stream and harbor pollution, and the resulting pollution of the oceans are all evidence of a highly interconnected world. It is easy to argue that solutions must be political, economic, and social. In large part this must be the case; but as technologists, we want to do all we can to give political, economic, and social forces the best opportunity to succeed. Technology will be part of the solution and not just part of the problem of securing adequate energy supplies with acceptable environmental impact. 2 refs

  2. Energy policy of the EU and the role of Turkey in Energy Supply Security

    Directory of Open Access Journals (Sweden)

    MEHTER AYKIN Sibel

    2018-01-01

    Full Text Available All the nations define strategies and develop policies on national and international levels to eliminate risks against energy security. The aim of this paper is to define the energy policy of the European Union and identify the potential of Turkey in securing energy supply to the European Union. To achieve this end, after explaining the policy frame of the European Union and that of Turkey in energy related matters, the existing and planned energy routes expanding from the Russian Federation, Caspian Sea and the Middle East to the European Continent are mapped, and the role assigned to Turkey as an energy hub is exemplified with reference to its accession process. It is concluded that Turkey’s membership is to enrich the European Union and contribute to its energy supply security.

  3. Scientists credit `Atoms for Peace' for progress on energy, security

    CERN Multimedia

    Jones, D

    2003-01-01

    "Fifty years after President Eisenhower unveiled his plan for developing peaceful uses for nuclear fission, the scientific advances spawned by his Atoms for Peace program have made possible major advances in energy and national security, a panel of physicists said last week" (1 page).

  4. Conceptual Framework of Energy Security Assessment in Korea

    International Nuclear Information System (INIS)

    Moon, Kee Hwan; Chung, Whan Sam; Kim, Seung Su

    2016-01-01

    Korea's electric power is an essential source of energy, supplying 21.4% of the energy required by the manufacturing industry, 43.4% of that required for commerce, and 59.5% of that required by the public sector in 2014. Korea relies heavily on imports of energy sources because of its lack of natural resources. Its land area is limited, making it difficult to utilize renewable energy. Moreover, it is difficult to trade electricity through grid connections with neighbouring countries. Considering the key role of electric power in Korea and the circumstances of its power generation industry, we must understand the contribution of each fuel used in power plants to energy sustainability. This study derives the conceptual framework to quantify energy security levels for nuclear power generation in Korea and employ them in evaluating the national energy security. And sample calculation of nuclear energy security indicators is performed. The implications drawn from the evaluation are as follows. Nuclear power demonstrates dominance in the dimensions of economy and technology as the related technologies have entered into the stage of maturity. Without constant technological innovation, however, sustainability of nuclear sources will not be guaranteed. Nuclear has in the middle in terms of SS, but their high volatility impels Korea to pursue the diversification of energy suppliers. The energy security indicators suggested in this study are anticipated to contribute to establishing an energy security policy based on a comprehensive understanding of the energy security status in Korea. In the future, it will be necessary to establish specific scenarios for a decrease of regional conflicts and a post-2020 climate change conventions and conduct realistic and dynamic analyses

  5. Conceptual Framework of Energy Security Assessment in Korea

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Kee Hwan; Chung, Whan Sam; Kim, Seung Su [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    Korea's electric power is an essential source of energy, supplying 21.4% of the energy required by the manufacturing industry, 43.4% of that required for commerce, and 59.5% of that required by the public sector in 2014. Korea relies heavily on imports of energy sources because of its lack of natural resources. Its land area is limited, making it difficult to utilize renewable energy. Moreover, it is difficult to trade electricity through grid connections with neighbouring countries. Considering the key role of electric power in Korea and the circumstances of its power generation industry, we must understand the contribution of each fuel used in power plants to energy sustainability. This study derives the conceptual framework to quantify energy security levels for nuclear power generation in Korea and employ them in evaluating the national energy security. And sample calculation of nuclear energy security indicators is performed. The implications drawn from the evaluation are as follows. Nuclear power demonstrates dominance in the dimensions of economy and technology as the related technologies have entered into the stage of maturity. Without constant technological innovation, however, sustainability of nuclear sources will not be guaranteed. Nuclear has in the middle in terms of SS, but their high volatility impels Korea to pursue the diversification of energy suppliers. The energy security indicators suggested in this study are anticipated to contribute to establishing an energy security policy based on a comprehensive understanding of the energy security status in Korea. In the future, it will be necessary to establish specific scenarios for a decrease of regional conflicts and a post-2020 climate change conventions and conduct realistic and dynamic analyses.

  6. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Science.gov (United States)

    2010-01-01

    ... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A...

  7. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Science.gov (United States)

    2010-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the...

  8. Second Strategic Energy Review. Securing our Energy Future

    International Nuclear Information System (INIS)

    2008-11-01

    Europe has agreed a forward-looking political agenda to achieve its core energy objectives of sustainability, competitiveness and security of supply. This agenda means substantial change in Europe's energy system over the next years, with public authorities, energy regulators, infrastructure operators, the energy industry and citizens all actively involved. It means choices and investments during a time of much change in global energy markets and international relations. The European Commission has therefore proposed a wide-ranging energy package which gives a new boost to energy security in Europe, i.e. putting forward a new strategy to build up energy solidarity among Member States and a new policy on energy networks to stimulate investment in more efficient, low-carbon energy networks; proposing a Energy Security and Solidarity Action Plan to secure sustainable energy supplies in the EU and looking at the challenges that Europe will face between 2020 and 2050; adopting a package of energy efficiency proposals aims to make energy savings in key areas, such as reinforcing energy efficiency legislation on buildings and energy-using products. All relevant and related documents with regard to the Second Strategic Energy Review can be found through this site

  9. US National Security Strategy and preemption

    International Nuclear Information System (INIS)

    Kristensen, H.M.

    2006-01-01

    According to a US National Security Strategy analysis conducted in 2006, preemption has evolved from concept into doctrine. The concept plan for Global Strike (CONPLAN 8022-02) will be maintained by the Joint Functional Component Command for Space and Global Strike (JFCC-SGS), which is planned to be fully operational from the autumn of 2006. The aim of CONPLAN 8022 is to be able to destroy by nuclear weapons those targets that cannot be destroyed by other means. Should deterrence fail, weapons must be ready to be put to use, be they nuclear or conventional. (author)

  10. Economics of international energy security policy

    International Nuclear Information System (INIS)

    Paik, I.K.

    1992-01-01

    Because there is no inexpensive substitute for crude oil and petroleum products at the present time, an oil supply disruption inevitably leads to higher oil prices and economic losses. Wealth transfer to oil producing nations, reduced output increased unemployment and inflation. For these reasons, major oil-consuming countries currently have in place various oil emergency response measures to protect themselves from adverse economic consequences of oil supply disruptions: stockpiling emergency oil reserves to augment supplies, if necessary, in an emergency; and lowering oil demand through non-price mechanisms. The main purpose of this paper is to show that while, supply enhancement and demand reduction could have the same effect on oil prices in the event of an oil supply shortfall, they may have significantly different effects on the economies. Section I discusses the principal oil emergency response measures of the members of the International Energy Agency (IEA) -- emergency oil stockpiles and demand restraint -- and their policies for implementing the measures. Section II describes the analytical method used to perform comparative economic analysis of releasing emergency stocks and restraining demand in an oil emergency. Section III presents quantitative results of the analysis, and Section IV, conclusions of the analytical results and their energy security policy implications

  11. International Conference SES 2006. Secure Energy Supply

    International Nuclear Information System (INIS)

    2006-01-01

    The International Conference SES 2006 (Secure Energy Supply, Bezpecna dodavka energie) was realised in Bratislava, during September 26 - 29, 2006 in the hotel Crowne Plaza and deals with most important problems of world and Slovak energetics. In work of Conference took part 108 slovak and 33 foreign participant from 11 countries of the world. Negotiations were realised in five sessions. First two days were devoted to lectures and second two days were visits of selected slovak energetic equipment. On the Conference has resounded matter of fact, that secure energy supply is extremely important subject for economy, but also for population

  12. Energy supply security and foreign policy

    International Nuclear Information System (INIS)

    2006-05-01

    The title memo has been sent to the Dutch Lower House. This memo reflects the response of the cabinet to the advice on Energetic Foreign Policy of the Dutch Advisory Council on International Affairs (AIV) and the Dutch Energy Council (AER). Moreover, the development of foreign policy with respect to energy supply security is depicted. [mk] [nl

  13. International Conference SES 2009: Secure Energy Supply

    International Nuclear Information System (INIS)

    2009-01-01

    The Conference included the following sessions: Opening addresses; (I) Energy policy; (II) Environment, Renewable sources and NPPs; (III) Secure energy supply - New nuclear units. Verbal 21 presentations have been inputted into INIS, all in the form of the full authors' presentations.

  14. Security Economics and Critical National Infrastructure

    Science.gov (United States)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  15. Providing security assurance in line with national DBT assumptions

    Science.gov (United States)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  16. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex

    International Nuclear Information System (INIS)

    2006-01-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure A.1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling (Section 3.0), whereas wells granted ''inactive'' status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 3.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 4.0). This plan applies to groundwater wells associated with Y-12 and related waste management areas and facilities located within three hydrogeologic regimes (Figure A.1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime encompasses a section of Chestnut Ridge directly south of Y-12 that is bound on the

  17. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure 1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 which provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater sampling (Section 3.0), whereas well granted ''inactive'' status are not used for either purpose. The status designation also determines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 4.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 5.0). This plan applies to groundwater monitoring wells associated with Y-12 and related waste management facilities located within three hydrogeologic regimes (Figure 1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime is directly south of Y-12 and encompasses a section of Chestnut Ridge that is bound to the

  18. 29 CFR 1606.3 - The national security exception.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false The national security exception. 1606.3 Section 1606.3... DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful employment practice to deny employment opportunities to any individual who does not fulfill the national...

  19. Liberalization of electricity markets and energy security

    International Nuclear Information System (INIS)

    Yajima, Masayuki

    2004-01-01

    Liberalization of electricity markets begun in England in 1990 and became the trends of the times. Its effects on the energy security and atomic power generation are discussed. On the effects on energy security, change of construction of fuel of power generation, decrease of fuel feed by high efficiency of power generation, decrease of fuel stock by pressure of cost-cutting, increase of import rate of electricity, increase of power consumption with decrease of power cost, flexibility of supply contract, diversification of service, international cooperation on energy security and mutual dependence relation by international investment are discussed. On the effects of liberalization on the electricity markets, characteristics of nuclear power generation, risk of investment, effects of introduction of competition on development of the existing and new nuclear power generation, relation between development of nuclear power generation and market failure and what the government should do for development of nuclear power generation are discussed. (S.Y.)

  20. China's energy security: The perspective of energy users

    International Nuclear Information System (INIS)

    Bambawale, Malavika Jain; Sovacool, Benjamin K.

    2011-01-01

    The article explores the energy security concerns faced by China from the point of view of energy users working in government, university, civil society and business sectors. The authors first derive a set of seven hypotheses related to Chinese energy security drawn from a review of the recent academic literature. We then explain each of these seven hypotheses, relating to (1) security of energy supply, (2) geopolitics, (3) climate change, (4) decentralization, (5) energy efficiency, (6) research and innovation of new energy technologies, and (7) self sufficiency and trade. Lastly, the article tests these hypotheses through a survey distributed in English and Mandarin completed by 312 Chinese participants. The conclusion presents insights for policymakers and energy scholars.

  1. Energy Security and Renewable Energy in Least Developed Countries

    International Nuclear Information System (INIS)

    Wohlgemuth, N.

    2006-01-01

    The Programme of Action for the Least Developed Countries (UN, 2001) states: The levels of production and consumption of energy in the majority of Least Developed Countries (LDCs) are inadequate and unstable. This clearly indicates a situation of energy insecurity. Starting from an encompassing definition of energy security (a country's ability to expand and optimise its energy resource portfolio and achieve a level of services that will sustain economic growth and poverty reduction), it becomes quickly clear that energy security in LDCs is a complex topic with numerous interlinkages to other sustainable development objectives. This paper attempts to give an overview of issues related to energy security in LDCs by focusing on the role renewable energy can play in that context.(author)

  2. Black Sea Energy Security - Present and Future

    Directory of Open Access Journals (Sweden)

    Florinel Iftode

    2011-05-01

    Full Text Available We chose this theme to highlight the need for continuous and sustained human society to secure energy resources needed to survive, needs reflected in an increasingly in recent years in the strategies adopted at both states, as at the level of international organizations. Achieving security and stability in the wider Black Sea area has been among the priorities of each country's interests in this region. In this context, state and non-state actors were being called to come up with new solutions to achieve those interests. Certainly not in all cases the negotiations were completed or not yet found a generally accepted formula for others to apply, but most of them show off their values. The main environmental threats to security environment in the Black Sea region are represented by ethnic conflicts and territorial secessionism. A significant contribution to the security environment of the Black Sea region has the phenomenon of globalization, which in this region is manifested by a steady increase in traffic and volume of shipping passage of communication, which largely affects the security in the region. Globalization and the need for energy resources in the Black Sea was an important area not only as energy transport route, but as a potential supplier of material energy (oil and natural gas. Black Sea Basin can be stabilized and secured only by the will and input from all States and interested international organizations in pragmatic and effective institutional frameworks, meant to promote and protect the common interests of countries decided to participate in actions aimed at ensuring a stable environment security.

  3. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is not...

  4. 1 THE HUMANITIES AND NATIONAL IDENTITY, SECURITY AND ...

    African Journals Online (AJOL)

    User

    ethnicity in favour of social stability as a pre-requisite for security. ... Humanities, National Identity, Ethnicity, Security and Political. Stability. .... instability. They are often used in open violence during elections where contending political ...

  5. Report of the DHS National Small Vessel Security Summit

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  6. Promoting India's development: energy security and climate security are convergent goals

    Energy Technology Data Exchange (ETDEWEB)

    Rajan, Gupta [Los Alamos National Laboratory; Shankar, Harihar [Los Alamos National Laboratory; Joshi, Sunjoy [INDIA

    2009-01-01

    This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

  7. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon; Lee, Sang Heon

    2012-01-01

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  8. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Sang Heon [Korea National Defense University, Goyang (Korea, Republic of)

    2012-05-15

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  9. Nevada National Security Site Environmental Report Summary 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities and

  10. Human Security and Energy Security: A Sustainable Energy System as a Public Good

    NARCIS (Netherlands)

    Karlsson-Vinkhuyzen, S.I.S.E.; Jollands, N.

    2013-01-01

    This chapter is dedicated to the concept of human security and its link to energy and energy governance, particularly global energy governance. Through this focus emerges the need to look at the links between the concept of public goods and energy. Our starting argument is that conventional notions

  11. Can low-carbon societies deliver on energy security?

    International Nuclear Information System (INIS)

    Jewell, Jessica

    2015-01-01

    The impact of low-carbon policies on energy security depends on both the timing and intensity of these policies, and the definition of energy security: security of what?; security for whom?; and security from which threats? The priorities of the EU’s 2030 climate/energy package and energy security show little if any alignment. Global climate stabilization policies benefit the energy security of India, China, and the EU, but may have negative impacts on export revenues of the U.S. and other energy exporters.

