WorldWideScience

Sample records for security administration nnsa

  1. Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)

    International Nuclear Information System (INIS)

    Jesse Schreiber

    2008-01-01

    In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet America's nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization and improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in 'green' technology

  2. NNSA Program Develops the Next Generation of Nuclear Security Experts

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  3. Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Long, J.D.

    2013-01-01

    The IAEA has described the Safeguards by Design (SBD) concept as an approach in which international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning. Often, international safeguards features are added following completion of the facility design. Earlier consideration of safeguards features has the potential to reduce the need for costly re-designs or retrofits of the facility and can result in a more efficient and effective safeguards design. The U.S. Department of Energy's National Nuclear Security Administration (NNSA) initiated a project in 2008 through its Next Generation Safeguards Initiative (NGSI) to establish a global norm for the use of SBD. The NGSI SBD program is evolving in parallel with a similar effort at the IAEA, while taking into account the IAEA's SBD achievements and future plans. The NGSI program includes DOE laboratory studies, international workshops, engagement with industry and the IAEA, and setting an example through its planned use in new nuclear facilities in the United States. Consistent with this effort, the NGSI program has sponsored 'Lessons Learned' studies and the preparation of facility-specific SBD Guidance documents. The NGSI program also takes into account successes that the NNSA has had with implementing safeguards early into facility designs within the U.S. The purpose of this paper is the presentation of the most recent developments in SBD under NGSI within the U.S. as well as the presentation of 'Lessons Learned' integrating safeguards into new nuclear facility designs of the U.S. Nuclear Security Enterprise (NSE), namely the Uranium Processing Facility (UPF) project at the Y-12 National Security Complex in Oak Ridge, Tennessee and to discuss its relevance to international safeguards. The paper is followed by the slides of the presentation. (author)

  4. NNSA Staff Member Receives NNSA Recognition

    Energy Technology Data Exchange (ETDEWEB)

    Specht, Elaine S.

    2013-04-01

    This article is intended for publication in the NNSA Nonproliferation and International Security (NIS) Highlights, a quarterly newsletter available in print and e-form. It will be published on the NNSA website and is intended for public release.

  5. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  6. 76 FR 51358 - National Nuclear Security Administration Amended Record of Decision: Disposition of Surplus...

    Science.gov (United States)

    2011-08-18

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Amended Record of Decision... National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of... Manager, Office of Fissile Materials Disposition, National Nuclear Security Administration, U.S...

  7. NNSA/NV Consequence Management Capabilities for Radiological Emergency Response

    International Nuclear Information System (INIS)

    Bowman, D. R.

    2002-01-01

    The U.S. Department of Energy's National Nuclear Security Administration Nevada Operations Office (NNSA/NV) provides an integrated Consequence Management (CM) response capability for the (NNSA) in the event of a radiological emergency. This encompasses planning, technical operations, and home team support. As the lead organization for CM planning and operations, NNSA/NV coordinates the response of the following assets during the planning and operational phases of a radiological accident or incident: (1) Predictive dispersion modeling through the Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) and the High Consequence Assessment Group at Sandia National Laboratories (SNL); (2) Regional radiological emergency assistance through the eight Radiological Assistance Program (RAP) regional response centers; (3) Medical advice and assistance through the Radiation Emergency Assistance Center/Training Site (REAC/TS) in Oak Ridge, Tennessee; (4) Aerial radiological mapping using the fixed-wing and rotor-wing aircraft of the Aerial Measuring System (AMS); (5) Consequence Management Planning Teams (CMPT) and Consequence Management Response Teams (CMRT) to provide CM field operations and command and control. Descriptions of the technical capabilities employed during planning and operations are given below for each of the elements comprising the integrated CM capability

  8. Annual Waste Minimization Summary Report for the National Nuclear Security Administration Nevada Site Office

    International Nuclear Information System (INIS)

    Alfred J. Karns

    2007-01-01

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U. S. Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during CY06. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit ((number s ign)NEV HW0021) and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the DOE, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume and toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO

  9. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  10. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  11. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2010-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  12. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  13. Nevada National Security Site Environmental Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  14. Nevada National Security Site Environmental Report 2011

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  15. Nevada National Security Site Environmental Report 2011

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  16. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2012-01-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  17. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2012-02-28

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  18. Proposed Methodology for Developing a National Strategy for Human Resource Development: Lessons Learned from a NNSA Workshop

    International Nuclear Information System (INIS)

    Elkhamri, Oksana O.; Frazar, Sarah L.; Essner, Jonathan; Vergino, Eileen; Bissani, Mo; Apt, Kenneth E.; McClelland-Kerr, John; Mininni, Margot; VanSickle, Matthew; Kovacic, Donald

    2009-01-01

    This paper describes a recent National Nuclear Security Administration (NNSA) workshop on Human Resource Development, which was focused on the potential methodology for developing a National Human Resource strategy for nuclear power in emerging nuclear states. The need for indigenous human resource development (HRD) has been singled out as a key milestone by the International Atomic Energy Agency (IAEA) in its 2007 Milestones document. A number of countries considering nuclear energy have reiterated this need for experts and specialists to support a national nuclear program that is sustainable and secure. Many have expressed concern over how best to assure the long-term availability of crucial human resource, how to approach the workforce planning process, and how to determine the key elements of developing a national strategy.

  19. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  20. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: • DOE hazardous and non-hazardous non-radioactive classified waste • DOE low-level radioactive waste (LLW) • DOE mixed low-level waste (MLLW) • U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  1. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2013-01-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: DOE hazardous and non-hazardous non-radioactive classified waste; DOE low-level radioactive waste (LLW); DOE mixed low-level waste (MLLW); and, U.S. Department of Defense (DOD) classified waste. The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  2. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  3. Neutron and Gamma Imaging for National Security Applications

    Science.gov (United States)

    Hornback, Donald

    2017-09-01

    The Department of Energy, National Nuclear Security Administration (NNSA), Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D/NA-22) possesses, in part, the mission to develop technologies in support of nuclear security efforts in coordination with other U.S. government entities, such as the Department of Defense and the Department of Homeland Security. DNN R&D has long supported research in nuclear detection at national labs, universities, and through the small business innovation research (SBIR) program. Research topics supported include advanced detector materials and electronics, detection algorithm development, and advanced gamma/neutron detection systems. Neutron and gamma imaging, defined as the directional detection of radiation as opposed to radiography, provides advanced detection capabilities for the NNSA mission in areas of emergency response, international safeguards, and nuclear arms control treaty monitoring and verification. A technical and programmatic overview of efforts in this field of research will be summarized.