  12. The security of energy supplies in Europe

    International Nuclear Information System (INIS)

    Vuillemin, Francois

    2002-01-01

    As an attempt occurred against a French oil tanker in the Persian Gulf (in 2002), and showed that security of oil supplies is not only related to oil shock or to political environment such as the Cold War, this article discusses issues of security for European energy supplies. It first addresses the situation and the evolution of energy needs and resources in the World and in Europe: predictions of evolution of consumption and production, major role of fossil fuels in the European consumption. It discusses the outage risks: the supply security can be analysed with respect to consumption per sector, per usage or per energy product, and Europe must face three major risks (no more hydrocarbon resources at a reasonable cost, economic risk due to market volatility, geopolitical risk). The next part discusses the perspective of a European strategy. It identifies several elements of choice for Europe in terms of energy demand management, of opening up to competition of electricity and gas markets. It discusses European ambitions in terms of supply security: need of a community framework, actual propositions of a directive for oil and gas

  13. Clean and Secure Energy from Coal

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Philip [Univ. of Utah, Salt Lake City, UT (United States); Davies, Lincoln [Univ. of Utah, Salt Lake City, UT (United States); Kelly, Kerry [Univ. of Utah, Salt Lake City, UT (United States); Lighty, JoAnn [Univ. of Utah, Salt Lake City, UT (United States); Reitze, Arnold [Univ. of Utah, Salt Lake City, UT (United States); Silcox, Geoffrey [Univ. of Utah, Salt Lake City, UT (United States); Uchitel, Kirsten [Univ. of Utah, Salt Lake City, UT (United States); Wendt, Jost [Univ. of Utah, Salt Lake City, UT (United States); Whitty, Kevin [Univ. of Utah, Salt Lake City, UT (United States)

    2014-08-31

    The University of Utah, through their Institute for Clean and Secure Energy (ICSE), performed research to utilize the vast energy stored in our domestic coal resources and to do so in a manner that will capture CO2 from combustion from stationary power generation. The research was organized around the theme of validation and uncertainty quantification (V/UQ) through tightly coupled simulation and experimental designs and through the integration of legal, environment, economics and policy issues.

  14. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  15. An aggregated energy security performance indicator

    International Nuclear Information System (INIS)

    Martchamadol, Jutamanee; Kumar, S.

    2013-01-01

    Highlights: ► AESPI shows a country’s (or province’s) energy security status. ► AESPI considers social, economic and environmental aspects using 25 indicators. ► AESPI shows the impact of the trend of energy policies/measures. ► AESPI could be a tool for monitoring and evaluating the impact of energy policies. -- Abstract: An “Aggregated Energy Security Performance Indicator (AESPI)” has been developed by considering 25 individual indicators representing social, economy and environmental dimensions. The principle used, data required and the methodology for the development of AESPI have been detailed. AESPI requires time series data for its development and its value ranges from 0 to 10. The characteristics of AESPI have been compared with the existing indicators in terms of methodology, data requirements, analysis possible and the applications. The advantages of AESPI is that it not only assists in knowing the past energy security status of a country, but also helps in assessing the future status considering the energy policies and plans of the country, thus enabling the monitoring of the impacts of the policies.

  16. Neuroscience, ethics, and national security: the state of the art.

    Directory of Open Access Journals (Sweden)

    Michael N Tennison

    Full Text Available National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  17. Neuroscience, ethics, and national security: the state of the art.

    Science.gov (United States)

    Tennison, Michael N; Moreno, Jonathan D

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  18. Status of Educational Efforts in National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  19. Japan, new agenda for energy security

    International Nuclear Information System (INIS)

    Chrisstoffels, J.H.

    2007-07-01

    The author argues that the Japanese government will actively seek to strengthen security of supply. Japan has almost no domestic energy reserves. It is Asia's leading energy importer, but it faces increasing competition for resources from China and India. This has led to growing concern among Japanese policy makers. In the spring of 2007 a new Basic Energy Law was drafted that offers a strategic change of direction, away from a policy emphasis on free (energy) trade promotion and liberalisation of domestic energy markets. Japan will boost energy diplomacy towards energy producing countries and increase financial guarantees to Japanese oil and gas development companies. At the same time, Japan will raise efforts to lower its dependency on foreign oil and gas. To this end, it has set ambitious targets for further nuclear power development and the promotion of bio-trade. The author points at a multitude of complexities that may impede the success of these policies, Still, EU policy makers should be aware that Japan's energy policy has changed, driven by the conviction that markets alone cannot be relied upon to guarantee a secure supply of energy. [nl

  20. Lawrence Livermore National Laboratory safeguards and security quarterly progress report to the U.S. Department of Energy. Quarter ending September 30, 1996

    Energy Technology Data Exchange (ETDEWEB)

    Davis, G.; Johnson, D.; Mansur, D.L.; Ruhter, W.D.; Strait, R.S.

    1996-10-01

    The paper describes tasks undertaken in each of the following areas: Safeguards technology program (STP); Safeguards and material accountability (SMA); Computer security, distributed systems; Complex-wide access control system (CWAC); and Standardization of security systems (SSS). The STP develops advanced, nondestructive analysis technology for measurement of special nuclear materials. Work focuses on R and D relating to X- and gamma-ray spectrometry and to development of computer codes for interpreting the spectral data obtained by these techniques. The SMA is concerned with four areas: insider protection; material accountability; planning and evaluation; and information security. The Computer Security Technology Center provides expertise and solutions to the many information security problems present in today`s computer systems and networks. Incidents of intrusions, computer viruses, the purposeful replacement of legitimate software for illegal purposes, and similar acts are being addressed by the creation of security software, the delivery of incident response expertise, and research and development into secure systems. The purpose of the CWAC is to develop an approach that will allow visitors to use their DOE standard badge in access control systems throughout the DOE complex. The purpose of the SSS project is to support the standardization of security systems to meet DOE orders and requirements, and to support the DOE in offering relevant security technology and capabilities to Federal standardization efforts.

  1. Security issues at the Department of Energy and records management

    International Nuclear Information System (INIS)

    NUSBAUM, ANNA W.

    2000-01-01

    In order to discuss the connection between security issues within the Department of Energy and records management, the author covers a bit of security history and talks about what she calls ''the Amazing Project''. Initiated in late May 1999, it was to be a tri-laboratory (Lawrence Livermore National Laboratory of Livermore, California, Los Alamos National Laboratory of Los Alamos, New Mexico, and Sandia National Laboratories of Albuquerque, New Mexico, and Livermore, California) project. The team that formed was tasked to develop the best set of security solutions that still enabled weapon mission work to get done and the security solutions were to be the same set for everyone. The amazing project was called ''The Integrated Security Management Project'', or ''ISecM' for short. She'll describe why she thinks this project was so amazing and what it accomplished. There's a bit of sad news about the project, but then she'll move onto discuss what was learned at Sandia as a result of the project and what they're currently doing in records management

  2. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  3. S. 1514: This Act may be cited as the Department of Energy National Security Act for Fiscal Years 1992 and 1993, introduced in the United States Senate, One Hundred Second Congress, First Session, July 22, 1991

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Title 31, Part A, National Security Programs Authorizations, includes the following sections: Operating Expenses; Plant and Capital Equipment; Environmental Restoration and Waste Management; Funding Limitations; and General Reduction in Authorizations. Part B, Recurring General Provisions, presents the following Sections: Reprogramming; Limits on General Plant Projects; Limits on construction Projects; Fund Transfer Authority; Authority for Construction Design; Authority for Emergency Construction, Design and Construction Activities; and Funds Available for all DOE National Security Programs. Part C, Miscellaneous, includes the following: Scholarship and Fellowship Program for Environmental Restoration and Waste Management; Defense Environmental Restoration and Waste Management Program; Private Sector Participation in Waste Cleanup and Modernization Activities; Career Development Program for National Laboratory Employees; Resumption of Plutonium Operations at Rocky Flats Plant; Training and Protection of Nuclear Facilities Workers Who Respond to Emergencies Related to Hazardous Substances; and DOE Partnerships for Energy Critical Technologies, Advanced Manufacturing Technology, and Materials Processing, Synthesis, and Commercialization. Title 22, Defense Nuclear Facilities Safety Board Authorization, notes funds authorized for the board and discusses briefly changes in its powers and functions

  4. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  5. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  6. Securing a Home Energy Managing Platform

    DEFF Research Database (Denmark)

    Mikkelsen, Søren Aagaard; Jacobsen, Rune Hylsberg

    2016-01-01

    Energy management in households gets increasingly more attention in the struggle to integrate more sustainable energy sources. Especially in the electrical system, smart grid towards a better utilisation of the energy production and distribution infrastructure. The Home Energy Management System...... (HEMS) is a critical infrastructure component in this endeavour. Its main goal is to enable energy services utilising smart devices in the households based on the interest of the residential consumers and external actors. With the role of being both an essential link in the communication infrastructure...... for balancing the electrical grid and a surveillance unit in private homes, security and privacy become essential to address. In this chapter, we identify and address potential threats Home Energy Management Platform (HEMP) developers should consider in the progress of designing architecture, selecting hardware...

  7. ENERGY REVOLUTION UNDER THE BRICS NATIONS

    Directory of Open Access Journals (Sweden)

    M. K. Sahu

    2016-01-01

    Full Text Available The BRICS countries are of critical importance to both supply and demand fundamentals of energy markets globally. Today BRICS plays a very important role in the system of international energy security. BRICS energy diversification is driven by concerns for energy security. The potential for a BRIC energy partnership is thus enormous. The development of the BRIC countries in the next coming decades will include demographic changes with a growing middle class population which will demand more energy and resources that our world has the potential to supply.A Green Energy Revolution is the panacea to solve major social, economic and envi­ronmental effects of their growing populations. This paper is an attempt to highlight the cooperation among the BRICS Nations for the development of Energy Sector and at the same time the concerning issue of climate change etc. It further discusses about the contribution of BRICS countries in the global economy. This paper also discusses about the role of the BRICS Nations in collaboration with the International Energy Agency.

  8. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  9. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  10. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  11. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  12. Venezuela and Energy Security of Latin America

    Directory of Open Access Journals (Sweden)

    Elena Igorevna Vesnovskaya

    2015-12-01

    Full Text Available The article is devoted to the specificity of Venezuela's energy policy and the features of the evolution of its approaches to solving problems of energy security. Special attention is paid to the projects of Caracas in the energy sector which are aimed at the creating of common energy zone in Latin America. The author has revealed the interaction of internal political processes in Venezuela as the country's leader in the region, with its integration policy, and also identified trends in the further development of energy policy and strategy of Latin American countries. The research of energy resources of Latin America determined that the main factor that works in favor of convergence states within the South American "geopolitical ring" is to ensure energy security. Venezuela is among the richest resources of Latin America. In the research it was determined that Petrosur, Petrocaribe and Petroandina provide the basis for a range of bilateral agreements to promote cooperation, creation ventures based on the state oil companies of these states.

  13. Economics and National Security: The Case of China

    National Research Council Canada - National Science Library

    Hughes, Edward

    2001-01-01

    The purpose of the conference was to explore the national security dimensions of the U.S. - China economic relationship and identify possible roles for the economic element of national power in formulating policy options...

  14. Affairs of State: The Interagency and National Security

    National Research Council Canada - National Science Library

    Marcella, Gabriel

    2008-01-01

    The war colleges of the United States are a unique national asset. They are centers of academic excellence for preparing military and civilian officers for higher positions in the national security system...

  15. Competitive Technologies for National Security: Review and Recommendations

    National Research Council Canada - National Science Library

    Carafano, James J; Gudgel, Andew; Kochems, Alane

    2008-01-01

    .... Innovation will always be a national security wild card. New technologies may unleash or accelerate social and cultural changes that affect how nations protect themselves on battlefields and behind the scenes...

  16. Y‑12 National Security Complex

    Data.gov (United States)

    Federal Laboratory Consortium — The Y‑12 National Security Complex is a premier manufacturing facility dedicated to making our nation and the world a safer place and plays a vital role in the...

  17. National Security Imperatives and the Neorealist State: Iran and Realpolitik

    National Research Council Canada - National Science Library

    Grogan, Michael

    2000-01-01

    .... Iran's imperative has been-and still is-focused on the pragmatic national security interests of the nation-state model vice the ideological potential for spreading its brand of Islamic revolution abroad...

  18. Energy security from the Russian perspective. Think pipes not rockets

    Energy Technology Data Exchange (ETDEWEB)

    Gudowski, Waclaw

    2008-07-01

    The presentation reviews the understanding of energy security, the Russian role in the energy source market and discusses how to increase the energy security. Environmental aspects such as climate change, CO2 reduction and the environmental costs of fossil fuel consumption with respect to the energy security are emphasized (tk)

  19. Rethinking EU energy security considering past trends and future prospects

    NARCIS (Netherlands)

    Amineh, Mehdi P.; Crijns - Graus, Wina

    2014-01-01

    EU energy policy objectives are directed at three highly interdependent areas: energy supply security, competitiveness and decarbonization to prevent climate change. In this paper, we focus on the issue of energy supply security. Security of energy supply for the immediate and medium-term future is

  20. Energy demand and supply, energy policies, and energy security in the Republic of Korea

    International Nuclear Information System (INIS)

    Kim, Hoseok; Shin, Eui-soon; Chung, Woo-jin

    2011-01-01

    The Republic of Korea (ROK) has enjoyed rapid economic growth and development over the last 30 years. Rapid increases in energy use-especially petroleum, natural gas, and electricity, and especially in the industrial and transport sectors-have fueled the ROK's economic growth, but with limited fossil fuel resources of its own, the result has been that the ROK is almost entirely dependent on energy imports. The article that follows summarizes the recent trends in the ROK energy sector, including trends in energy demand and supply, and trends in economic, demographic, and other activities that underlie trends in energy use. The ROK has been experiencing drastic changes in its energy system, mainly induced by industrial, supply security, and environmental concerns, and energy policies in the ROK have evolved over the years to address such challenges through measures such as privatization of energy-sector activities, emphases on enhancing energy security through development of energy efficiency, nuclear power, and renewable energy, and a related focus on reducing greenhouse gas emissions. The assembly of a model for evaluating energy futures in the ROK (ROK2010 LEAP) is described, and results of several policy-based scenarios focused on different levels of nuclear energy utilization are described, and their impacts on of energy supply and demand in the ROK through the year 2030 are explored, along with their implications for national energy security and long-term policy plans. Nuclear power continues to hold a crucial position in the ROK's energy policy, but aggressive expansion of nuclear power alone, even if possible given post-Fukushima global concerns, will not be sufficient to attain the ROK's 'green economy' and greenhouse gas emissions reduction goals. - Research highlights: →Rapid industrialization caused ROK energy use to increase over 10-fold during 1970-2000, with dramatic structural changes. → Growth in energy use after 2000 slowed to under 5%/yr, and

  1. Nevada National Security Site Environmental Report 2010

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  2. IFRI's notebooks. Energy, development and security

    International Nuclear Information System (INIS)

    Finon, D.; Jacquet, P.

    1999-01-01

    Today, the concept of energy security has been greatly modified by the worldwide trade, the markets deregulation, the technical progress and the nuclear contestation. This notebook is the synthesis of a colloquium jointly organized in December 16, 1997 by the IFRI and the Institute of Economy and Energy Policy (IEPE) with the sustain of the French delegation of strategic affairs of the defense ministry. It analyzes the evolution of energy markets at the year 2030 prospects and stresses on the role of Middle-East and on the stakes of the economical development and energy policy of China. Finally, it treats of the goals and modalities of the French and European energy policies. (J.S.)

  3. China's Sovereign Wealth Fund Investments in overseas energy: The energy security perspective

    International Nuclear Information System (INIS)

    Sun, Xiaolei; Li, Jianping; Wang, Yongfeng; Clark, Woodrow W.

    2014-01-01

    Sovereign Wealth Funds (SWFs) are state-owned investment funds that invest in real and financial assets. Since the global financial crisis in 2008, SWFs' investments have resulted in national security concerns of host countries because SWFs continue to expand rapidly and have become increasingly active in real-time strategic transactions. Given this background, China, which has the biggest SWF in the world, is facing severe challenges of energy resources shortages while its plan is to accomplish social and economic development goals. Energy security is a key driving force of the energy investment policy of China's SWFs. This makes the SWF investments more complicated and more politically sensitive. The combination of sovereign rights and the strategic importance of energy also makes geopolitics more complicated and brings more uncertainty to SWF investments. This article explores the relationship between energy security and energy investments of China's SWFs. It is recognised that the energy investment of SWFs must follow a sustainable path to coordinate energy security, economic growth, return on investment and national security concerns. Government policymakers are urged to balance the financial and political returns on SWFs against potential negative effects. The conclusion presents insights for policymakers, energy scholars and SWF researchers. - Highlights: • Sovereign Wealth Funds (SWFs) are government-owned and may pursue geopolitical power. • SWF investment in energy is necessary for commercial and strategic interests. • China's SWFs are active in energy investment to support a “going global” strategy. • Sovereign rights are inevitable to integrate the strategic property of energy. • SWF investments in energy suffer negative impacts due to sovereign rights

  4. National Energy Outlook Modelling System

    Energy Technology Data Exchange (ETDEWEB)

    Volkers, C.M. [ECN Policy Studies, Petten (Netherlands)

    2013-12-15

    For over 20 years, the Energy research Centre of the Netherlands (ECN) has been developing the National Energy Outlook Modelling System (NEOMS) for Energy projections and policy evaluations. NEOMS enables 12 energy models of ECN to exchange data and produce consistent and detailed results.

  5. Spaces of Global Security: Beyond Methodological Nationalism

    OpenAIRE

    Adamson , Fiona B.

    2016-01-01

    The changing political and social meanings of space under conditions of advanced globalization point to the need to analyze security – or the deployment and management of violence -- as a socio-spatial practice. This article draws attention to the “methodological nationalist” bias that has traditionally characterized mainstream security studies, and discusses its effect on how security issues are studied and conceptualized. Building on insights from political geography and sociology, the arti...

  6. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    nation of pride and resiliency but also the owner of a complex inwardly focused, national security organization. To examine the JGAs between EM and HS...national security. A snapshot 13 years post 9/11 reveals a nation of pride and resiliency but also the owner of a complex inwardly focused...acceptance with or without guilt for the social disparity picture captured in the wake of Hurricane Katrina. “Perhaps the most disturbing fact that

  7. PV in Japan - improving energy security?

    International Nuclear Information System (INIS)

    Anon

    2002-01-01

    Currently, almost 80% of Japan's primary energy is imported and about 50% of this comes from politically unstable countries. The Japanese are now working hard to improve energy security in a clean and sustainable fashion. Since the wind patterns are not favourable for wind power, the emphasis is on photovoltaics (PVs), and many companies that once manufactured integrated circuits are now working on solar cells where their knowledge and experience of mass production, quality control, sales and marketing stand them in good stead. It is expected that the Japanese will be world leaders in the making and export of solar equipment, as well as one of the world's greatest users

  8. Securing energy assets and infrastructure 2007

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-06-15

    This report describes in detail the energy industry's challenges and solutions for protecting critical assets including oil and gas infrastructure, transmission grids, power plants, storage, pipelines, and all aspects of strategic industry assets. It includes a special section on cyber-terrorism and protecting control systems. Contents: Section I - Introduction; U.S Energy Trends; Vulnerabilities; Protection Measures. Section II - Sector-wise Vulnerabilities Assessments and Security Measures: Coal, Oil and Petroleum, Natural Gas, Electric Power, Cybersecurity and Control Systems, Key Recommendations; Section III - Critical Infrastructure Protection Efforts: Government Initiatives, Agencies, and Checklists.

  9. Clean fuel technology for world energy security

    Energy Technology Data Exchange (ETDEWEB)

    Sunjay, Sunjay

    2010-09-15

    Clean fuel technology is the integral part of geoengineering and green engineering with a view to global warming mitigation. Optimal utilization of natural resources coal and integration of coal & associated fuels with hydrocarbon exploration and development activities is pertinent task before geoscientist with evergreen energy vision with a view to energy security & sustainable development. Value added technologies Coal gasification,underground coal gasification & surface coal gasification converts solid coal into a gas that can be used for power generation, chemical production, as well as the option of being converted into liquid fuels.

  10. US oil policy and energy security

    International Nuclear Information System (INIS)

    Noel, P.

    2002-05-01

    Although the energy dependence reached its historical maximum and will continue to increase for the next 20 years, the USA keep their oil policy. For the economist this policy is reasonable because of the poor room for the US imports reduction costs. To explain these conclusions the author discusses on the following topics: the links between the oil dependence and the energy security, the oil policy after Reagan, the oil policy evolution - or no evolution - facing the increasing dependency and the Cheney report. (A.L.B.)

  11. Security of Europe's energy supply. Russia's role

    International Nuclear Information System (INIS)

    Goffaux, P.

    1994-01-01

    A conference on ''Europe's Energy supplies by Russia'', has been organised march 17th 1994 by the Energy and Raw Materials Geopolitics Centre and the Moscow Energy Club, with participation of the World Energy Council. The round-table on petrol outlined the Eastern Europe dependency and the skepticism of western petroleum companies concerning Russian's deposits. The round table on gas outlined the importance of Russian's gas deposits and the development of its european exportations. The round table on nuclear power stated the heavy costs of security improvements, and argued for the taking off, after year 2000, of a new generation of reactors jointly designed by western and russian engineers. (D.L.). 4 figs., 1 tab

  12. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  13. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  14. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  15. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  16. Security plan for the energy sector

    International Nuclear Information System (INIS)

    Tapias Stahelin, Fernando

    1998-01-01

    The explosion of pipelines is so alone the tip of the iceberg of a violent situation that, for many, sinks the economic and social panorama of Colombia in an uncertainty difficult to clarify. Although it is certain that we have the elements to build a country with a floating economy and in development, it is also certain that our own war doesn't allow leaving but there. At the moment 3,2% of the Gross Domestic Product - GDP of the country is dedicated to the military expense, it calculates alarming if one keeps in mind that the average of Latin America is of 1.7% and the world average has lowered ostensibly in the last 10 years, passing from 5.1% to so single 2.7 investments. Of continuing this way, in the 2004 the projected inversion of the GDP of Colombia for military expense will overcome 5%. A conscientious analysis reveals the data of this situation that it affects all the contour of the national life. When we speak of violence in the country we should refer to all those factors and actors that destabilize the society and the legally established political institutions, creating it keels and fear in the whole population. In a same way, it becomes necessary to speak of the security and the national defense that should be guaranteed by the government instances. The security of a state of tranquility and well being; the defense, is an activity situation so that in the case that the security loses temper, it can return to the situation of initial security

  17. National security through the preservation and development of cultural sphere

    Directory of Open Access Journals (Sweden)

    Malakshinova N.Sh.

    2016-10-01

    Full Text Available matters of national security in the context of the inextricable interrelationship and interdependence of national security and socio-economic development are presented in the article. The particular attention is paid to the legislative consolidation of security categories, the system of national security elements, and changes in the domestic legislation updates. Therefore, safety, a list of national interests, highlighted by long-term perspective, and questions about the means of implementation of strategic national priorities, including the named culture as a sphere of life are very important. Sphere of culture as a national priority and an important factor in the quality of life growth and harmonization of public relations, collateral dynamic socio-economic development and the preservation of a common cultural space and sovereignty of Russia are studied more detailed.

  18. National Energy Balance - 1980

    International Nuclear Information System (INIS)

    Anon.

    1980-01-01

    The energy fluxes of several primary and secondary energy sources, since the production to the final consumption in the main economic sectors, are presented. The forecasting of uranium concentrate consumption and production is made for six years - 1980 to 1985. (E.G.) [pt

  19. National energy balance

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    The energy fluxes of the several primary and secondary energy sources, since the production to the final consumption in the main economic sectors, are presented. A historical series covering ten years - 1973 to 1982, and the information retrieval related to the year of 1970 are also presented. (EG) [pt

  20. Design of the national health security preparedness index.

    Science.gov (United States)

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  1. A deeper look at climate change and national security.

    Energy Technology Data Exchange (ETDEWEB)

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  2. Energy security for India: Biofuels, energy efficiency and food productivity

    International Nuclear Information System (INIS)

    Gunatilake, Herath; Roland-Holst, David; Sugiyarto, Guntur

    2014-01-01

    The emergence of biofuel as a renewable energy source offers opportunities for significant climate change mitigation and greater energy independence to many countries. At the same time, biofuel represents the possibility of substitution between energy and food. For developing countries like India, which imports over 75% of its crude oil, fossil fuels pose two risks—global warming pollution and long-term risk that oil prices will undermine real living standards. This paper examines India's options for managing energy price risk in three ways: biofuel development, energy efficiency promotion, and food productivity improvements. Our salient results suggest that biodiesel shows promise as a transport fuel substitute that can be produced in ways that fully utilize marginal agricultural resources and hence promote rural livelihoods. First-generation bioethanol, by contrast, appears to have a limited ability to offset the impacts of oil price hikes. Combining the biodiesel expansion policy with energy efficiency improvements and food productivity increases proved to be a more effective strategy to enhance both energy and food security, help mitigate climate change, and cushion the economy against oil price shocks. - Highlights: • We investigate the role of biofuels in India applying a CGE model. • Biodiesel enhances energy security and improve rural livelihoods. • Sugarcane ethanol does not show positive impact on the economy. • Biodiesel and energy efficiency improvements together provide better results. • Food productivity further enhances biodiesel, and energy efficiency impacts

  3. Do nations still need national energy policies

    Energy Technology Data Exchange (ETDEWEB)

    Schlesinger, James [Lehman Brothers, Washington, DC (United States); Odell, P [Erasmus Univ., Rotterdam (Netherlands). Dept. of International Energy Studies; Jones, D

    1993-02-01

    Once again the issue has arisen whether a national energy policy is necessary or even desirable. No doubt renewed debate has been stimulated by recent developments - the collapse of the Soviet threat, an altered perception of the power of OPEC, or a jaundiced view regarding the effectiveness of governments in this arena. Yet, beneath the surface lie longer-standing issues regarding interests and ideology. This article attempts to deal with the issue, first, as a generic level, then in terms of the transformed energy market, and, finally, in relation to the content of energy policy. (author)

  4. National energy efficiency study. The Czech Republic

    International Nuclear Information System (INIS)

    Maly, M.; Jakubes, J.; Spitz, J.; Van Wees, M.T.; Uyterlinde, M.A.; Martens, J.W.; Van Oostvoorn, F.; Henelova, V.; Vazac, V.; Zalesak, M.; Marousek, J.; Szomolanyiova, J.; Havlickova, M.; Zeman, J.; Ten Donkelaar, M.; Travnicek, S.; Stejskal, F.; Pribyl, E.; Blokker, L.; Bizek, V.; Velthuijsen, J.W.

    1999-08-01

    Energy efficiency and renewable energy production contribute to the three major goals of the national energy policy of the Czech Republic: overall competitiveness, security of supply; and environmental protection. Therefore, the Czech Government aims to promote these two sustainable options. The National Energy Efficiency Study has developed specific policies for the promotion of end use energy efficiency and renewables. These are described in two Action Plans, and in this report which serves as a background document. It contains detailed information on options and measures, potentials, barriers and policy instruments for energy efficiency and renewables. The main part is a detailed outline for a new energy efficiency and renewable policy, including a listing of actions for implementation. Also, it includes recommendations for financing schemes to overcome the investment constraints in the Czech Republic. Finally, a list of concrete projects is presented to support project identification. In addition, two separate Action Plans have been published: (1) The Energy Efficiency Action Plan focuses on promotion of energy efficiency in end-use (separate document, ECN-C-99-065); and (2) The Renewable Energy Action Plan (separate document, ECN-C-99-064) deals with policy on promotion of renewable energy production. These two policy documents should provide policy makers in the Czech Government with essential information on potentials, targets, the required budget, and recommended policy instruments. The core of the Action Plans is the list of concrete policy actions, ready for implementation

  5. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Boudreaux, Philip R [ORNL; Dean, David Jarvis [ORNL; Fulkerson, William [University of Tennessee, Knoxville (UTK); Gaddis, Abigail [University of Tennessee, Knoxville (UTK); Graham, Robin Lambert [ORNL; Graves, Ronald L [ORNL; Hopson, Dr Janet L [University of Tennessee, Knoxville (UTK); Hughes, Patrick [ORNL; Lapsa, Melissa Voss [ORNL; Mason, Thom [ORNL; Standaert, Robert F [ORNL; Wilbanks, Thomas J [ORNL; Zucker, Alexander [ORNL

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  6. Meeting Complex Challenges Through National Security Reform

    National Research Council Canada - National Science Library

    Gockel, Kathy

    2008-01-01

    .... The Obama administration will have no shortage of advice pouring in from myriad sources on how to address the dynamic nature of security given the wars in Iraq and Afghanistan and the global financial turmoil...

  7. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    Petrovsky, V.

    1993-01-01

    The three notions, disarmament, national security and interdependence, which are well known, need a new reading in the today's mission for the United Nations, to facilitate the democratic, evolutionary renewal of the the interdependent world, in which disarmament could play an important role without putting at risk national security, which is of primary concern for the majority of Member States. The recognition of the unity of the wold and its interdependence is the main focal point in the process of transition of the international community to the new world system of peace, cooperation and security based on United Nations Charter. This system was outlined at the Forty-fourth session of the General Assembly, and adopted by Member States as a resolution entitled 'Enhancing international peace, security and international cooperation in all its aspects in accordance with the Charter of United Nations'

  8. National security and the accelerating risk of climate change

    Directory of Open Access Journals (Sweden)

    Lee Gunn

    2017-06-01

    Full Text Available Since 2006, retired U.S. admirals and generals have been examining our changing physical world and assessing the impact of those changes on the security of the nation. A Military Advisory Board (MAB, convened by the CNA Corporation, a non-profit research and analysis institution that operates the Center for Naval Analyses and Institute for Public Research has issued two reports on the changing climate’s national security implications. The first report, published in 2007, stated that the changing climate would be destabilizing in many parts of the world. Climate change, in fact, would be a “threat multiplier”, the report claimed, and result in new and more urgent calls for the American military to provide humanitarian assistance and disaster relief (HADR as well as help sustain order and ensure conditions that would permit trade and prosperity worldwide. The MAB recommended urgent action by the Defense Department to prepare for new missions in new places; and that the Defense Department explicitly recognize missions stemming from the changing climate. CNA’s MAB then published three reports on energy, relating to climate change, one each on: the coming age of renewables, the nation’s energy dependence, and the future of energy in terms of America’s international competitiveness (CNA-MAB, 2009; CNA-MAB, 2010; CNA-MAB, 2011. In 2014, the Military Advisory Board noted that the climate was changing more quickly than had been forecast in 2007. Undertaking a new climate study, the board concluded that more needed to be done, and done quickly, to prepare for and confront the “catalyst for conflict” that the board now saw in climate change. Guest Editors’ Note: The following commentary derives from a presentation by Vice Admiral Lee Gunn, U.S. Navy (Ret., delivered by invitation at the American Association for the Advancement of Science Meeting, San Jose, California, February 13, 2015. Prior to his advisory role for the U.S. Military and

  9. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges and registered national securities associations of changes in the membership... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and registered national securities associations of changes in the membership status of any of their members...