  4. Nevada National Security Site Environmental Report 2011 Summary

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  5. Nevada National Security Site Environmental Report 2011 Summary

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  6. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  7. A REGIONAL PARTNERSHIP ON RADIOLOGICAL SECURITY

    International Nuclear Information System (INIS)

    Morris, Fred A.; Murray, A.; Dickerson, S.; Tynan, Douglas M.; Rawl, Richard R.; Hoo, Mark S.

    2007-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO) created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's National Nuclear Security Administration (NNSA) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP/RSRS partnership is to cooperate with regional neighbors in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports NNSA and IAEA objectives to improve the security of high risk radioactive sources by raising awareness of the need, and developing national programs, to: protect and control such materials; improve the security of such materials and recover and condition the materials no longer in use. To date, agreed upon joint activities have included assistance with the improvement of regulatory infrastructure for the control of radioactive sources, training on the physical protection of radioactive sources, training and assistance with the search, location, identification and securing of orphan radioactive sources and overall assistance with implementing the IAEA Code of Conduct on the Safety and Security of Radioactive Sources. Since the inception of the partnership, ten Southeast Asian nations have participated in a range of activities from receiving general training on the security of radioactive sources to receiving specialized equipment and training to locate orphan or abandoned radioactive sources. By having a shared vision and objectives for radioactive source security in the Southeast Asian region, ANSTO and NNSA have been able to develop a successful partnership which has effectively utilized the technical, financial and political resources of each contributing partner. An example of how this partnership works is the cooperation with the Nuclear Energy Regulatory Agency, Indonesia (BAPETEN) to

  8. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  9. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  10. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  11. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  12. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  13. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  14. 76 FR 2142 - Employee Benefits Security Administration

    Science.gov (United States)

    2011-01-12

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Hearing on Definition of ``Fiduciary'' AGENCY: Employee Benefits Security Administration, Labor. ACTION: Notice of hearing and extension of comment period. SUMMARY: Notice is hereby given that the Employee Benefits Security Administration will...

  15. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  16. NNSA?s Computing Strategy, Acquisition Plan, and Basis for Computing Time Allocation

    Energy Technology Data Exchange (ETDEWEB)

    Nikkel, D J

    2009-07-21

    This report is in response to the Omnibus Appropriations Act, 2009 (H.R. 1105; Public Law 111-8) in its funding of the National Nuclear Security Administration's (NNSA) Advanced Simulation and Computing (ASC) Program. This bill called for a report on ASC's plans for computing and platform acquisition strategy in support of stockpile stewardship. Computer simulation is essential to the stewardship of the nation's nuclear stockpile. Annual certification of the country's stockpile systems, Significant Finding Investigations (SFIs), and execution of Life Extension Programs (LEPs) are dependent on simulations employing the advanced ASC tools developed over the past decade plus; indeed, without these tools, certification would not be possible without a return to nuclear testing. ASC is an integrated program involving investments in computer hardware (platforms and computing centers), software environments, integrated design codes and physical models for these codes, and validation methodologies. The significant progress ASC has made in the past derives from its focus on mission and from its strategy of balancing support across the key investment areas necessary for success. All these investment areas must be sustained for ASC to adequately support current stockpile stewardship mission needs and to meet ever more difficult challenges as the weapons continue to age or undergo refurbishment. The appropriations bill called for this report to address three specific issues, which are responded to briefly here but are expanded upon in the subsequent document: (1) Identify how computing capability at each of the labs will specifically contribute to stockpile stewardship goals, and on what basis computing time will be allocated to achieve the goal of a balanced program among the labs. (2) Explain the NNSA's acquisition strategy for capacity and capability of machines at each of the labs and how it will fit within the existing budget constraints. (3

  17. The U.S./IAEA Workshop on Software Sustainability for Safeguards Instrumentation: Report to the NNSA DOE Office of International Nuclear Safeguards (NA-241)

    Energy Technology Data Exchange (ETDEWEB)

    Pepper, Susan E. [Brookhaven National Lab. (BNL), Upton, NY (United States); Pickett, Chris A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Queirolo, Al [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine M. [Brookhaven National Lab. (BNL), Upton, NY (United States); Worrall, Louise G. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-04-07

    The U.S Department of Energy (DOE) National Nuclear Security Administration (NNSA) Next Generation Safeguards Initiative (NGSI) and the International Atomic Energy Agency (IAEA) convened a workshop on Software Sustainability for Safeguards Instrumentation in Vienna, Austria, May 6-8, 2014. Safeguards instrumentation software must be sustained in a changing environment to ensure existing instruments can continue to perform as designed, with improved security. The approaches to the development and maintenance of instrument software used in the past may not be the best model for the future and, therefore, the organizers’ goal was to investigate these past approaches and to determine an optimal path forward. The purpose of this report is to provide input for the DOE NNSA Office of International Nuclear Safeguards (NA-241) and other stakeholders that can be utilized when making decisions related to the development and maintenance of software used in the implementation of international nuclear safeguards. For example, this guidance can be used when determining whether to fund the development, upgrade, or replacement of a particular software product. The report identifies the challenges related to sustaining software, and makes recommendations for addressing these challenges, supported by summaries and detailed notes from the workshop discussions. In addition the authors provide a set of recommendations for institutionalizing software sustainability practices in the safeguards community. The term “software sustainability” was defined for this workshop as ensuring that safeguards instrument software and algorithm functionality can be maintained efficiently throughout the instrument lifecycle, without interruption and providing the ability to continue to improve that software as needs arise.

  18. The U.S./IAEA Workshop on Software Sustainability for Safeguards Instrumentation: Report to the NNSA DOE Office of International Nuclear Safeguards (NA-241)

    International Nuclear Information System (INIS)

    Pepper, Susan E.; Pickett, Chris A.; Queirolo, Al; Bachner, Katherine M.; Worrall, Louise G.

    2015-01-01

    The U.S Department of Energy (DOE) National Nuclear Security Administration (NNSA) Next Generation Safeguards Initiative (NGSI) and the International Atomic Energy Agency (IAEA) convened a workshop on Software Sustainability for Safeguards Instrumentation in Vienna, Austria, May 6-8, 2014. Safeguards instrumentation software must be sustained in a changing environment to ensure existing instruments can continue to perform as designed, with improved security. The approaches to the development and maintenance of instrument software used in the past may not be the best model for the future and, therefore, the organizers' goal was to investigate these past approaches and to determine an optimal path forward. The purpose of this report is to provide input for the DOE NNSA Office of International Nuclear Safeguards (NA-241) and other stakeholders that can be utilized when making decisions related to the development and maintenance of software used in the implementation of international nuclear safeguards. For example, this guidance can be used when determining whether to fund the development, upgrade, or replacement of a particular software product. The report identifies the challenges related to sustaining software, and makes recommendations for addressing these challenges, supported by summaries and detailed notes from the workshop discussions. In addition the authors provide a set of recommendations for institutionalizing software sustainability practices in the safeguards community. The term ''software sustainability'' was defined for this workshop as ensuring that safeguards instrument software and algorithm functionality can be maintained efficiently throughout the instrument lifecycle, without interruption and providing the ability to continue to improve that software as needs arise.