  10. The concept of energy security: Beyond the four As

    International Nuclear Information System (INIS)

    Cherp, Aleh; Jewell, Jessica

    2014-01-01

    Energy security studies have expanded from their classic beginnings following the 1970s oil crises to encompass various energy sectors and increasingly diverse issues. This viewpoint contributes to the re-examination of the meaning of energy security that has accompanied this expansion. Our starting point is that energy security is an instance of security in general and thus any concept of it should address three questions: “Security for whom?”, “Security for which values?” and “Security from what threats?” We examine an influential approach – the ‘four As of energy security’ (availability, accessibility, affordability, and acceptability) and related literature of energy security – to show it does not address these questions. We subsequently summarize recent insights which propose a different concept of energy security as ‘low vulnerability of vital energy systems’. This approach opens the road for detailed exploration of vulnerabilities as a combination of exposure to risks and resilience and of the links between vital energy systems and critical social functions. The examination of energy security framed by this concept involves several scientific disciplines and provides a useful platform for scholarly analysis and policy learning. - Highlights: • Energy security should be conceptualized as an instance of security in general. • 4As of energy security and related approaches do not address security questions. • We define energy security as low vulnerability of vital energy systems (VES). • VES support critical social functions and can be drawn sectorally or geographically. • Vulnerability is a combination of exposure to risks and resilience capacities

  11. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  12. US oil dependency and energy security

    International Nuclear Information System (INIS)

    Noel, P.

    2002-12-01

    As an introduction to the seminar of the 30 May 2002 on the US oil dependency and energy security, the author analyzes the different factors which characterize the american petroleum market situation today. A special interest is thus done to the price increase of 1999-2000 due to the legislation evolution, the gas market tensions, the impact and the power of the OPEC on the international markets, the 11 September 2001 attempts and their political and military consequences. The author also discusses about three papers written after the seminar. (A.L.B.)

  13. Energy shortages in Europe? strategic meetings on energy security

    International Nuclear Information System (INIS)

    Derdevet, M.

    2005-01-01

    On the RTE's initiative, the Economic and Social Council welcome the first 'Strategic Meetings on Energy Security' event on July 11, 2005. With its 'Energy Shortages in Europe?' subtitle, the convention was in line with the topical issue of oil price increases. Opening the convention, Hubert Bouchet, the vice-president of the Research and Technology Productive Activities section of the Economic and Social Council (CES) stated that with its 400 million citizens, Europe uses over 2 500 tWh of electricity a year, and that its demand for primary energy is growing, making it the largest importer of energy in the world and the top second user after the United States. The trend should continue at least until 2030. H Bouchet also stress that though the worlds is using increasing amounts of energy, over 1.5 billion people do not have access to modern energy sources. Therefore, there are huge needs. There were four round-tables introducing rich debates with the room. The first one was about the issue of the 'energy market: the end of overcapacity', and the second one, dedicated so secure supplies, was titled: 'An ill adapted regulatory framework and European context'. In the afternoon, exchanges covered 'Strategies to prepare the energy offer for new stakes' and 'Major strategies for France and Europe'. (author)

  14. The analysis of security cost for different energy sources

    International Nuclear Information System (INIS)

    Jun, Eunju; Kim, Wonjoon; Chang, Soon Heung

    2009-01-01

    Global concerns for the security of energy have steadily been on the increase and are expected to become a major issue over the next few decades. Urgent policy response is thus essential. However, little attempt has been made at defining both energy security and energy metrics. In this study, we provide such metrics and apply them to four major energy sources in the Korean electricity market: coal, oil, liquefied natural gas, and nuclear. In our approach, we measure the cost of energy security in terms of supply disruption and price volatility, and we consider the degree of concentration in energy supply and demand using the Hirschman-Herfindahl index (HHI). Due to its balanced fuel supply and demand, relatively stable price, and high abundance, we find nuclear energy to be the most competitive energy source in terms of energy security in the Korean electricity market. LNG, on the other hand, was found to have the highest cost in term of energy security due to its high concentration in supply and demand, and its high price volatility. In addition, in terms of cost, we find that economic security dominates supply security, and as such, it is the main factor in the total security cost. Within the confines of concern for global energy security, our study both broadens our understanding of energy security and enables a strategic approach in the portfolio management of energy consumption.

  15. Nuclear energy related capabilities at Sandia National Laboratories

    Energy Technology Data Exchange (ETDEWEB)

    Pickering, Susan Y. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-02-01

    Sandia National Laboratories' technology solutions are depended on to solve national and global threats to peace and freedom. Through science and technology, people, infrastructure, and partnerships, part of Sandia's mission is to meet the national needs in the areas of energy, climate and infrastructure security. Within this mission to ensure clean, abundant, and affordable energy and water is the Nuclear Energy and Fuel Cycle Programs. The Nuclear Energy and Fuel Cycle Programs have a broad range of capabilities, with both physical facilities and intellectual expertise. These resources are brought to bear upon the key scientific and engineering challenges facing the nation and can be made available to address the research needs of others. Sandia can support the safe, secure, reliable, and sustainable use of nuclear power worldwide by incorporating state-of-the-art technologies in safety, security, nonproliferation, transportation, modeling, repository science, and system demonstrations.

  16. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    Energy Technology Data Exchange (ETDEWEB)

    Poling, Jeanne; Arnold, Pat [National Security Technologies, LLC (NSTec), P.O. Box 98521, Las Vegas, NV 89193-8521 (United States); Saad, Max [Sandia National Laboratories, P.O. Box 5800, Albuquerque, NM 87185 (United States); DiSanza, Frank [E. Frank DiSanza Consulting, 2250 Alanhurst Drive, Henderson, NV 89052 (United States); Cabble, Kevin [U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, P.O. Box 98518, Las Vegas, NV 89193-8518 (United States)

    2013-07-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  17. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    International Nuclear Information System (INIS)

    Poling, Jeanne; Arnold, Pat; Saad, Max; DiSanza, Frank; Cabble, Kevin

    2013-01-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  18. Secure energy supply in 2025: Indonesia's need for an energy policy strategy

    International Nuclear Information System (INIS)

    Mujiyanto, Sugeng; Tiess, Günter

    2013-01-01

    Indonesia as an emerging country with one of the fastest growing economies requires sufficient supply with energy for national development. Domestic energy production cannot satisfy the domestic demand, and the deficiency necessitates growing imports. The present energy mix consists of 96% from non-renewable sources, i.e. fossil fuels, less than 4% from renewables. Government Regulation 5/2006 aims at increasing the proportion of renewable sources to 17%. Two scenarios for the energy situation in 2025 have been elaborated and are discussed. An overall energy policy strategy and regulatory framework covering non-renewable and renewable resources are crucial for securing energy demand. - Highlights: • Indonesia aims at 17% renewable energy in energy mix 2025. • Population growth exceeds increase of energy production. • Investment incentives for new technologies, exploration and efficient production are necessary. • Clear and comprehensive energy policy strategy and regulatory framework are crucial

  19. US Africa Command (AFRICOM) and Nigeria's National Security ...

    African Journals Online (AJOL)

    The US decision to establish a unified combatant command (AFRICOM) in African has raised numerous questions, particularly in Africa, regarding its possible security implications for the continent. The article narrows itself to the concern for unraveling the national security implications of Nigeria's opposition to the location of

  20. Language Can: Ensuring National Security through Effective Use of ...

    African Journals Online (AJOL)

    First Lady

    2012-10-27

    Oct 27, 2012 ... Indexed African Journals Online: www.ajol.info. An International ... Key words: Language, Language Can, Security, National Security, and. Language Use .... message and transmit it to a second party, who then decodes it in order to. Vol. ..... would be seen as a game rather than ―a do or die affair‖. It is the ...

  1. Composing Alternatives to a National Security Language Policy

    Science.gov (United States)

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  2. The Curious National Security Pendulum: Openness and/or Censorship.

    Science.gov (United States)

    Marwick, Christine M.

    1979-01-01

    Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)

  3. THE NATIONAL SECURITY - MEDIA POWER LINKAGE. A THEORETICAL FRAMEWORK

    Directory of Open Access Journals (Sweden)

    KARIN MEGHEŞAN

    2013-05-01

    Full Text Available The mechanism of national security policy is an issue of increasing interests in post cold war era. But what is the impact of the media upon national security policy decision making? New world wide events show us that more than ever national policy is often at the mercy of the media. The Wiki leaks, the Murdoch inquiry, the impact of new social media on Arab democratic movements are just some examples regarding the effect of nearly simultaneous presentation of information around the world. The world is changing, and the processes by which national policy is developed may also be changing especially in the security domain. The essence of this study, as the title suggests is the idea of a „dual use” media in the national security issues. This study employs a relatively narrow definition of national security issues as only those which are concerned with national survival and preservation of our society. The media affects us as individuals and as a collective body so we will like to focus on a realistic understanding of the media-secrecy-security linkage, noting that we will do nothing else but advance and underline the main points of view from the public and scientific discourse.

  4. Accelerator applications in energy and security

    CERN Document Server

    Chou, Weiren

    2015-01-01

    As accelerator science and technology progressed over the past several decades, the accelerators themselves have undergone major improvements in multiple performance factors: beam energy, beam power, and beam brightness. As a consequence, accelerators have found applications in a wide range of fields in our life and in our society. The current volume is dedicated to applications in energy and security, two of the most important and urgent topics in today's world. This volume makes an effort to provide a review as complete and up to date as possible of this broad and challenging subject. It contains overviews on each of the two topics and a series of articles for in-depth discussions including heavy ion accelerator driven inertial fusion, linear accelerator-based ADS systems, circular accelerator-based ADS systems, accelerator-reactor interface, accelerators for fusion material testing, cargo inspection, proton radiography, compact neutron generators and detectors. It also has a review article on accelerator ...

  5. At the Crossroads: Counterproliferation and National Security Strategy

    National Research Council Canada - National Science Library

    2004-01-01

    .... national security and an enormous challenge for the entire international community. In the hands of rogue states, failing states, or substate terrorist groups, these weapons threaten not only U.S...

  6. The Air Warrior's Value of National Security Space

    National Research Council Canada - National Science Library

    Loftis, J

    2003-01-01

    .... With more focused high-level attention on national security space decisions a measure that captures and quantities the value of space capabilities to combat operations professionals is desired...

  7. Organizational resilience in national security bureaucracies: Realistic and practicable?

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja

    2017-01-01

    Resilience is increasingly highlighted as a necessary organizational property in national security bureaucracies. This article explores the resulting management dilemmas via interviews with Danish executives, who attempt to balance resilience, fiscal austerity and democratic accountability...

  8. National Pending of Social Security Hearing Requests by Format

    Data.gov (United States)

    Social Security Administration — Report refers to the National total of cases pending at the hearing level and the number and percentages of those cases that were in either electronic format (EF) or...

  9. Organized Crime and National Security: The Albanian Case

    National Research Council Canada - National Science Library

    Gjoni, Ilir

    2004-01-01

    .... This thesis proceeds from the premise that organized en me constitutes a threat to democracy, in particular a serious threat to new democracies and subsequently to the national security of the country...

  10. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-10-26

    ... its business. ADDRESSES: The meeting will be held via a conference call. For access to the conference... President regarding their review of the Department of Homeland Security's (DHS) National Cybersecurity and...

  11. Globalization Crisis and National Security: A Reflection on Nigeria ...

    African Journals Online (AJOL)

    Globalization Crisis and National Security: A Reflection on Nigeria Textile Industry. ... PROMOTING ACCESS TO AFRICAN RESEARCH ... Thus, while globalization has several palpable positive effects on the countrys industrial growth, it also ...

  12. The Path to a Culturally Relevant National Security Strategy

    National Research Council Canada - National Science Library

    Frappler, John

    2008-01-01

    .... In an attempt to remain ahead of its enemies in the prosecution of the GWOT, the United States has proceeded with an extensive review of its National Security Strategy and an historic transformation...

  13. Reform of the National Security Science and Technology Enterprise

    National Research Council Canada - National Science Library

    Berry, William; Coffey, Timothy; DeYoung, Donald; Kadtke, James; Loeb, Cheryl

    2008-01-01

    A strong science and technology (S&T) program has been vitally important to American national security since World War II and has to date given the United States a strategic advantage over competitors...

  14. Analytical Chemistry for Homeland Defense and National Security

    Energy Technology Data Exchange (ETDEWEB)

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  15. USAF Institute for National Security Studies 1998 Research Results Conference

    National Research Council Canada - National Science Library

    1998-01-01

    The USAF Institute for National Security Studies (INSS), in cooperation with HQ USAF Nuclear and Counterproliferation Directorate, sponsored its 6th annual Research Results Conference on 19 - 20 November 1998...

  16. Post-Apartheid South Africa and United States National Security

    National Research Council Canada - National Science Library

    Cochran, Edwin

    1998-01-01

    .... It is based on the realist premise that the U.S. has limited national interests in Sub-Saharan Africa which would be best served by a regional security strategy explicitly predicated on engagement with South Africa...

  17. The Superpowers: Nuclear Weapons and National Security. Teacher's Guide. National Issues Forums in the Classroom.

    Science.gov (United States)

    Levy, Tedd

    This teacher's guide is designed to accompany the National Issues Forums'"The Superpowers: Nuclear Weapons and National Security." Activities and ideas are provided to challenge students to debate and discuss the United States-Soviet related issues of nuclear weapons and national security. The guide is divided into sections that…

  18. 75 FR 45151 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0006] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...

  19. National aspects of food security of Russia

    Directory of Open Access Journals (Sweden)

    Karanina Elena

    2017-01-01

    Full Text Available Instability of a foreign policy situation and deepening of financial crisis actualize need of monitoring of food security’s condition as objective condition of economic sovereignty of Russia. Modern approaches to definition of food security of the state are considered in article. Critical evaluation of separate provisions of the Doctrine of food security of the Russian Federation is given. The analysis of a condition of food security of Russia in the directions of independence, economic and physical availability of the food is carried out on the basis of statistical data. Food security in Russia was reflected in the political decisions that defined the new economic policy of the state in the foreign market. modern import substitution program has shown its effectiveness, which is based on the absence of alternative paths of development. An important condition is the slow pace of development of the internal economy of Russia in conditions when domestic markets competition is virtually nonexistent. Food is a priority in the development of society, ensuring political and social balance, therefore, organizational solutions discussed in this material has a transdisciplinary character. The author’s conclusions can be useful to researchers who are trying to decide how macroeconomic objectives, and conducting research for innovative solutions in many sectors of the economy.

  20. Multi sensor national cyber security data fusion

    CSIR Research Space (South Africa)

    Swart, I

    2015-03-01

    Full Text Available in a real world system. The data examined will then be applied to a case study that will show the results of applying available open source security information against the model to relate to the current South African cyber landscape....

  1. Digital Dimension Disruption: A National Security Enterprise Response

    Science.gov (United States)

    2017-12-21

    PRISM 7, NO. 2 FEATURES | 41 Digital Dimension Disruption A National Security Enterprise Response By Charles Rybeck, Lanny Cornwell, and Philip Sagan...1 The slow-motion collapse of parts of the 20th century’s legacy is now accelerating in ways that likely will usher in a monumental realignment of...societal institutions, methods of business, and fundamental ideas about national security. This realignment will , of necessity, change the frameworks

  2. Monitoring the Implementation of State Regulation of National Economic Security

    Directory of Open Access Journals (Sweden)

    Hubarieva Iryna O.

    2018-03-01

    Full Text Available The aim of the article is to improve the methodological tools for monitoring the implementation of state regulation of national economic security. The approaches to defining the essence of the concept of “national economic security” are generalized. Assessment of the level of national economic security is a key element in monitoring the implementation of state regulation in this area. Recommendations for improving the methodology for assessing national economic security, the calculation algorithm of which includes four interrelated components (economic, political, social, spiritual one, suggests using analysis methods (correlation and cluster analysis, and taxonomy, which allows to determine the level and disproportion of development, can serve as a basis for monitoring the implementation of state regulation of national economic security. Such an approach to assessing national economic security makes it possible to determine the place (rank that a country occupies in a totality of countries, the dynamics of changing ranks over a certain period of time, to identify problem components, and monitor the effectiveness of state regulation of the national economic security. It the course of the research it was determined that the economic sphere is the main problem component of ensuring the security of Ukraine’s economy. The analysis made it possible to identify the most problematic partial indicators in the economic sphere of Ukraine: economic globalization, uneven economic development, level of infrastructure, level of financial market development, level of economic instability, macroeconomic stability. These indicators have a stable negative dynamics and a downward trend, which requires an immediate intervention of state bodies to ensure the national economic security.

  3. Competing policy packages and the complexity of energy security

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Saunders, Harry

    2014-01-01

    To underscore both the diversity and severity of energy security tradeoffs, this study examines five different energy security policy packages—five distinct strategies aimed at reducing oil dependence, enhancing energy affordability, expanding access to modern energy services, responding to climate change, and minimizing the water intensity of energy production. It identifies both compelling synergies and conflicts between each of the five strategies. The central value of the study is that it turns on its head the widely accepted notion of a “portfolio approach” or “all of the above” strategy to energy policymaking. To make this case, the article begins by elucidating the complexity and multidimensionality of energy security as a concept. It then introduces our five energy security policy packages to illustrate how some energy security objectives complement each other whereas others counteract each other. It concludes by noting that energy security is not an absolute state, and that achieving it only “works” by prioritizing some dimensions, or policy goals and packages, more than others. - Highlights: • Energy security is a complex, multidimensional concept. • Policy packages aimed at achieving energy security often conflict with each other. • Energy security only “works” by prioritizing some dimensions more than others

  4. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... upon physical inspection thereof and upon examination of the books of the custodian. The physical... a member of a national securities exchange of any obligation under existing law or under the rules...

  5. Pawnee Nation Energy Option Analyses

    Energy Technology Data Exchange (ETDEWEB)

    Matlock, M.; Kersey, K.; Riding In, C.

    2009-07-31

    In 2003, the Pawnee Nation leadership identified the need for the tribe to comprehensively address its energy issues. During a strategic energy planning workshop a general framework was laid out and the Pawnee Nation Energy Task Force was created to work toward further development of the tribe’s energy vision. The overarching goals of the “first steps” project were to identify the most appropriate focus for its strategic energy initiatives going forward, and to provide information necessary to take the next steps in pursuit of the “best fit” energy options. Based on the request of Pawnee Nation’s Energy Task Force the research team, consisting Tribal personnel and Summit Blue Consulting, focused on a review of renewable energy resource development potential, funding sources and utility organizational along with energy savings options. Elements of the energy demand forecasting and characterization and demand side options review remained in the scope of work, but were only addressed at a high level. Description of Activities Performed Renewable Energy Resource Development Potential The research team reviewed existing data pertaining to the availability of biomass (focusing on woody biomass, agricultural biomass/bio-energy crops, and methane capture), solar, wind and hydropower resources on the Pawnee-owned lands. Using these data, combined with assumptions about costs and revenue streams, the research team performed preliminary feasibility assessments for each resource category. The research team also reviewed available funding resources and made recommendations to Pawnee Nation highlighting those resources with the greatest potential for financially-viable development, both in the near-term and over a longer time horizon. Energy Efficiency Options While this was not a major focus of the project, the research team highlighted common strategies for reducing energy use in buildings. The team also discussed the benefits of adopting a building energy code and

  6. European Uunion Energy Security and Russia

    Directory of Open Access Journals (Sweden)

    Nodari A. Simonia

    2015-01-01

    Full Text Available The article deals with the retrospective of relations between Russia, USA and EU in the sphere of energy security, as well as their interaction regarding the current political crisis in the Ukraine. Particular attention is paid to the evolution of the key actors'positions and the development of their relations within the framework of the regulatory regimes established by the most significant agreements in the energy sphere. In conclusion the authors claim that what they say in their article not only does substantially reinforce the arguments set forth by Professor Giuseppe Guarino, who argues about the negative consequences caused by the dictatorship of the Brussels's bureaucracy within the EU, but also inflicts another blow on the Maastricht Treaty and the Treaty of Lisbon in terms of external policy and trade, since the both Treaties were designed to convert the EU in a real competitor of the United States in the then forming multipolar World. The Brussel's bureaucracy, having turned into a dutiful instrument of the US geopolitical strategy, hindered the movement of the EU in that direction, while its dictatorship in energy security aggravates the crisis situation of the EU, almost pushing the EU to the brink of collapse and disintegration. We have lately witnessed an evolving and growing phenomenon of the so called "Euroscepticism". The results of the Europarliament elections in late May, 2014, were a graphic demonstration of the symptoms of this alarming for the EU disease, when the anti-EU parties in the four out 22 EU countries won the elections (France, United Kingdom, Denmark, and Greece Those results, regardless of the panic headlines in mass media and statements like "shocking" or "earthquake" made by some politicians, were not able to significantly affect the nature of the European Parliament, though they can significantly complicate its work. This is so far the first "alarming bell" tolling for the EU.

  7. Energy research, national and international

    International Nuclear Information System (INIS)

    Rhijn, A.A.T. van

    1976-01-01

    The Dutch Energy Research Programme inaugurated by the National Steering Group for Energy Research (LSEO) is discussed. Three types of criteria to be borne in mind in the selection of new directions in development are considered: the setting of targets for energy policy: the general central social and economic aims of the country; and the scientific, financial and organisational possibilities. International aspects are reviewed with reference to the IEA, CERN, Euratom, ELDO and ESRO. (D.J.B.)

  8. Pawnee Nation Energy Option Analyses

    Energy Technology Data Exchange (ETDEWEB)

    Matlock, M.; Kersey, K.; Riding In, C.

    2009-07-21

    Pawnee Nation of Oklahoma Energy Option Analyses In 2003, the Pawnee Nation leadership identified the need for the tribe to comprehensively address its energy issues. During a strategic energy planning workshop a general framework was laid out and the Pawnee Nation Energy Task Force was created to work toward further development of the tribe’s energy vision. The overarching goals of the “first steps” project were to identify the most appropriate focus for its strategic energy initiatives going forward, and to provide information necessary to take the next steps in pursuit of the “best fit” energy options. Description of Activities Performed The research team reviewed existing data pertaining to the availability of biomass (focusing on woody biomass, agricultural biomass/bio-energy crops, and methane capture), solar, wind and hydropower resources on the Pawnee-owned lands. Using these data, combined with assumptions about costs and revenue streams, the research team performed preliminary feasibility assessments for each resource category. The research team also reviewed available funding resources and made recommendations to Pawnee Nation highlighting those resources with the greatest potential for financially-viable development, both in the near-term and over a longer time horizon. Findings and Recommendations Due to a lack of financial incentives for renewable energy, particularly at the state level, combined mediocre renewable energy resources, renewable energy development opportunities are limited for Pawnee Nation. However, near-term potential exists for development of solar hot water at the gym, and an exterior wood-fired boiler system at the tribe’s main administrative building. Pawnee Nation should also explore options for developing LFGTE resources in collaboration with the City of Pawnee. Significant potential may also exist for development of bio-energy resources within the next decade. Pawnee Nation representatives should closely monitor

  9. National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments

    National Research Council Canada - National Science Library

    Doyle, Charles

    2006-01-01

    .... These National Security Letters (NSLs) seek customer and consumer transaction information in national security investigations from communications providers, financial institutions, and credit agencies...

  10. Designing indicators of long-term energy supply security

    International Nuclear Information System (INIS)

    Jansen, J.C.; Van Arkel, W.G.; Boots, M.G.

    2004-01-01

    To our knowledge, so far amazingly little research work has been undertaken to construct meaningful indicators of long-run energy supply security for a particular nation or region. Currently, in addressing energy supply security, policy makers tend to emphasise short-term supply disruptions. In contrast, this pre-study accords with the broader Sustainability Outlook in considering the long-term perspective. This report starts with taking stock, in a concise way, of the official EU energy outlook and issues related to the opportunities to administer changes in the energy mix at the level of major energy use categories. Then a brief survey of relevant literature is made on long-term strategies to ensure survival of systems - be it biological, social, etc. - in an environment largely characterised by high uncertainty and a lot of unchartered territory. We found the work of Andrew Stirling very inspiring in this context. Based on his work and considering the limitations of the present research activity, we retained the Shannon index as the best 'simple' indicator of diversity. In the core of the report, the Shannon index is elaborated into four indicators of long-term energy supply security. Stepwise, additional aspects of long-term energy supply security are introduced. These aspects are: Diversification of energy sources in energy supply; Diversification of imports with respect to imported energy sources; Long-term political stability in regions of origin; The resource base in regions of origin, including the home region/country itself. After small adjustments to allow for data availability, these indicators were applied to the reference year 2030 of four long-term scenarios with data of base year 1995 and projections for underlying variables provided by the Netherlands Environmental Assessment Agency (MNP). Preliminary interpretation of the results suggests the usefulness of the indicators presented in this report. A second activity undertaken in this report was

  11. AY 2007-2008 Achieving U.S. Energy Security: Energy Industry Sector Report Seminar 8

    National Research Council Canada - National Science Library

    2008-01-01

    ...; the ability to generate and exploit inexpensive energy underpins that strength. Therefore, the United States has a vital interest in ensuring the viability and stability of the global energy system and securing its energy security...

  12. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    Science.gov (United States)

    2017-06-01

    confirmation of Lake’s concerns with the administration’s public relations failures, David Gergen, the president’s communications advisor, increased... Public Affairs: 389-395. 75 these positions, he did not openly object too them during the campaign. Additionally, as this case study shows, he...PEOPLE, PROCESS, AND POLICY: CASE STUDIES IN NATIONAL SECURITY ADVISING, THE NATIONAL SECURITY COUNCIL, AND PRESIDENTIAL DECISION MAKING

  13. Creating energy security indexes with decision matrices and quantitative criteria

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Larry; Shupe, Darren

    2010-09-15

    Energy security is becoming an important policy issue in a growing number of jurisdictions because of volatile energy markets and production challenges faced by many producers. As a result, policymakers and politicians are looking for tools or methods that can create an energy security index with results that are justifiable, understandable, and reproducible. This paper describes a method which employs a decision matrix to produce an energy security index using quantitative criteria and metrics. The method allows a range of indexes to be produced, thereby offering further insight into the state of a jurisdiction's energy security.

  14. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  15. Renewable corn-ethanol and energy security

    International Nuclear Information System (INIS)

    Eaves, James

    2007-01-01

    Though corn-ethanol is promoted as renewable, models of the production process assume fossil fuel inputs. Moreover, ethanol is promoted as a means of increasing energy security, but there is little discussion of the dependability of its supply. This study investigates the sensibility of promoting corn-ethanol as an automobile fuel, assuming a fully renewable production process. We then use historical data to estimate the supply risk of ethanol relative to imported petroleum. We find that devoting 100% of US corn to ethanol would displace 3.5% of gasoline consumption and the annual supply of the ethanol would be inherently more risky than that of imported oil. Finally, because large temperature increases can simultaneously increase fuel demand and the cost of growing corn, the supply responses of ethanol producers to temperature-induced demand shocks would likely be weaker than those of gasoline producers. (author)

  16. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  17. Emerging energy security issues: Natural gas in the Gulf Nations, An overview of Middle East resources, export potentials, and markets. Report Series No. 4

    International Nuclear Information System (INIS)

    Ripple, R.D.; Hagen, R.E.

    1995-09-01

    This paper proceeds with a presentation of the natural gas resource base of the Gulf nations of the Middle East. The resource base is put in the context of the world natural gas resource and trade flows. This is followed by a discussion of the existing and planned project to move Gulf natural gas to consuming regions. Then a discussion of the source of demand in the likely target markets for the Gulf resource follows. Next, the nature of LNG pricing is discussed. A brief summary concludes the paper

  18. Arms control, nonproliferation, and US national security

    International Nuclear Information System (INIS)

    Pilat, J.F.

    1985-01-01

    The continuation of the arms race and the failure of arms control and disarmament negotiations lend support to the belief that US and Soviet power, prestige, and security depend upon nuclear weapons. Therefore, the argument goes, the non-nuclear-weapon states (particularly those that are not allied with nuclear-weapon states and do not share their nuclear shield) may conclude that they would be well served by possession of these weapons. In this sense, the failure of nuclear arms reductions could create incentives for further proliferation

  19. Security in cyberspace targeting nations, infrastructures, individuals

    CERN Document Server

    Giacomello, Giampiero

    2014-01-01

    Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as ""cybersecurity."" Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This colle

  20. Demographics and the Changing National Security Environment

    National Research Council Canada - National Science Library

    2000-01-01

    .... Long- term fertility trends, urbanization, migration, and changes in the ethnic composition and age profile of populations can influence the likelihood and nature of conflict among and within nations...

  1. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-03-31

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Communications System... Telecommunications Advisory Committee (NSTAC) will hold its annual meeting on May 6, 2010. The meeting will be open... preparedness telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee...

  2. Boko haram insurgency and national security in Nigeria | Okoroafor ...

    African Journals Online (AJOL)

    There are insinuations and charges that the insidious Boko Haram terrorist organization was created by the northern political opposition with strong support from the Islamic Middle East terrorist elements to destabilize the government, national security and peace of the nation, Nigeria. The truth remains that this deadly group ...

  3. Energy and non-traditional security (NTS) in Asia

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  4. Risk assessment of climate systems for national security.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  5. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  6. National debate on the energies; Debat national sur les energies

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    This document gathered the allocutions presented at the national debate on the energies of the 18 march 2003. The full text of the presentations of the Ministry of the industry N. Fontaine and the first Ministry J.P. Raffarin are provided. A synthesis of the answers to the following questions is also presented: understand the energy, the increase of the energy demand, the international consumption, the necessary changes of the consumption and production modes, the environmental impact, the resources, the decision making and the deciders. (A.L.B.)

  7. Measuring the security of energy exports demand in OPEC economies

    International Nuclear Information System (INIS)

    Dike, Jude Chukwudi

    2013-01-01

    One of the objectives of OPEC is the security of demand for the crude oil exports of its members. Achieving this objective is imperative with the projected decline in OECD countries' crude oil demand among other crude oil demand shocks. This paper focuses on determining the external crude oil demand security risks of OPEC member states. In assessing these risks, this study introduces two indexes. The first index, Risky Energy Exports Demand (REED), indicates the level of energy export demand security risks for OPEC members. It combines measures of export dependence, economic dependence, monopsony risk and transportation risk. The second index, Contribution to OPEC Risk Exposure (CORE), indicates the individual contribution of the OPEC members to OPEC's risk exposure. This study utilises the disaggregated index approach in measuring energy demand security risks for crude oil and natural gas and involves a country level analysis. With the disaggregated approach, the study shows that OPEC's energy export demand security risks differ across countries and energy types. - Highlights: • REED and CORE indexes are suitable measures for energy exports demand security risk. • The indexes show that energy demand security risk is different for each OPEC country. • The countries contribution to OPEC's energy demand security risk is also different. • The outcome is necessary for OPEC's common energy and climate change policies. • The outcome makes a case for oil demand security as a topical issue in the literature

  8. Rossijskaja jenergeticheskaja diplomatija i mezhdunarodnaja jenergeticheskaja bezopasnost' (geopolitika i jekonomika [Russian energy diplomacy and international energy security (geopolitics and economics

    Directory of Open Access Journals (Sweden)

    Zhiznin Stanislav

    2010-01-01

    Full Text Available This article considers national energy security as a component of foreign policy and diplomacy and analyses the current state of Russian energy policy, the role of Russia in global energy geopolitics and the factors affecting it. The author examines energy diplomacy as an instrument of foreign policy at both global and regional levels taking into account the changes in the corporate policy of energy companies.

  9. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  10. The Conceptualization of Energy Security: the International Experience

    Directory of Open Access Journals (Sweden)

    Muzychenko Mykola V.