  19. Student Experiential Opportunities in National Security Careers

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  20. ADMINISTRATIVE EXPENDITURES OF SOCIAL SECURITY FUNDS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Nataliia Ivanchuk

    2017-12-01

    Full Text Available Along with the expenditures for social protection, social security funds finance administrative direction, which should correspond to the amount of functions performed by a particular fund. The purpose of the paper is to determine ways to reduce administrative expenditures of state social security funds in the conditions of reforming Ukrainian economy. For this purpose, the authors investigate distribution of the expenditures between social security funds, analyse dynamics and structure of assignments for fund administration, and suggest possible ways to rationalize maintenance cost for these institutions. Methodology. Administrative expenditures are an integral part of the cost of social security funds and include particular items of expenses in the budget of these institutions. Applying a systematic approach to calculating the administrative costs of social security funds of Ukraine the authors have taken into account the expenditures related to funding management, support for information systems, and organization of work with insured people. Results of the survey showed that in 2007–2016 Pension Fund of Ukraine incurred the largest part of social expenditures (more than 90% compared with other social insurance funds (less than 10%. At the same time, the administrative expenses were divided approximately into two halves between Pension Fund and other social security funds. In 2015, the government launched a reform of social insurance funds that aimed to reduce funds to three institutions but a decrease in the total amount of administrative expenditures has not been achieved yet. In addition, Pension Fund of Ukraine was least burdened with administrative expenses, while other social security funds with a relatively small share of social expenditures were burdened with administrative expenditures much more. Practical implications. Research showed that nowadays the existence of several social security funds in Ukraine is economically

  1. Security Administrator Street Smarts A Real World Guide to CompTIA Security+ Skills

    CERN Document Server

    Miller, David R

    2011-01-01

    A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition o

  2. The NNSA global threat reduction initiative's efforts to minimize the use of highly enriched uranium for medical isotope production

    International Nuclear Information System (INIS)

    Staples, Parrish

    2010-01-01

    The mission of the National Nuclear Security Administration's (NNSA) Office of Global Threat Reduction (GTRI) is to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. GTRI is a key organization for supporting domestic and global efforts to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civilian nuclear applications. GTRI implements the following activities in order to achieve its threat reduction and HEU minimization objectives: Converting domestic and international civilian research reactors and isotope production facilities from the use of HEU to low enriched uranium (LEU); Demonstrating the viability of medical isotope production technologies that do not use HEU; Removing or disposing excess nuclear and radiological materials from civilian sites worldwide; and Protecting high-priority nuclear and radiological materials worldwide from theft and sabotage. This paper provides a brief overview on the recent developments and priorities for GTRI program activities in 2010, with a particular focus on GTRI's efforts to demonstrate the viability of non-HEU based medical isotope production technologies. (author)

  3. Underground Test Area Activity Communication/Interface Plan, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix

  4. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  5. Integrating Safeguards and Security with Safety into Design

    International Nuclear Information System (INIS)

    Bean, Robert S.; Hockert, John W.; Hebditch, David J.

    2009-01-01

    There is a need to minimize security risks, proliferation hazards, and safety risks in the design of new nuclear facilities in a global environment of nuclear power expansion, while improving the synergy of major design features and raising operational efficiency. In 2008, the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) launched the Next Generation Safeguards Initiative (NGSI) covering many safeguards areas. One of these, launched by NNSA with support of the DOE Office of Nuclear Energy, was a multi-laboratory project, led by the Idaho National Laboratory (INL), to develop safeguards by design. The proposed Safeguards-by-Design (SBD) process has been developed as a structured approach to ensure the timely, efficient, and cost effective integration of international safeguards and other nonproliferation barriers with national material control and accountability, physical security, and safety objectives into the overall design process for the nuclear facility lifecycle. A graded, iterative process was developed to integrate these areas throughout the project phases. It identified activities, deliverables, interfaces, and hold points covering both domestic regulatory requirements and international safeguards using the DOE regulatory environment as exemplar to provide a framework and guidance for project management and integration of safety with security during design. Further work, reported in this paper, created a generalized SBD process which could also be employed within the licensed nuclear industry and internationally for design of new facilities. Several tools for integrating safeguards, safety, and security into design are discussed here. SBD appears complementary to the EFCOG TROSSI process for security and safety integration created in 2006, which focuses on standardized upgrades to enable existing DOE facilities to meet a more severe design basis threat. A collaborative approach is suggested.

  6. 20 Years of Success: Science, Technology, and the Nuclear Weapons Stockpile

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2015-10-22

    On Oct. 22, 2015, NNSA celebrated the proven success of the Stockpile Stewardship Program at a half-day public event featuring remarks by Secretary of Energy Ernest Moniz, Secretary of State John Kerry, and Under Secretary for Nuclear Security and NNSA Administrator Lt. Gen. (retired) Frank G. Klotz. The event also featured remarks by Deputy Secretary of Energy Elizabeth Sherwood-Randall and NNSA Principal Deputy Administrator Madelyn Creedon.

  7. 77 FR 4887 - DOE Patent Licensing Regulations

    Science.gov (United States)

    2012-02-01

    ... administered by the National Nuclear Security Administration (NNSA) for NNSA facilities. The NNSA Deputy... issue a Family Policymaking Assessment for any rule or policy that may affect family well being. This rule will have no impact on family, the autonomy or integrity of the family as an institution...

  8. 29 CFR 70.54 - Employee Benefits Security Administration.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Employee Benefits Security Administration. 70.54 Section 70... Records and Filings § 70.54 Employee Benefits Security Administration. (a) The annual financial reports (Form 5500) and attachments/schedules as filed by employee benefit plans under the Employee Retirement...

  9. Social Security Administration Data for Enumeration Accuracy

    Data.gov (United States)

    Social Security Administration — This dataset provides data at the national level from federal fiscal year 2006 onwards for the accuracy of the assignment of Social Security numbers (SSN) based on...

  10. Annual Waste Minimization Summary Report

    International Nuclear Information System (INIS)

    Haworth, D.M.

    2011-01-01

    This report summarizes the waste minimization efforts undertaken by National Security TechnoIogies, LLC, for the U. S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during calendar year 2010. The NNSA/NSO Pollution Prevention Program establishes a process to reduce the volume and toxicity of waste generated by NNSA/NSO activities and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment.