    2017-08-01

    Full Text Available The article reviews and analyzes existing interpretations of the term of «energy security», which are used by international organizations, individual countries, and foreign scientists. As result of a generalization of the numerous existing conceptual-methodical and substantive approaches to the definition of energy security, its main components and possible ways of its ensuring, it has been found that the concept of energy security includes many multifactor components that are interconnected by numerous functional linkages, including economic, political, social, and ecological aspects. The issues related to geology, geography, and time factor have impact on interpretation of energy security. But in general, energy security can be seen in a one-aspect dimension that is largely based on the security of energy supplies (availability of energy resources and in a multi-aspect dimension which, in addition to the security of energy supplies, also takes into consideration a number of other important interrelated aspects of energy security, particularly in the areas of accessibility of energy resources, energy efficiency, and environmental safety.

  11. Arctic Energy Resources: Security and Environmental Implications

    Directory of Open Access Journals (Sweden)

    Peter Johnston

    2012-08-01

    Full Text Available n recent years, there has been considerable interest in the Arctic as a source for resources, as a potential zone for commercial shipping, and as a region that might experience conflict due to its strategic importance. With regards to energy resources, some studies suggest that the region contains upwards of 13 percent of global undiscovered oil, 30 percent of undiscovered gas, and multiples more of gas hydrates. The decreasing amount and duration of Arctic ice cover suggests that extraction of these resources will be increasingly commercially viable. Arctic and non-arctic states wish to benefit from the region's resources and the potential circum-polar navigation possibilities. This has led to concerns about the environmental risks of these operations as well as the fear that competition between states for resources might result in conflict. Unresolved offshore boundaries between the Arctic states exacerbate these fears. Yet, the risk of conflict seems overstated considering the bilateral and multilateral steps undertaken by the Arctic states to resolve contentious issues. This article will examine the potential impact of Arctic energy resources on global security as well as the regional environment and examine the actions of concerned states to promote their interests in the region.

  12. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  13. Hawai‘i Distributed Energy Resource Technologies for Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2012-09-30

    HNEI has conducted research to address a number of issues important to move Hawai‘i to greater use of intermittent renewable and distributed energy resource (DER) technologies in order to facilitate greater use of Hawai‘i's indigenous renewable energy resources. Efforts have been concentrated on the Islands of Hawai‘i, Maui, and O‘ahu, focusing in three areas of endeavor: 1) Energy Modeling and Scenario Analysis (previously called Energy Road mapping); 2) Research, Development, and Validation of Renewable DER and Microgrid Technologies; and 3) Analysis and Policy. These efforts focused on analysis of the island energy systems and development of specific candidate technologies for future insertion into an integrated energy system, which would lead to a more robust transmission and distribution system in the state of Hawai‘i and eventually elsewhere in the nation.

  14. A Cyber Federal Deposit Insurance Corporation Achieving Enhanced National Security

    Science.gov (United States)

    2017-12-21

    machine is being bridged by wearables, augmented reality (AR), and artificial intelligence (AI). In this near-future the uncanny valley no longer...and security represent key pol- icy, security, and business tradeoffs, connectivity and national cybersecurity are similarly dialectical choices. On...Consumer Electronics Show (CES), is at once the digital sycophant’s dream and the cybersecurity hermit’s nightmare, as each connected gewgaw and

  15. Multi-perspective analysis of China's energy supply security

    International Nuclear Information System (INIS)

    Geng, Jiang-Bo; Ji, Qiang

    2014-01-01

    China's energy supply security has faced many challenges such as the drastic change of the international energy environment and the domestic energy situation and so on. This paper constructs a multi-dimensional indicator system for the main risks deriving from four aspects to evaluate the situation of China's energy supply security and analyze its evolution characteristics from 1994 to 2011. The results indicate that the situation of China's energy supply security generally presented a downtrend during 1994–2008, as a result of increasing international energy market monopoly and high volatility of international crude oil prices. After 2008, the overall level of China's energy supply security has improved to the level of 2003, which is attributed to the relatively stable international energy environment as well as the effective implementation of energy policies. - Highlights: • A multi-dimensional index system for energy supply security is constructed. • The dynamic influences of external and internal risks are analyzed. • China's energy supply security presents a downward trend during 1994–2008. • The level of China's energy supply security has improved since 2009

  16. Energy security issues at household level in India

    International Nuclear Information System (INIS)

    Jain, Garima

    2010-01-01

    Energy security at the household level implies ensuring assured and regular supply of clean energy fuels at an affordable price for various household activities. Threat to physical availability of clean energy fuels for cooking and lighting is determined through various indicators such as dependence on traditional fuels and limited access to clean fuels. Energy insecurity translates into various adverse social impacts. Financial threat to energy security is indicated by expenses incurred on energy fuels and affordability of clean fuels. Households spend a major portion of their income on acquiring energy fuels; however, due to high price of clean fuels, they continue to depend on traditional and inefficient fuels. There is an urgent need to address factors that pose a threat to energy security at the household level. In this regard, measures taken by the government agencies and other institutions are also reviewed. The paper also suggests the regulatory and policy interventions required to address the energy security issues at the household level.

  17. Toward an energy security strategy for Canada : a discussion paper

    International Nuclear Information System (INIS)

    2005-12-01

    Energy security strategies for Canada were presented in this paper. Article 6.05 of North American Free Trade Agreement (NAFTA) prohibits Canada from reducing the proportion of energy exported to the United States or Mexico. Between 1982 and 2002, natural gas consumption in Canada rose by 96 per cent while exports increased by 396 per cent. Crude oil consumption increased by 29 per cent, while exports rose by 595 per cent. Government practices have tended towards extracting and exporting resources as quickly as possible with no consideration to resource availability for future generations. In addition, much of the value of Canadian resources has been given to private corporations. The environment has been damaged in order to enable faster extraction, and First Nations, employees, and communities have been placed at the mercy of corporations and international markets. Canada's unique cultural and societal arrangements have not been protected. Four principles to address these concerns were presented: (1) managing non-renewable resources as responsible stewards and conserving their economic availability for future generations; (2) ensuring that the benefits from fossil fuels are invested in other forms of capital that will ensure the future prosperity and energy security of Canada; (3) ensuring that the extraction and use of resources has minimal impacts on the planet and (4) a re-direction of the proceeds from resource exploitation towards education, social and health services, land claims and land use settlements, and the elimination of poverty among First Nations people. It was suggested that energy-related jobs and workers should be protected through the development of an industrial strategy which includes investment in renewable energy development and re-training programs for workers. Consistent depoliticized policies are needed to reduce the impact on low-income Canadians of free-market price swings and the unavoidable costs of environmental protection. It was

  18. National debate on the energies

    International Nuclear Information System (INIS)

    2003-01-01

    This document gathered the allocutions presented at the national debate on the energies of the 18 march 2003. The full text of the presentations of the Ministry of the industry N. Fontaine and the first Ministry J.P. Raffarin are provided. A synthesis of the answers to the following questions is also presented: understand the energy, the increase of the energy demand, the international consumption, the necessary changes of the consumption and production modes, the environmental impact, the resources, the decision making and the deciders. (A.L.B.)

  19. Security vs. Nations: a lost battle?

    CERN Multimedia

    Computer Security Team

    2013-01-01

    “Know the enemy” is one of the basic recommendations of the ancient Chinese military strategist Sun Tzu (544–496 BC). In the cyber-world, the usual suspects are not only script kiddies, criminals and hacktivists, but also nation states.   Companies worldwide have prepared their defences to fight off the first three. Likewise, CERN, despite its wish for academic freedom, is constantly considering how best to prevent successful attacks. But when nation states are the antagonists, defence is impossible (unless you have plenty of money). Today, the most popular computing services in the western hemisphere are run from the US. We already know that the US and the UK are tapping into Facebook, Google, Yahoo and others (see our Bulletin article on “Prison or “Prism”? Your data in custody”). But what about one level down? Nowadays, IT hardware (routers, laptops, smartphones, etc.) is built in China. How can we be sure that these ...

  20. In the name of energy security: the struggle over the exportation of Israeli natural gas

    International Nuclear Information System (INIS)

    Fischhendler, Itay; Nathan, Daniel

    2014-01-01

    The aim of this study is to place the notion of energy security under critical scrutiny by unpacking how different actors manipulate the term through the mobilization of existential language as a prism for creating securitization discourse. Through an examination of an Israeli inter-ministerial committee charged with developing national policy regarding newly-discovered natural gas reserves off the coast of Israel, the study finds that the concept of energy security is open for manipulation and various interpretations. While some actors stress environmental acceptability and independency as pillars of energy security, others prioritized supply reliability and geopolitical benefits associated with gas exportation. Each definition of energy security was also found to be anchored in different ideologies, goals, policies and legitimizing factors. The coupling of energy with securitization rhetoric was ultimately determined as working against cooperative efforts, as committee conflicts intensified and suggested institutional measures became disproportional. - Highlights: • The concept of energy security is open for manipulation and various interpretations. • Each definition of energy security was anchored in different ideologies, goals, policies and legitimizing factors. • Numerous discursive means were used to portray energy as a security matter. • The coupling of energy with securitization rhetoric was working against cooperative efforts

  1. Narcocultura: A Threat to Mexican National Security?

    Science.gov (United States)

    2012-12-01

    Postcolony: The Zapatistas and Narcocultura,” PhD Essay , University of British Colombia: Department of Political Science, 2011, 18. 7 Rafael López...humorous lyrics or tones in some narcocorridos29 Edberg concludes by stating, “cultural images cross...provided inspiration for the lyrics of classical corridos.63 These original corridos became a source of Mexican national identity and a vehicle for

  2. UNIFIL Peacekeeping and Lebanese National Security

    Science.gov (United States)

    2012-03-22

    together with the Lebanese Armed Forces.”43 Nicholas de Riviere, Chief of the International Organizations Department at the French Foreign Ministry...Hezbollah War, (Center for Strategic and International Studies, Washington, D.C., 2007), 7. 37 lbid., 24. 38 Stephen Biddle ,Jeffrey Friedman, The...William Mooney, “Stabilizing Lebanon: peace or nation-building,” Parameters, (USAWC, Autumn 2007): 28. 40 Biddle and Friedman, The 2006 Lebanon

  3. S.2166: An act to reduce the Nation's dependence on imported oil, to provide for the energy security of the Nation, and for other purposes, introduced in the United States Senate and House of Representatives, One Hundred Second Congress, Second Session, February 19, 1992

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This bill, also referred to as the National Energy Security Act of 1992, contains the following: Title I - Findings and purposes: Climate protection goals,least-cost energy strategy, and Director of climate protection: Title II - Definitions; Title III (none); Title IV - Fleets and alternative fuels: Alternative fuel fleets, Alternative fuels, Mass transit and training; Title V - Renewable energy: CORECT and COEECT, Renewable energy initiatives, Hydropower; Title VI - Energy efficiency: Industrial, commercial, and residential, Federal energy management, Utilities, State, local, insular, and tribal energy assistance, LIHEAP options pilot program, Consultative commission on western hemisphere energy and environment; Title VII (none); Title VIII - Advanced nuclear reactor commercialization; Title IX - Nuclear reactor licensing; Title X - Uranium: Uranium enrichment, Uranium; Title XI - Natural gas; Title XII - Outer continental shelf: Coastal communities impact assistance, Coastal resources enhancement fund, relationship to other law, Prohibition of leasing and preleasing activity; Title XIII - Research, development, demonstration and commercialization activities; Title XIV - Coal and coal technology, Electricity, Innovative technology transfer; Title XV - Public Utility Holding Company Act reform; Title XVI - Strategic Petroleum Reserve; Title XVII - Stratospheric ozone depletion; Title XVIII - Indian energy resource development commission; Title XIX - General provisions

  4. Maritime energy and security: Synergistic maximization or necessary tradeoffs?

    International Nuclear Information System (INIS)

    Nyman, Elizabeth

    2017-01-01

    Offshore energy is big business. The traditional source of maritime energy, offshore petroleum and gas, has been on the rise since a reliable method of extraction was discovered in the mid-20th century. Lately, it has been joined by offshore wind and tidal power as alternative “green” sources of maritime energy. Yet all of this has implications for maritime environmental regimes as well, as maritime energy extraction/generation can have a negative effect on the ocean environment. This paper considers two major questions surrounding maritime energy and environmental concerns. First, how and why do these two concerns, maritime energy and environmental protection, play against each other? Second, how can states both secure their energy and environmental securities in the maritime domain? Maximizing maritime energy output necessitates some environmental costs and vice versa, but these costs vary with the type of offshore energy technology used and with the extent to which states are willing to expend effort to protect both environmental and energy security. - Highlights: • Security is a complicated concept with several facets including energy and environmental issues. • Offshore energy contributes to energy supply but can have environmental and monitoring costs. • Understanding the contribution of offshore energy to security depends on which security facet is deemed most important.

  5. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Science.gov (United States)

    2010-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of the...

  6. 37 CFR 5.1 - Applications and correspondence involving national security.

    Science.gov (United States)

    2010-07-01

    ... correspondence involving national security. 5.1 Section 5.1 Patents, Trademarks, and Copyrights UNITED STATES... involving national security. (a) All correspondence in connection with this part, including petitions... national security classified (see § 1.9(i) of this chapter) and contain authorized national security...

  7. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Science.gov (United States)

    2010-07-01

    ... for National Security, who shall refer such questions to the Office of Legal Counsel, as appropriate... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security...

  8. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    OpenAIRE

    Dan Constantin TOFAN; Maria Lavinia ANDREI; Lavinia Mihaela DINCÄ‚

    2012-01-01

    Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, di...

  9. Protecting and securing the energy infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Gillham, B. [Conoco Canada Ltd., Calgary, AB (Canada)

    2002-07-01

    Critical Infrastructure Protection (CIP) includes protection against physical and cyber attacks as well as potential interruptions and vulnerabilities such as natural disasters and human error. CIP makes it possible to deal with the consequences of infrastructure failures that can have regional, national and international impacts. The energy sector is challenged because there has been an irreversible move to automated control systems and electronic transactions. In addition, due to mergers and joint ventures, the line between traditional oil, natural gas companies and power companies is not perfectly clear. Energy industries can no longer be seen in isolation of each other because they depend on other critical infrastructures. Industry should lead CIP programs through risk management assessments, develop and implement global information technology standards, and enhance response and recovery planning. The National Petroleum Council (NPC) will continue to develop the capabilities of the newly formed Information Sharing and Assessment Centre (ISAC). The sector will also continue to develop common vulnerability assessment goals. It was noted that response and recovery plans must include the cyber dimension, because there has been an increasing number of scans and probes from the Internet since the events of September 11, 2001. It was noted that physical incidents can often turn into cyber incidents and vice versa.

  10. Energy market opening and the national energy programme in Slovenia

    International Nuclear Information System (INIS)

    Tomsic, M. G.; Urbancic, A.

    2000-01-01

    Slovenia is now moving fast toward market opening, at least in the electricity sector, due to the new Energy Law adopted in 1999. The Energy Law defines the main energy policy directions, including the sustainable development criterion. It also calls for the preparation of a National Energy Programme (NEP) to be adopted by the Parliament. According to the Law, local governments are expected to prepare local energy concepts, in line with the NEP and space planning decisions. Two most difficult challenges for national energy policies are: opening of the electricity market and meeting the Kyoto Protocol targets in the reduction of greenhouse gasses. The success of the energy sector reform depends on the fine-tuning of various instruments: market structuring and state interventions. The immediate concern for the sector in the secondary legislation, the fifty regulations that the Energy Law calls for. These regulations have to be prepared well before the date of internal electricity market opening on April 15th, 2001. The institutional structure to be established should be adapted for international competition that will start in electricity and gas no later than January 1st, 2003. It is expected that the NEP, to be prepared by spring of the year 2001, will propose complementary development strategies to cope with partially conflicting targets. Four groups of criteria shall be applied to compare the alternatives: security of supply, competitiveness of the society, preserving the space and environment quality and social cohesion. It is expected that energy market opening, not a final goal by itself, can be instrumental for the improvement of the energy sector performance on all accounts. (author)

  11. National security and the comprehensive test ban treaty

    International Nuclear Information System (INIS)

    Landauer, J.K.