  11. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  12. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    International Nuclear Information System (INIS)

    Sinars, Daniel; Scott, Kimberly Carole; Edwards, M. John; Olson, Russell Teall

    2016-01-01

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  13. 75 FR 65511 - Employee Benefits Security Administration; Submission for OMB Review

    Science.gov (United States)

    2010-10-25

    ... DEPARTMENT OF LABOR Office of the Secretary Employee Benefits Security Administration; Submission...--Employee Benefits Security Administration (EBSA), Office of Management and Budget, Room 10235, Washington...: Employee Benefits Security Administration. Type of Review: Extension without change of a currently approved...

  14. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  15. Economic Analysis of National Nuclear Security Administration (NNSA) Modernization Alternatives

    Science.gov (United States)

    2007-11-01

    S. Helwig Rob Mahoney Joshua A. Minix David J. Nicholls Paul H. Richanbach Robert W. Thomas Laura M. Williams Approved for public release...Helwig Rob Mahoney Joshua A. Minix David J. Nicholls Paul H. Richanbach Robert W. Thomas Laura M. Williams iii PREFACE The Institute for Defense

  16. Nevada National Security Site Environmental Report 2010

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  17. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    Science.gov (United States)

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  18. Analysis of Alternatives (AoA) of Open Colllaboration and Research Capabilities Collaboratipon in Research and Engineering in Advanced Technology and Education and High-Performance Computing Innovation Center (HPCIC) on the LVOC.

    Energy Technology Data Exchange (ETDEWEB)

    Vrieling, P. Douglas [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2016-01-01

    The Livermore Valley Open Campus (LVOC), a joint initiative of the National Nuclear Security Administration (NNSA), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL), enhances the national security missions of NNSA by promoting greater collaboration between world-class scientists at the national security laboratories, and their partners in industry and academia. Strengthening the science, technology, and engineering (ST&E) base of our nation is one of the NNSA’s top goals. By conducting coordinated and collaborative programs, LVOC enhances both the NNSA and the broader national science and technology base, and helps to ensure the health of core capabilities at LLNL and SNL. These capabilities must remain strong to enable the laboratories to execute their primary mission for NNSA.

  19. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  20. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site

    Energy Technology Data Exchange (ETDEWEB)

    Scott A. Wade (NFO); Kathryn S. Knapp (NFO); Cathy A. Wills (NSTec)

    2013-02-24

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950s to the early 1990s. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistant Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second

  1. Nevada National Security Site Environmental Report 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills (editor), Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple

  2. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site - 13058

    International Nuclear Information System (INIS)

    Wade, Scott A.; Knapp, Kathryn S.; Wills, Cathy A.

    2013-01-01

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950's to the early 1990's. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistant Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second

  3. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site - 13058

    Energy Technology Data Exchange (ETDEWEB)

    Wade, Scott A.; Knapp, Kathryn S. [U.S. Department of Energy National Nuclear Security Agency, Nevada Site Office, P.O. Box 98518, Las Vegas, NV 89193-8518 (United States); Wills, Cathy A. [National Nuclear Security Technologies, LLC, P.O. Box 98521, M/S 260, Las Vegas, NV 89193-8521 (United States)

    2013-07-01

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950's to the early 1990's. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistant Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second

  4. Underground Test Area (UGTA) Closure Report for Corrective Action Unit 98: Frenchman Flat Nevada National Security Site, Nevada, Revision 1 ROTC-1

    International Nuclear Information System (INIS)

    Farnham, Irene

    2016-01-01

    This Closure Report (CR) has been prepared for Corrective Action Unit (CAU) 98, Frenchman Flat, Nevada National Security Site (NNSS), Nevada. The Frenchman Flat CAU was the site of 10 underground nuclear tests, some of which have impacted groundwater near the tests. This work was performed as part of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity in accordance with the Federal Facility Agreement and Consent Order (FFACO). This CR describes the selected corrective action to be implemented during closure to protect human health and the environment from the impacted groundwater

  5. Underground Test Area (UGTA) Closure Report for Corrective Action Unit 98: Frenchman Flat Nevada National Security Site, Nevada, Revision 1 ROTC-1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2016-08-01

    This Closure Report (CR) has been prepared for Corrective Action Unit (CAU) 98, Frenchman Flat, Nevada National Security Site (NNSS), Nevada. The Frenchman Flat CAU was the site of 10 underground nuclear tests, some of which have impacted groundwater near the tests. This work was performed as part of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity in accordance with the Federal Facility Agreement and Consent Order (FFACO). This CR describes the selected corrective action to be implemented during closure to protect human health and the environment from the impacted groundwater

  6. 4th Quarter Transportation Report FY 2014: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    International Nuclear Information System (INIS)

    Gregory, Louis

    2014-01-01

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to and from the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. There was one shipment of two drums sent for offsite treatment and disposal. This report summarizes the 4th quarter of Fiscal Year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annual summaries for FY 2014.

  7. FY 2015 - Stockpile Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2014-04-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  8. FY 2016 - Stockpile Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-03-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  9. FY 2014 - Stockpile and Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-06-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  10. Underground Test Area Fiscal Year 2013 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2013. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2013. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. In addition, integrated UGTA required reading and corrective action tracking was instituted.

  11. The Y-12 National Security Complex Foreign Research Reactor Uranium Supply Production

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, T. [Nuclear Technology and Nonproliferation Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States); Keller, A.P. [Disposition and Supply Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States)

    2011-07-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the National Nuclear Security Administration (NNSA) HEU Disposition, the Reduced Enrichment Research and Test Reactors (RERTR), and the United States (U.S.) FRR Spent Nuclear Fuel (SNF) Acceptance Programs. The FRR Supply Program supports the important U.S. government nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to Low-Enriched Uranium (LEU) fuel under the RERTR Program. The NNSA Y-12 Site Office maintains the prime contracts with foreign government agencies for the supply of LEU for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. In addition to uranium metal feedstock for fuel fabrication, Y-12 can produce LEU in different forms to support new fuel development or target fabrication for medical isotope production. With production improvements and efficient delivery preparations, Y-12 continues to successfully support the global research reactor community. (author)

  12. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2012-10-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). NNSA/NSO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  13. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  14. Presentation at Innoventure Annual Competition

    Energy Technology Data Exchange (ETDEWEB)

    None

    2010-03-31

    This report documents the components of the workshop presented at the recent annual competition for the Innoventure program. The goal of the workshop was to focus on the delivery of science, technology, engineering, and math (STEM) concepts in a hands-on experiential learning format to increase interest in national security careers at NNSA, most of which are in the STEM fields. This work is a part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant.

  15. Marketing Strategy and Implementation

    Energy Technology Data Exchange (ETDEWEB)

    None

    2010-05-31

    This report documents the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. This marketing campaign builds on the research that was previously conducted, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) / National Nuclear Security Administration (NNSA) grant. Outcome analysis was performed to determine appropriate marketing strategies. The analysis was based upon focus groups with middle school and high school students, student interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of the marketing campaign.

  16. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  17. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  18. Security administration plan for HANDI 2000 business management system

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, D.

    1998-09-29

    This document encompasses and standardizes the integrated approach for security within the PP and Ps applications, It also identifies the security tools and methods to be used. The Security Administration Plan becomes effective as of this document`s acceptance and will provide guidance through implementation efforts and, as a ``living document`` will support the operations and maintenance of the system.

  19. Underground Test Area Fiscal Year 2012 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2013-01-01

    This report is mandated by the Underground Test Area (UGTA) Quality Assurance Project Plan (QAPP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2012. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2012. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, revising the QAPP, and publishing documents. In addition, processes and procedures were developed to address deficiencies identified in the FY 2011 QAPP gap analysis.

  20. 78 FR 6168 - Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract...

    Science.gov (United States)

    2013-01-29

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0001] Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2012 Service Contract Inventories. SUMMARY: In accordance with...

  1. 77 FR 3836 - Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract...

    Science.gov (United States)

    2012-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0105] Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2011 Service Contract Inventories. SUMMARY: In accordance with...

  2. Nevada Test Site Environmental Report 2008

    Energy Technology Data Exchange (ETDEWEB)

    Cathy A. Wills

    2009-09-01

    The Nevada Test Site Environmental Report (NTSER) 2008 was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years’ NTSERs are posted on the NNSA/NSO website at http://www.nv.doe.gov/library/publications/aser.aspx.

  3. Nevada Test Site Environmental Report 2008 Summary

    Energy Technology Data Exchange (ETDEWEB)

    Cathy A. Wills

    2009-09-01

    The Nevada Test Site Environmental Report (NTSER) 2008 was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years’ NTSERs are posted on the NNSA/NSO website at http://www.nv.doe.gov/library/publications/aser.aspx.

  4. Social Security Administration Retirement, Survivors, and Disability Insurance (RSDI) Improper Payments

    Data.gov (United States)

    Social Security Administration — This dataset shows improper payment experience for the Social Security Retirement, Survivors, and Disability Insurance program paid to workers, their dependents, and...

  5. Information systems security policies: a survey in Portuguese public administration

    OpenAIRE

    Lopes, Isabel Maria; Sá-Soares, Filipe de

    2010-01-01

    Information Systems Security is a relevant factor for present organizations. Among the security measures, policies assume a central role in literature. However, there is a reduced number of empirical studies about the adoption of information systems security policies. This paper contributes to mitigate this flaw by presenting the results of a survey in the adoption of Information System Security Policies in Local Public Administration in Portugal. The results are discussed in light of literat...

  6. NNSA / IAEA VVER reactor safety workshops. May 2002 - April 2003. Executive summary

    International Nuclear Information System (INIS)

    Evans, M.; Petri, M. C.

    2003-01-01

    Over the past year, the U.S. National Nuclear Security Administration (NNSA) has sponsored four workshops to compare the probabilistic risk assessments (PRAs) of Soviet-designed VVER power plants. The ''International Workshop on Safety of First-Generation VVER-440 Nuclear Power Plants'' was held on May 20-25, 2002, in Piestany, Slovakia. A short follow-on workshop was held in Bratislava, Slovakia, on November 5-6, 2002, to complete the work begun in May. Piestany was the location also for the ''International Workshop on Safety of Second-Generation VVER-440 Nuclear Power Plants'' (September 9-14, 2002) and the ''International Workshop on Safety of VVER-1000 Nuclear Power Plants'' (April 7-12, 2003). The four workshops were held in cooperation with the International Atomic Energy Agency (IAEA), the Nuclear Regulatory Authority of Slovakia (UJD), the Center for Nuclear Safety in Central and Eastern Europe (CENS), and Argonne National Laboratory (ANL). The objectives of the workshops were to identify the impact of the improvements on the core damage frequency; the contribution to the PRA results of different assumptions about events that can occur at the plants; and to understand, identify, and prioritize potential improvements in hardware and plant operation of VVER nuclear power plants. These objectives were achieved based on insights gained from recent PRAs completed by the plants and their technical support organizations. Nine first-generation VVER-440 plants (nominally of the VVER-440/230 design) are currently operating in Armenia, Bulgaria, Russia, and Slovakia. Sixteen VVER-440/213 plants are currently operating in the Czech Republic, Hungary, Russia, Slovakia, and Ukraine. Twenty-three VVER-1000 plants are currently operating in Bulgaria, the Czech Republic, Russia, and Ukraine. Eleven addition plants are in the advanced stages of construction in various parts of the world. The workshops reviewed the current configuration and safety status of each plant

  7. 2015 Stewardship Science Academic Programs Annual

    Energy Technology Data Exchange (ETDEWEB)

    Stone, Terri [NNSA Office of Research, Development, Test, and Evaluation, Washington, DC (United States); Mischo, Millicent [NNSA Office of Research, Development, Test, and Evaluation, Washington, DC (United States)

    2015-02-01

    The Stockpile Stewardship Academic Programs (SSAP) are essential to maintaining a pipeline of professionals to support the technical capabilities that reside at the National Nuclear Security Administration (NNSA) national laboratories, sites, and plants. Since 1992, the United States has observed the moratorium on nuclear testing while significantly decreasing the nuclear arsenal. To accomplish this without nuclear testing, NNSA and its laboratories developed a science-based Stockpile Stewardship Program to maintain and enhance the experimental and computational tools required to ensure the continued safety, security, and reliability of the stockpile. NNSA launched its academic program portfolio more than a decade ago to engage students skilled in specific technical areas of relevance to stockpile stewardship. The success of this program is reflected by the large number of SSAP students choosing to begin their careers at NNSA national laboratories.

  8. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2015-06-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1D, Change 1, Quality Assurance (DOE, 2013a); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). If a participant’s requirement document differs from this QAP, the stricter requirement will take precedence. NNSA/NFO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  9. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    International Nuclear Information System (INIS)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-01-01

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  10. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security, administrative data standards, and national identifiers. (a) HIPAA covered entities. An endorsed sponsor is a...

  11. PRIDE Surveillance Projects Data Packaging Project Information Package Specification Version 1.1

    Energy Technology Data Exchange (ETDEWEB)

    Kelleher, D. M.; Shipp, R. L.; Mason, J. D.