    1980-08-01

    For nearly three years now, the US, UK, and USSR have been working on the draft of a treaty that would ban all nuclear explosions (both peaceful applications and weapon tests) and institute verification and monitoring provisions to ensure compliance with the treaty. The status of the draft treaty is summarized. The question, Is a CTBT really in the interest of US national security. is analyzed with arguments used by both proponents and opponents of the CTBT. It is concluded that there are arguments both for and against a CTBT, but, for those whose approach to national security can be expressed as peace through preparedness, the arguments against a CTBT appear persuasive

  12. The Intersection of National Security and Climate Change

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fankhauser, Jana G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kurzrok, Andrew J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sandusky, Jessica A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-07-29

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  13. The Role of Secure Access to Sustainable Energy in Reducing ...

    African Journals Online (AJOL)

    The Role of Secure Access to Sustainable Energy in Reducing Women's ... of poverty, such as low education levels, inadequate health care and limited ... women in relation to energy will help governments promote overall development goals ...

  14. Security challenges for energy-harvesting wireless sensor networks

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Papini, Davide; Dragoni, Nicola

    2012-01-01

    With the recent introduction of Energy-Harvesting nodes, security is gaining more and more importance in sensor networks. By exploiting the ability of scavenging energy from the surrounding environment, the lifespan of a node has drastically increased. This is one of the reason why security needs...

  15. Renewable energy sources and Estonian national interests

    International Nuclear Information System (INIS)

    Veski, Rein

    2002-01-01

    There is only one national level document, The Long-term National Development Plan for the Fuel and Energy sector, regulating the development of renewable energy for Estonia. It was approved by the Parliament (Riigikogu) in 1998. This document planned a 2/3 (66,7%) increase in the share of renewable (according to the document: peat, biofuels and other renewables) to the year 2010 against 1996. At the same time a decrease of the share of domestic oil shale was planned 1/5 to the year 2010 against 1995. That means the use of domestic energy sources, both renewable and non-renewable, will decrease by 16,8% altogether. In reality the rapid projected growth of renewables in Estonia (+66,7% between 1996 and 2010) was changed with decrease of 20% by 2000. So the security of supply must shift to the first place in Estonia. It is also an issue of national sovereignty. Estonia is rich in renewable energy sources, mainly in wood, peat and wind, to achieve the goals set in the National Development Plan. Forest resources amount 352,7, total felling 6,44, allowed felling 7,81 million cubic meters solid volume in 2000. The future of fuel peat usage in Estonia is uncertain, as most of the EU member states, which have burned up their peat resources and/or drained their mires do not consider peat as a renewable fuel. Obviously Estonia has to explain its opinion about the renewability of its resources. Although progress is needed in all directions of additional use of all renewable energy sources in tactical consideration finance must be directed first to guarantee better use of wastes of woodworking and timber industry

  16. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    Directory of Open Access Journals (Sweden)

    Dan Constantin TOFAN

    2012-01-01

    Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.

  17. Security of energy supply: Account of the security of supply in Denmark; Energiforsyningssikkerhed. Redegoerelse om forsyningssikkerheden i Danmark

    Energy Technology Data Exchange (ETDEWEB)

    2010-02-15

    A secure and stable energy supply is a prerequisite for a society like the Danish. Through many years of active energy policy we in Denmark have developed an efficient energy system with a very high security of supply. In coming decades it is necessary to implement a major transformation of our energy supplies to more renewable energy and phase out fossil fuels. The Government's vision is that we must have a Denmark that is independent of fossil fuels. With such a fundamental transformation of our energy supply and energy system it becomes a challenge to maintain the high security of supply, as we know it today. Conversely, it is not a long term solution to continue to allow society to be dependent on fossil fuels. And it is against this background, the Danish Minister for Climate and Energy submit this account on security of energy supplies in Denmark. The account shows that we in Denmark have a high security of supply. There is still access to sufficient energy resources, we have a well-functioning infrastructure, and we have good access to the exchange of energy within the EU and other countries. This places Denmark in a good situation. Today, Denmark has a significant import of especially petroleum and coal and export of petroleum and gas. The future declining production of oil and gas in the North Sea means an increasing need for imported fuels from fewer and fewer countries and regions, and at the same time there will be an increased international demand for the same fuels. This brings Denmark in the same situation as the other EU countries. Thus we have the basis for reducing consumption of fossil fuels and instead accommodate increasing amounts of renewable energy in our energy supply, but it requires a further development of the system to be possible to store energy and manage energy consumption. It will be necessary if the growing parts of our energy must come from fluctuating sources like wind and solar energy. Efficiency in energy supply has

  18. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Leiby, Paul Newsome [ORNL

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described

  19. Future Trends and US National Security

    Science.gov (United States)

    2015-01-01

    algae; or any other type of carbon-rich waste product such as wood, paper, or plastic .52 The ideal mixture of the substrate is a key investigation...generation of biofuel, called “ cellulosic ethanol,” comes from fibrous plant waste such as stems, leaves, or wood.32 Unfortu- nately, the process for...Scott C. “Energy and Force Transformation.” Joint Force Quarterly 42 ( 3d Quarter 2006): 51–54. Builder, Carl H. The Masks of War: American Military

  20. The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report

    International Nuclear Information System (INIS)

    Bragg-Sitton, S.; Bess, J.; Werner, J.

    2011-01-01

    The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

  1. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  2. Liberalisation and energy security in the European Union. Success and questions

    International Nuclear Information System (INIS)

    Clastres, Cedric; Locatelli, Catherine

    2012-09-01

    The energy environment of the European Union as well as its own internal situation have undergone profound changes. The energy security of member states is therefore an important issue that should be examined. This security concerns gas and electricity markets, with infrastructures, long-term contracts, lack of investment and with the increasing use of natural gas to generate electricity. Energy market players have to manage security concerns in these two markets in order to supply socially and economically essential commodities. In this article, we examine two main topics. The first is related to the European Union's capacity to solve the problem of security of supply by finding internal solutions. The second concerns external security of supply. With the upstream structure of the gas market, a problem of investing in trans-national gas pipelines exists, besides relations with gas suppliers outside the EU. (authors)

  3. Energy Policies for Resilience and National Security.

    Science.gov (United States)

    1981-10-01

    consequences: cancer , sterility, and gross birth defects...for many years after...release." [Joint Committee on Defense Production 1977:1:29] Since many of these...emergency generators, and thirteen other establishments, mainly medical , needed emergency generators repaired. Con Ed dispatched 18 of its 50 portable...scrap metal were il- licitly dug up and sold from a waste dump in Beatty, Nevada [NRC 1976a]. "Vast quantities of cannabis resin were smuggled into

  4. Nuclear power for energy security - Indian scenario

    International Nuclear Information System (INIS)

    Sinha, R.K.

    2013-01-01

    India has been witnessing an impressive growth in GDP in the face of several challenges including the fact that India has a population of over 1.2 billion. In order to provide and maintain a comfortable standard of living to our large population, as well as to sustain the national economic growth, it is essential to have a matching growth in the availability of energy. One such indicator is per capita electricity consumption, and for India, it is about 700 kWh which is far below that of the OECD countries (∼8000 kWh). Furthermore, India's population is expected to rise to about 1.5 billion by 2050. A per capita use of about 5000 kWh energy in the form of electricity every year would be needed for achieving a state of reasonably high development. This will require an installed electricity generation capacity exceeding 1300 GWe, which is slightly more than six times the existing installed electricity generation capacity of 210 GWe in India. Despite the fact that at present India is the fifth largest electricity generating country, India has to increase total electricity generation to almost 10 times the present generation level (about 875 billion kWh). It is against this backdrop, that we cannot afford to ignore any source of energy production including the nuclear option, since no single source alone, or not even a combination of only a couple of sources, can ever meet the entire energy needs of our country in a reliable and sustainable manner. (author)

  5. The Security of Energy Supply and the Contribution of Nuclear Energy

    International Nuclear Information System (INIS)

    2011-01-01

    What contribution can nuclear energy make to improve the security of energy supply? This study, which examines a selection of OECD member countries, qualitatively and quantitatively validates the often intuitive assumption that, as a largely domestic source of electricity with stable costs and no greenhouse gas emissions during production, nuclear energy can make a positive contribution. Following an analysis of the meaning and context of security of supply, the study uses transparent and policy-relevant indicators to show that, together with improvements in energy efficiency, nuclear energy has indeed contributed significantly to enhanced energy supply security in OECD countries over the past 40 years. Content: Foreword; Executive Summary; 1. The Security of Energy Supply and the Contribution of Nuclear Energy - Concepts and Issues: - Energy supply security: An introduction, - Why security of energy supply remains a policy issue in OECD countries, - The external dimension: import dependence, resource exhaustion and carbon policy, - The internal dimension: economic, financial and technical considerations for energy supply security - Orientations for government policies to enhance the security of energy supply, - Conclusions; 2. Indicators and Models for Measuring Security of Energy Supply Risks: - Introduction, - Different approaches towards designing the Supply/Demand Index, - A detailed review of selected security of supply indicators, - Comprehensive models for assessing the security of energy supply, - The Supply/Demand Index, - Concluding observations; 3. Evolution of the Security of Energy Supply in OECD Countries: - Time-dependent quantification of the security of energy supply, - Changes in security of supply in selected OECD countries, - Electricity generation and the security of energy supply, - The contribution of nuclear energy and energy intensity to the security of energy supply, - The geographical distribution of SSDI values, - Conclusions; 4. Public

  6. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  7. Rotting from Within: American Education and National Security

    Science.gov (United States)

    2011-03-04

    advantage and place its future prosperity and security at risk. Problems in America‘s Education System (K-12) Why are U.S. student doing poorly? A...nation‘s education problems. Students are fatter, slower, and weaker than their international counterparts in developed nations. Our children have...national, and international issues and events into the classroom on a regular basis.50 Additionally, educators should design programs that give

  8. The security energy encryption in wireless power transfer

    Science.gov (United States)

    Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.

    2017-09-01

    This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.

  9. Language Can: Ensuring National Security through Effective Use of ...

    African Journals Online (AJOL)

    This paper is one of such efforts to show that ineffective language use can threaten national security while effective use can enhance it. Language use in interpersonal relationship is like a double- edged sword. It can be used to destroy as well as be used to mend. The present democratic dispensation in Nigeria has been ...

  10. National security and the constitutional right to join military trade ...

    African Journals Online (AJOL)

    The unionisation of the South African Military Forces has tested both lawyers and the South African legal system. However, there is very little academic commentary on this important subject. In this article, the policy, which allowed the unionisation of the South African military, the influence of the policy on national security, ...

  11. 77 FR 44641 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-07-30

    ... its business. ADDRESSES: The meeting will be held via a conference call. For access to the [[Page... of their review of the Department of Homeland Security's (DHS) National Cybersecurity and... the NSTAC's proposed Joint Collaboration Center that the NSTAC envisioned in its 2009 Cybersecurity...

  12. Identifying the Enemy: Social Categorization and National Security Policy

    Science.gov (United States)

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  13. Achieving Youth Employment and National Security in Nigeria: TVET Imperatives

    Science.gov (United States)

    Ogbuanya, T. C.; Ofonmbuk, Michael

    2015-01-01

    The rate of unemployment in Nigeria is alarming and could promote social vices some of which are kidnapping, armed robbery, child trafficking, Cultism, Drug peddling and ritual killing. These social vices could in no small measure constitute a threat to national security as a matter of fact. Therefore, the development of a workable Technical and…

  14. Flexibility and security : National social models in transitional labour markets

    NARCIS (Netherlands)

    Muffels, R.J.A.; Crouch, Colin; Wilthagen, A.C.J.M.

    2014-01-01

    Aggregate and individual data are used to test the association between employment performance and different ways of reconciling flexibility and security in European labour markets. Particular use is made of statistics on individuals’ labour market transitions as revealed by national labour force

  15. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    Science.gov (United States)

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  16. Impact of the national special programme for food security on ...

    African Journals Online (AJOL)

    Impact of the national special programme for food security on poverty alleviation among women in Oyo State, Nigeria. ... In addition, majority (60.2%) of the participants were literate and participated more in cassava and maize production, while insufficient loan ranked first among the problems encountered by the ...

  17. Academics and National-Security Experts Must Work Together

    Science.gov (United States)

    Gansler, Jacques S.; Gast, Alice P.

    2008-01-01

    In the years since the September 11, 2001, terrorist attacks, the federal government's policies that deal with national security have changed significantly. In an effort to prevent the results of science and engineering research from being misused or falling into the wrong hands, government agencies that support studies are placing restrictions on…

  18. The National Security Language Initiative and the Teaching of Hindi

    Science.gov (United States)

    Shinge, Manjula

    2008-01-01

    This article discusses the teaching of Hindi in the USA, with special reference to the National Security Language Initiative (NSLI). Asian Indian languages are briefly described, as are the growth and diversification of the Asian Indian population in the USA. The inclusion of Hindi in the NSLI, and the implications of this decision for the…

  19. Effect of imports of uranium on the national security. Critical technologies

    International Nuclear Information System (INIS)

    1989-09-01

    The report gives results of an investigation to determine the effects of uranium imports on the national security. Uranium is essential to the operation of the Navy's nuclear-powered fleet, for nuclear weapon capability and for civilian nuclear energy generation. US utilities imported 43.8 percent of their uranium requirements in 1986 and 51.1 percent in 1987. The report finds that the domestic industry's competitiveness has deteriorated in recent years, due to the easily accessible and richer deposits available elsewhere. The report concludes, however, that in a national security emergency, defense requirements could be met through stockpiles of finished nuclear materials set aside for military needs. Furthermore, civilian requirements could be met through US production, reliable imports, inventories, and tails reprocessing. The report, therefore, finds that uranium is not being imported in such quantities or under such circumstances as to represent a threat to the national security

  20. What is the place of the energy supply security and energy independence in the energy policy?

    International Nuclear Information System (INIS)

    2001-12-01

    Since the petroleum crisis and the electric power cuts of the 1999 storm, the energy security interest is growing. The author recall the structural risks of the energy systems and the vulnerability of the occidental economies to the supply disruptions. They propose then a long term cooperation between producer and consumer countries, a development of operational tools to face the crisis and a supply security inside the europe. (A.L.B.)

  1. Japan’s energy security predicament post-Fukushima

    International Nuclear Information System (INIS)

    Vivoda, Vlado

    2012-01-01

    If energy security is defined as the availability of energy at all times in various forms, in sufficient quantities and at affordable prices, without unacceptable or irreversible impact on the economy and the environment, Japan is facing an energy security predicament. For a country that was already uneasy about energy security, the March 11, 2011 earthquake and tsunami, which caused a nuclear catastrophe in TEPCO’s Fukushima Daiichi nuclear power plant, turned this unease into outright anxiety. With the temporary and/or permanent closure of many nuclear reactors Japan has had to replace lost power. Tokyo has had no choice but to secure additional fossil fuels, a strategy that has negatively affected Japan’s economy due to rising fuel costs. The increase in Japan’s fossil fuel consumption has also caused a significant increase in greenhouse gas emissions, and affected Tokyo’s commitment to Kyoto targets. This paper analyzes the consequences of the 2011 nuclear disaster for Japan’s energy security. Recognizing that Japan’s future energy policy choices are constrained and path dependent, the paper outlines energy policy recommendations for Japan’s government. - Highlights: ► Analysis of Japan’s energy security situation post-Fukushima. ► Energy transition is path dependant and slow. ► Government is facing significant challenges in terms of future energy policy.