    2010-08-31

    Information Package Specification version 1.1 describes an XML document format called an information package that can be used to store information in information management systems and other information archives. An information package consists of package information, the context required to understand and use that information, package metadata that describes the information, and XML signatures that protect the information. The information package described in this specification was designed to store Department of Energy (DOE) and National Nuclear Security Administration (NNSA) information and includes the metadata required for that information: a unique package identifier, information marking that conforms to DOE and NNSA requirements, and access control metadata. It is an implementation of the Open Archival Information System (OAIS) Reference Model archival information package tailored to meet NNSA information storage requirements and designed to be used in the computing environments at the Y-12 National Security Complex and at other NNSA sites.

  12. 20 CFR 423.1 - Suits against the Social Security Administration and its employees in their official capacities.

    Science.gov (United States)

    2010-04-01

    ... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...

  13. Closure Report for Corrective Action Unit 574: Neptune, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    2012-01-01

    Corrective Action Unit (CAU) 574 is identified in the Federal Facility Agreement and Consent Order (FFACO) as 'Neptune' and consists of the following two Corrective Action Sites (CASs), located in Area 12 of the Nevada National Security Site: (1) CAS 12-23-10, U12c.03 Crater (Neptune); and (2) CAS 12-45-01, U12e.05 Crater (Blanca). This Closure Report presents information supporting closure of CAU 574 according to the FFACO (FFACO, 1996 [as amended March 2010]) and the Streamlined Approach for Environmental Restoration Plan for CAU 574 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The following activities were performed to support closure of CAU 574: (1) In situ external dose rate measurements were collected using thermoluminescent dosimeters at CAS 12-45-01, U12e.05 Crater (Blanca). (2) Total effective dose rates were determined at both sites by summing the internal and external dose rate components. (3) A use restriction (UR) was implemented at CAS 12-23-10, U12c.03 Crater (Neptune). Areas that exceed the final action level (FAL) of 25 millirems per year (mrem/yr) based on the Occasional Use Area exposure scenario are within the existing use restricted area for CAU 551. The 25-mrem/yr FAL is not exceeded outside the existing CAU 551 UR for any of the exposure scenarios (Industrial Area, Remote Work Area, and Occasional Use Area). Therefore, the existing UR for CAU 551 is sufficient to bound contamination that exceeds the FAL. (4) An administrative UR was implemented at CAS 12-45-01, U12e.05 Crater (Blanca) as a best management practice (BMP). The 25-mrem/yr FAL was not exceeded for the Remote Work Area or Occasional Use Area exposure scenarios; therefore, a UR is not required. However, because the 25-mrem/yr FAL was exceeded for the Industrial Area exposure scenario, an administrative UR was established as a BMP. UR documentation is included as Appendix B. The UR at CAS 12-23-10, U12c.03 Crater (Neptune

  14. Nonproliferation Graduate Fellowship Program Annual Report: Class of 2011

    Energy Technology Data Exchange (ETDEWEB)

    McMakin, Andrea H.

    2012-08-20

    Annual report for the Nonproliferation Graduate Fellowship Program (NGFP), which PNNL administers for the National Nuclear Security Administration (NNSA). Features the Class of 2011. The NGFP is a NNSA program with a mission to cultivate future technical and policy leaders in nonproliferation and international security. Through the NGFP, outstanding graduate students with career interests in nonproliferation are appointed to program offices within the Office of Defense Nuclear Nonproliferation (DNN). During their one-year assignment, Fellows participate in programs designed to detect, prevent, and reverse the proliferation of nuclear weapons.

  15. Status of Educational Efforts in National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  16. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  17. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  18. A Platform for RFID Security and Privacy Administration

    NARCIS (Netherlands)

    Rieback, M.R.; Gaydadjiev, G.N.; Crispo, B.; Hofman, R.F.H.; Tanenbaum, A.S.

    2006-01-01

    This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ``RFID firewall,'' that monitors and controls access to RFID tags by combining a standard-issue RFID

  19. Closure Report for Corrective Action Unit 562: Waste Systems, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2012-08-15

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 562, Waste Systems, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 562 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 562 consists of the following 13 Corrective Action Sites (CASs), located in Areas 2, 23, and 25 of the Nevada National Security Site: · CAS 02-26-11, Lead Shot · CAS 02-44-02, Paint Spills and French Drain · CAS 02-59-01, Septic System · CAS 02-60-01, Concrete Drain · CAS 02-60-02, French Drain · CAS 02-60-03, Steam Cleaning Drain · CAS 02-60-04, French Drain · CAS 02-60-05, French Drain · CAS 02-60-06, French Drain · CAS 02-60-07, French Drain · CAS 23-60-01, Mud Trap Drain and Outfall · CAS 23-99-06, Grease Trap · CAS 25-60-04, Building 3123 Outfalls Closure activities began in October 2011 and were completed in April 2012. Activities were conducted according to the Corrective Action Plan for CAU 562 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The corrective actions included No Further Action and Clean Closure. Closure activities generated sanitary waste and hazardous waste. Some wastes exceeded land disposal limits and required offsite treatment prior to disposal. Other wastes met land disposal restrictions and were disposed in appropriate onsite or offsite landfills. NNSA/NSO requests the following: · A Notice of Completion from the Nevada Division of Environmental Protection to NNSA/NSO for closure of CAU 562 · The transfer of CAU 562 from Appendix III to Appendix IV, Closed Corrective Action Units, of the FFACO

  20. 75 FR 64389 - Proposed Recommendation to the Social Security Administration for Occupational Information System...

    Science.gov (United States)

    2010-10-19

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0066] Proposed Recommendation to the Social Security Administration for Occupational Information System (OIS) Development Planning; Request for Comment...) to provide independent advice and recommendations on plans and activities to create an occupational...

  1. Foreign research reactor uranium supply program: The Y-12 national security complex process

    International Nuclear Information System (INIS)

    Nelson, T.; Eddy, B.G.