  2. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Science.gov (United States)

    2010-01-01

    ... imports on the national security. 705.4 Section 705.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.4 Criteria...

  3. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Science.gov (United States)

    2010-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted Data...

  4. 17 CFR 249.10 - Form 1-N for notice registration as a national securities exchange.

    Science.gov (United States)

    2010-04-01

    ... registration as a national securities exchange. 249.10 Section 249.10 Commodity and Securities Exchanges... or Exemption of, and Notification of Action Taken by, National Securities Exchanges § 249.10 Form 1-N for notice registration as a national securities exchange. This form shall be used for notice, and...

  5. 78 FR 46622 - Application of Topaz Exchange, LLC for Registration as a National Securities Exchange; Findings...

    Science.gov (United States)

    2013-08-01

    ... Exchange, LLC for Registration as a National Securities Exchange; Findings, Opinion, and Order of the... Registration as a National Securities Exchange (``Form 1 Application'') \\1\\ under Section 6 of the Securities... substantive, are consistent with the existing rules of other registered national securities exchanges, or are...

  6. Economic foundation and importance of non-state security sector within the national security system

    Directory of Open Access Journals (Sweden)

    Anđelković Slobodan

    2016-01-01

    Full Text Available The main purpose of this paper was to present the causes (for, role (played by and the growing importance of the non-state actors within the national security sector, while analyzing the economic interest of individuals, organizations and the state itself that were favoring such a development. In the course of our research we established how, as the state narrowed its activities down to more vital and more dangerous fields of work, this opened up space for independent contractors to enter those fields which carried less systemic risk. Such change was made possible in the post-Cold War context, when many of the former service members were hired by private companies. The economic motive had a role to play as well, given the need for additional security going beyond what state offered to its citizens, as many doubted the ability (efficiency of state to provide it in the first place; and private sector's willingness to provide it for a price. In Serbia, position of non-state security sector is still very much limited by the traditional notion of security as well as the division of competences, both left-overs from socialist times. This goes against positive tendencies within the sector itself (improvement of types and specialization of the security as service; strengthening of legal regulation; flexibility of services being offered. By conducting its basic service and improving the security of its clients, representatives of non-state security sector are - indirectly - improving the security of society as a whole, ensuring economic stability, which presents one of key national interests.

  7. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  8. Exploring public perceptions of energy security risks in the UK

    International Nuclear Information System (INIS)

    Demski, Christina; Poortinga, Wouter; Pidgeon, Nick

    2014-01-01

    Along with climate change and affordability, concerns about energy security are key drivers behind proposals for major energy system change in the UK and numerous other countries. Unlike climate change we know very little about how the public thinks and feels about this aspect of sustainability and energy policy. Beyond engaging critically with conceptual and theoretical discussions, empirical data from two surveys (Cardiff postal survey, N=520; online UK survey, N=499) using a ten item energy security scale are presented and discussed. Here we show that aspects of energy security are certainly of concern to the UK public, with particularly high concern around dependence on fossil fuels/imports and relatively lower expressed concern for actual disruption of energy supply. However public concerns around energy security are only emerging, and likely to change depending on the context in which it is discussed (e.g. in comparison to climate change). In addition, findings from public interviews are used to further contextualise the survey findings, showing unfamiliarity among the UK public with regards to the term “energy security”. We discuss implications, and further work that would be useful for understanding public perceptions in more depth. - highlights: • Exploring public views on energy security using a 10 item scale. • Concerns over energy security is relatively high but susceptible to framing. • Patterns of concern for different energy security aspects examined. • The term energy security is unfamiliar, only an emerging concern among UK publics. • Further discussion on the meanings and implications of these perceptions

  9. Calendar Year 2007 Resource Conservation and Recovery Act Annual Monitoring Report for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee - RCRA Post-Closure Permit Nos. TNHW-113, TNHW-116, and TNHW-128

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental

    2008-02-01

    This report contains groundwater quality monitoring data obtained during calendar year (CY) 2007 at the following hazardous waste treatment, storage, and disposal (TSD) units located at the US Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) in Oak Ridge, Tennessee; this S-3 Site, Oil Landfarm, Bear Creek Burial Grounds/Walk-In Pits (BCBG/WIP), Eastern S-3 Site Plume, Chestnut Ridge Security Pits (CRSP), Chestnut Ridge Sediment Disposal Baste (CRSDB), few Hollow Quarry (KHQ), and East Chestnut Ridge Waste Pile (ECRWP). Hit monitoring data were obtained in accordance with the applicable Resource Conservation and Recovery Act of 1976 (RCRA) hazardous waste post-closure permit (PCP). The Tennessee Department of Environment and Conservation (TDEC) - Division of Solid Waste Management issued the PCPs to define the requirements for RCRA post-closure inspection, maintenance, and groundwater monitoring at the specified TSD units located within the Bear Creek Hydrogeologic Regime (PCP no. TNHW-116), Upper East Fork Poplar Creek Hydrogeologic Regime (PCP no. TNHW-113), and Chestnut Ridge Hydrogeologic Regime (PCP no. TNHW-128). Each PCP requires the Submittal of an annual RCRA groundwater monitoring report containing the groundwater sampling information and analytical results obtained at each applicable TSD unit during the preceding CY, along with an evaluation of groundwater low rates and directions and the analytical results for specified RCRA groundwater target compounds; this report is the RCRA annual groundwater monitoring report for CY 2007. The RCRA post-closure groundwater monitoring requirements specified in the above-referenced PCP for the Chestnut Ridge Regime replace those defined in the previous PCP (permit no. TNHW-088), which expired on September 18, 2005, but remained effective until the TDEC issued the new PCP in September 2006. The new PCP defines site-specific groundwater sampling and analysis requirements for the

  10. Los Alamos National Security, LLC Request for Information from industrial entities that desire to commercialize Laboratory-developed Extremely Low Resource Optical Identifier (ELROI) tech

    Energy Technology Data Exchange (ETDEWEB)

    Erickson, Michael Charles [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-11-10

    Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.

  11. Energy symposium 2007 - energy secured?... for what price. Summary of the congress contributions

    International Nuclear Information System (INIS)

    2008-01-01

    With its topical title ''Energy secured?.. for what price'' the 2007 Energy Symposium has added yet another milestone to its success story. Energy is a fundamental aspect of our industrial society. It is of essential importance that the demand for low-cost energy is strategically secured. Energy prices are basic to calculations on products that have to be sold and exported. They are therefore also an essential factor in securing Europe as an industrial region

  12. Confusion surrounding the concept of nuclear 'security'. 'Preventing Japan from going nuclear contributes to Japan's national security'?

    International Nuclear Information System (INIS)

    Kubota, Masafumi

    2012-01-01

    A law enacted on June 20 to establish a new Nuclear Regulatory Authority (NRA) fully separated from the nuclear promotional authorities. It added the provision, which says nuclear safety should be guaranteed not only to defend lives, people's health and the environment but also to 'contribute to Japan's national security', to Article 2 of the Atomic Energy Basic Law. NRA integrated the existing regulatory authorities for safety, security and safeguards, into one. Supporters of an amendment quietly slipped into the law were denying it could provide cover for military use of nuclear technology, but arouse international concern about recycling program of extracting plutonium from spent fuels. Nuclear policy minister said: 'The safeguards are in place to prevent nuclear proliferation. The world 'security' precisely means the prevention of nuclear proliferation.' If not used explicitly about safeguards, they left room for stretched interpretation. The author recommended the world' contribute to Japan's national security' should be deleted instead of explaining appropriately, both at home and abroad, the use of nuclear power in Japan limited to peaceful purposes. (T. Tanaka)

  13. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    Science.gov (United States)

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  14. Challenges and countermeasures of China’s energy security

    International Nuclear Information System (INIS)

    Cao, Wensheng; Bluth, Christoph

    2013-01-01

    China is now a major consumer and importer of energy, and its choices and policies will increasingly affect the rest of the world. This paper analyses the key features of China’s energy policy as it faces the prospect of possible challenges to its energy security given the increasing reliance on fuel imports and the need to transform its energy to meet the requirements of a modern, fast-growing economy. The paper examines whether the current energy mix is appropriate and sustainable, and considers the China’s policymakers new emphasis on energy efficiency, conservation, renewable energy and the shift to natural gas the primary energy source. It examines the internal and external constraints on China’s energy policy and considers the strategic dilemmas arising from China’s increasing involvement in international energy markets. It concludes that both the domestic and international implications of China’s search for energy security will confront policymakers with hard choices that will affect not only energy policy, but also China’s geopolitical grand strategy. - Highlights: ► Conception of energy security and energy policy in China’s grand strategy are expatiated. ► Challenges China is facing are analyzed from 4 aspects. ► New strategic thoughts of China including 6 capability enhancements are raised. ► Major tasks of safeguarding energy security contain 3 measures of improvement.

  15. Y-12 Groundwater Protection Program Calendar Year 2000 Groundwater Monitoring Data Evaluation Report for the Upper East Fork Poplar Creek Hydrogeologic Regime at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee; FINAL

    International Nuclear Information System (INIS)

    None

    2001-01-01

    This report presents an evaluation of the groundwater and surface water monitoring data obtained during calendar year (CY) 2000 in the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime). The East Fork Regime encompasses many confirmed and potential sources of groundwater and surface water contamination associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) in Oak Ridge, Tennessee. Prepared under the auspices of the Y-12 Groundwater Protection Program (GWPP), this report addresses applicable provisions of DOE Order 5400.1 (General Environmental Protection Program) that require: (1) an evaluation of the quantity and quality of groundwater and surface water in areas that are, or could be, affected by Y-12 operations, (2) an evaluation of groundwater and surface water quality in areas where contaminants from Y-12 operations are most likely to migrate beyond the DOE Oak Ridge Reservation (ORR) property line, and (3) an evaluation of long-term trends in groundwater quality at Y-12. The following sections of this report contain relevant background information (Section 2.0); describe the results of the respective data evaluations required under DOE Order 5400.1 (Section 3.0); summarize significant findings of each evaluation (Section 4.0); and list the technical reports and regulatory documents cited for more detailed information (Section 5.0). Illustrations (maps and trend graphs) are presented in Appendix A. Brief data summary tables referenced in each section are contained within the text; supplemental information and extensive data tables are provided in Appendix B

  16. Y-12 Groundwater Protection Program Calendar Year 2000 Groundwater Monitoring Data Evaluation Report for the Bear Creek Hydrogeologic Regime at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2001-09-01

    This report presents an evaluation of the groundwater and surface water monitoring data obtained during calendar year (CY) 2000 in the Bear Creek Hydrogeologic Regime (Bear Creek Regime). The Bear Creek Regime encompasses many confirmed and potential sources of groundwater and surface water contamination associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) in Oak Ridge, Tennessee (Figure A.1). Prepared by the Y-12 Groundwater Protection Program (GWPP), this report addresses applicable provisions of DOE Order 5400.1 (General Environmental Protection Program) that require: (1) an evaluation of the quantity and quality of groundwater and surface water in areas that are, or could be, affected by Y-12 operations, (2) an evaluation of groundwater and surface water quality in areas where contaminants from Y-12 operations are most likely to migrate beyond the DOE Oak Ridge Reservation (ORR) property line, and (3) an evaluation of long-term trends in groundwater quality at Y-12. The following sections of this report contain relevant background information (Section 2.0); describe the results of the respective data evaluations required under DOE Order 5400.1 (Section 3.0); summarize significant findings of each evaluation (Section 4.0); and list the technical reports and regulatory documents cited for more detailed information (Section 5.0). Illustrations (maps and trend graphs) are presented in Appendix A. Brief data summary tables referenced in each section are contained within the sections. Supplemental information and extensive data tables are provided in Appendix B.

  17. Energy security and climate change protection: Complementarity or tradeoff?

    International Nuclear Information System (INIS)

    Brown, Stephen P.A.; Huntington, Hillard G.

    2008-01-01

    Energy security and climate change protection have risen to the forefront of energy policy - linked in time and a perception that both goals can be achieved through the same or similar policies. Although such complementarity can exist for individual technologies, policymakers face a tradeoff between these two policy objectives. The tradeoff arises when policymakers choose the mix of individual technologies with which to reduce greenhouse gas emissions and enhance energy security. Optimal policy is achieved when the cost of the additional use of each technology equals the value of the additional energy security and reduction in greenhouse gas emission that it provides. Such an approach may draw more heavily on conventional technologies that provide benefits in only one dimension than on more costly technologies that both increase energy security and reduce greenhouse gas emissions. (author)

  18. Nuclear safety and energy supply security: conflict or goal?

    International Nuclear Information System (INIS)

    Kutas, S.

    2006-01-01

    Energy generation and safety problems at the nuclear power plant have been analysed. Nuclear power plants are operated on the commercial basis in many countries today. Safety and security in energy generation and distribution is a complex problem. Energy supply reliability, security energy price and other issues should be co-ordinated and solved at the same time. Decentralisation and deregulation means new challenges for regulatory bodies and assurance of security. International co-operation in this field is very important. Western European Nuclear Regulators' Association (WENRA) consolidates efforts of regulatory bodies of European countries in order to harmonize approaches of nuclear safety. Nuclear Safety, and security of energy supply is the task and goal at the same time. (author)

  19. Energy Security of Russia and the EU: Current Legal Problems

    Energy Technology Data Exchange (ETDEWEB)

    Seliverstov, S.

    2009-07-01

    Security of energy supply is a cornerstone of European energy policy. It receives specific mention both in the Constitution Treaty and in the Lisbon Treaty. Of course, energy and energy-generated revenues are vital for Russia as well. It is a common understanding that Russia and the EU are extremely interdependent in terms of energy. On the one hand, Russia is the strategic energy supplier to the EU as a whole; for some member states Russian supplies represent the only source of the external energy flows. On the other hand, the revenues generated from the west-bound supplies of oil and gas constitute a significant share of the overall export income and of the budget of Russian Federation. Taking the interdependency as a point of departure the present article answers the following questions: What are the differences and the similarities in the European and the Russian approaches towards security of energy supply? Is their understanding of energy security so different? What are the current legal instruments guiding interaction in this sphere? What are the actual trends that could give some indication of how the situation may develop in the future? - While the concepts of 'security of energy supplies' or of 'energy security' are theoretical in nature, the ways the concepts are understood and the legal framework for them directly influences the way they are applied in practice. (author)

  20. Energy Security of Russia and the EU: Current Legal Problems

    International Nuclear Information System (INIS)

    Seliverstov, S.

    2009-01-01

    Security of energy supply is a cornerstone of European energy policy. It receives specific mention both in the Constitution Treaty and in the Lisbon Treaty. Of course, energy and energy-generated revenues are vital for Russia as well. It is a common understanding that Russia and the EU are extremely interdependent in terms of energy. On the one hand, Russia is the strategic energy supplier to the EU as a whole; for some member states Russian supplies represent the only source of the external energy flows. On the other hand, the revenues generated from the west-bound supplies of oil and gas constitute a significant share of the overall export income and of the budget of Russian Federation. Taking the interdependency as a point of departure the present article answers the following questions: What are the differences and the similarities in the European and the Russian approaches towards security of energy supply? Is their understanding of energy security so different? What are the current legal instruments guiding interaction in this sphere? What are the actual trends that could give some indication of how the situation may develop in the future? - While the concepts of 'security of energy supplies' or of 'energy security' are theoretical in nature, the ways the concepts are understood and the legal framework for them directly influences the way they are applied in practice. (author)