    2010-01-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the HEU Disposition Program, the Reduced Enrichment Research and Test Reactors (RERTR) Program, and the United States FRR Spent Nuclear Fuel (SNF) Acceptance Program. The Y-12 National Nuclear Security Administration (NNSA) Y-12 Site Office maintains the prime contracts with foreign governments for the supply of Low-Enriched Uranium (LEU) for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. This program supports the important U.S. government and nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to LEU fuel under the guidance of the NNSA RERTR Program. In conjunction with the FRR SNF Acceptance Program which supports the global nonproliferation efforts to disposition U.S.-origin HEU, the Y-12 FRR Uranium Supply Program can provide the LEU for the replacement fuel fabrication. In addition to feedstock for fuel fabrication, Y-12 supplies LEU for target fabrication for medical isotope production. The Y-12 process uses supply forecasting tools, production improvements and efficient delivery preparations to successfully support the global research reactor community

  2. Nuclear Materials Management for the Nevada Test Site (NTS)

    International Nuclear Information System (INIS)

    Jesse C. Schreiber

    2007-01-01

    The Nevada Test Site (NTS) has transitioned from its historical role of weapons testing to a broader role that is focused on being a solution to multiple National Nuclear Security Administration (NNSA) challenges and opportunities with nuclear materials for the nation. NTS is supporting other NNSA sites challenged with safe nuclear materials storage and disposition. NNSA, with site involvement, is currently transforming the nuclear stockpile and supporting infrastructure to meet the 2030 vision. Efforts are under way to make the production complex smaller, more consolidated, and more modern. With respect to the nuclear material stockpile, the NNSA sites are currently reducing the complex nuclear material inventory through dispositioning and consolidating nuclear material. This includes moving material from other sites to NTS. State-of-the-art nuclear material management and control practices at NTS are essential for NTS to ensure that these new activities are accomplished in a safe, secure, efficient, and environmentally responsible manner. NTS is aggressively addressing this challenge

  3. 10 CFR 600.302 - Definitions.

    Science.gov (United States)

    2010-01-01

    ... Small Business Administration. The criteria and size standards for small business concerns are contained... accordance with the applicable Federal cost principles or other terms and conditions contained in the award. DOE means the Department of Energy, including the National Nuclear Security Administration (NNSA...

  4. Nevada National Security Site Environmental Report Summary 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities and

  5. Oak Ridge National Laboratory Next-Generation Safeguards Initiative: Human Capital Development

    Energy Technology Data Exchange (ETDEWEB)

    Gilligan, Kimberly [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2014-01-01

    In 2007, the US Department of Energy National Nuclear Security Administration (DOE/NNSA) Office of Nonproliferation and International Security (NA-24) completed a comprehensive review of the current and potential future challenges facing the international safeguards system. The review examined: trends and events that have an effect on the mission of international safeguards; the implications of expanding and evolving mission requirements of the legal authorities and institutions that serve as the foundation of the international safeguards system; and, the technological, financial, and human resources required for effective safeguards implementation. The review’s findings and recommendations were summarized in the report International Safeguards: Challenges and Opportunities for the 21st Century (October 2007). The executive summary is available at the following link: http://nnsa.energy.gov/sites/default/files/nnsa/inlinefiles/NGSI_Report.pdf.

  6. Software Quality Assurance Plan for GoldSim Models Supporting the Area 3 and Area 5 Radioactive Waste Management Site Performance Assessment Program

    International Nuclear Information System (INIS)

    Gregory J. Shott, Vefa Yucel

    2007-01-01

    This Software Quality Assurance Plan (SQAP) applies to the development and maintenance of GoldSim models supporting the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) performance assessments (PAs) and composite analyses (CAs). Two PA models have been approved by the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) as of November 2006 for the PA maintenance work undertaken by National Security Technologies, LLC (NSTec). NNSA/NSO asked NSTec to assume the custodianship of the models for future development and maintenance. The models were initially developed by Neptune and Company (N and C)

  7. Software Quality Assurance Plan for GoldSim Models Supporting the Area 3 and Area 5 Radioactive Waste Management Sites Performance Assessment Program

    Energy Technology Data Exchange (ETDEWEB)

    Gregory J. Shott, Vefa Yucel

    2007-01-03

    This Software Quality Assurance Plan (SQAP) applies to the development and maintenance of GoldSim models supporting the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) performance assessments (PAs) and composite analyses (CAs). Two PA models have been approved by the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) as of November 2006 for the PA maintenance work undertaken by National Security Technologies, LLC (NSTec). NNSA/NSO asked NSTec to assume the custodianship of the models for future development and maintenance. The models were initially developed by Neptune and Company (N&C).

  8. Applications of Nuclear Science for Stewardship Science

    International Nuclear Information System (INIS)

    Cizewski, Jolie A

    2013-01-01

    Stewardship science is research important to national security interests that include stockpile stewardship science, homeland security, nuclear forensics, and non-proliferation. To help address challenges in stewardship science and workforce development, the Stewardship Science Academic Alliances (SSAA) was inaugurated ten years ago by the National Nuclear Security Administration of the U. S. Department of Energy. The goal was to enhance connections between NNSA laboratories and the activities of university scientists and their students in research areas important to NNSA, including low-energy nuclear science. This paper presents an overview of recent research in low-energy nuclear science supported by the Stewardship Science Academic Alliances and the applications of this research to stewardship science.

  9. 77 FR 74382 - Acquisition Regulation: Department of Energy Acquisition Regulation, Government Property

    Science.gov (United States)

    2012-12-14

    ... lithium is available from The National Nuclear Security Administration (NNSA), Y- 12 National Security..., 1999 (Pub. L. 105-277), requires Federal agencies to issue a Family Policymaking Assessment for any rulemaking or policy that may affect family well-being. This rule will have no impact on family well- being...

  10. Closure Report for Corrective Action Unit 547: Miscellaneous Contaminated Waste Sites, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2012-07-17

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 547, Miscellaneous Contaminated Waste Sites, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 547 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 547 consists of the following three Corrective Action Sites (CASs), located in Areas 2, 3, and 9 of the Nevada National Security Site: (1) CAS 02-37-02, Gas Sampling Assembly; (2) CAS 03-99-19, Gas Sampling Assembly; AND (3) CAS 09-99-06, Gas Sampling Assembly Closure activities began in August 2011 and were completed in June 2012. Activities were conducted according to the Corrective Action Decision Document/Corrective Action Plan (CADD/CAP) for CAU 547 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The recommended corrective action for the three CASs in CAU 547 was closure in place with administrative controls. The following closure activities were performed: (1) Open holes were filled with concrete; (2) Steel casings were placed over vertical expansion joints and filled with cement; (3) Engineered soil covers were constructed over piping and exposed sections of the gas sampling system components; (4) Fencing, monuments, Jersey barriers, radiological postings, and use restriction (UR) warning signs were installed around the perimeters of the sites; (5) Housekeeping debris was picked up from around the sites and disposed; and (6) Radiological surveys were performed to confirm final radiological postings. UR documentation is included in Appendix D. The post-closure plan was presented in detail in the CADD/CAP for CAU 547 and is included as

  11. Closure Report for Corrective Action Unit 547: Miscellaneous Contaminated Waste Sites, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    2012-01-01

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 547, Miscellaneous Contaminated Waste Sites, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 547 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 547 consists of the following three Corrective Action Sites (CASs), located in Areas 2, 3, and 9 of the Nevada National Security Site: (1) CAS 02-37-02, Gas Sampling Assembly; (2) CAS 03-99-19, Gas Sampling Assembly; AND (3) CAS 09-99-06, Gas Sampling Assembly Closure activities began in August 2011 and were completed in June 2012. Activities were conducted according to the Corrective Action Decision Document/Corrective Action Plan (CADD/CAP) for CAU 547 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The recommended corrective action for the three CASs in CAU 547 was closure in place with administrative controls. The following closure activities were performed: (1) Open holes were filled with concrete; (2) Steel casings were placed over vertical expansion joints and filled with cement; (3) Engineered soil covers were constructed over piping and exposed sections of the gas sampling system components; (4) Fencing, monuments, Jersey barriers, radiological postings, and use restriction (UR) warning signs were installed around the perimeters of the sites; (5) Housekeeping debris was picked up from around the sites and disposed; and (6) Radiological surveys were performed to confirm final radiological postings. UR documentation is included in Appendix D. The post-closure plan was presented in detail in the CADD/CAP for CAU 547 and is included as

  12. Nevada National Security Site Radiological Control Manual

    International Nuclear Information System (INIS)

    2012-01-01

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  13. Nevada National Security Site Radiological Control Manual

    Energy Technology Data Exchange (ETDEWEB)

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  14. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 Public Law (Pub. L.) 100-503...

  15. Good practices in provision of nuclear safeguards and security training courses at the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security

    Directory of Open Access Journals (Sweden)

    Kobayashi Naoki

    2017-01-01

    Full Text Available More than five years have passed since the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN was established under the Japan Atomic Energy Agency (JAEA in December 2010 and started its activities, in response to the commitment of Japan at the Nuclear Security Summit in Washington D.C.. The ISCN has been vigorously involved in capacity building assistance on nuclear nonproliferation (safeguards and nuclear security, mainly in the Asian region. It has provided 105 training courses to 2901 participants in total as of August 2016. The ISCN plays a major role in strengthening nuclear nonproliferation and nuclear security in the region, and this can be considered one of the great results of the Nuclear Security Summit process. The ISCN has cooperated with the US Department of Energy/National Nuclear Security Administration (DOE/NNSA and Sandia National Laboratories (SNL to establish a base of instructors, particularly for the Center's flagship two-week courses, the Regional Training Course on Physical Protection of Nuclear Material and Facilities (RTC on PP and the Regional Training Course on State Systems of Accounting for and Control of Nuclear Material (RTC on SSAC. Furthermore, the ISCN has provided training courses for experts in Japan, making the best use of the Center's knowledge and experience of organizing international courses. The ISCN has also started joint synchronized training with the Joint Research Centre of the European Commission (EC JRC on nuclear safeguards. This paper describes the good practices at the ISCN through its five years of activities, focusing on its progress in nuclear safeguards and nuclear security training.

  16. Quality New Mexico Performance Excellence Award Roadrunner Application 2016

    Energy Technology Data Exchange (ETDEWEB)

    Petru, Ernest Frank [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-07-06

    The Human Resources (HR) Division is a critical part of Los Alamos National Laboratory, an internationally recognized science and R&D facility with a specialized workforce of more than 10,000. The Laboratory’s mission is to solve national security challenges through scientific excellence. The HR Division partners with employees and managers to support the Laboratory in hiring, retaining, and motivating an exceptional workforce. The Laboratory is owned by the U.S. Department of Energy (DOE), with oversight by the DOE’s National Nuclear Security Administration (NNSA). In 2006, NNSA awarded the contract for managing and operating the Laboratory to Los Alamos National Security, LLC (LANS), and a for-profit consortium. This report expounds on performance excellence efforts, presenting a strategic plan and operations.

  17. Marketing Strategy and Implementation

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2010-09-30

    This report documents the preparation of materials for the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. The materials and the marketing campaign build on the research that was previously completed, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP). Previous research included outcome analysis to determine appropriate marketing strategies. The analysis was based upon focus groups with middle school and high school students, student interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of a marketing campaign divided into DISCO (Discovering Intelligence and Security Career Opportunities) for the middle school age group and DISCO…..Your Way! for high school age groups. Both campaigns have an intertwined message that focuses on the education of students in the various national security career opportunities at NNSA using the STEM concepts and the notion that almost any career they can think of has a fit within NNSA. Further, a special emphasis has been placed on the importance of obtaining a national security clearance when working at NNSA and the steps that will need to be taken during middle school, high school, and college to be allowed this opportunity.

  18. Closure Report for Corrective Action Unit 573: Alpha Contaminated Sites Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro, Las Vegas, NV (United States)

    2017-03-01

    This Closure Report (CR) presents information supporting the closure of Corrective Action Unit (CAU) 573: Alpha Contaminated Sites, Nevada National Security Site, Nevada. CAU 573 comprises the two corrective action sites (CASs): 05-23-02-GMX Alpha Contaminated Are-Closure in Place and 05-45-01-Atmospheric Test Site - Hamilton- Clean Closure. The purpose of this CR is to provide justification and documentation supporting the recommendation that no further corrective action is needed for CAU 573 based on the implementation of the corrective actions. Corrective action activities were performed at Hamilton from May 25 through June 30, 2016; and at GMX from May 25 to October 27, 2016, as set forth in the Corrective Action Decision Document (CADD)/Corrective Action Plan (CAP) for Corrective Action Unit 573: Alpha Contaminated Sites; and in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices. Verification sample results were evaluated against data quality objective criteria developed by stakeholders that included representatives from the Nevada Division of Environmental Protection and the DOE, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) during the corrective action alternative (CAA) meeting held on November 24, 2015. Radiological doses exceeding the final action level were assumed to be present within the high contamination areas associated with CAS 05-23-02, thus requiring corrective action. It was also assumed that radionuclides were present at levels that require corrective action within the soil/debris pile associated with CAS 05-45-01. During the CAU 573 CAA meeting, the CAA of closure in place with a use restriction (UR) was selected by the stakeholders as the preferred corrective action of the high contamination areas at CAS 05-23-02 (GMX), which contain high levels of removable contamination; and the CAA of clean closure was selected by the

  19. Sandia National Laboratories: Physical, Chemical, and Nano Sciences

    Science.gov (United States)

    Involvement Contribution Programs Volunteer Programs Education Programs Environmental Responsibility Involvement News News Releases Media Contacts & Resources Lab News Image Gallery Publications Annual for the mission needs of our parent agency, the National Nuclear Security Administration (NNSA), with

  20. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0090] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  1. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0016] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  2. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Gitau, Ernest T.N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burbank, Roberta L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Finch, Valerie A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-07-31

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old), identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.

  3. Social Security Administration

    Science.gov (United States)

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  4. Business Administration and Computer Science Degrees: Earnings, Job Security, and Job Satisfaction

    Science.gov (United States)

    Mehta, Kamlesh; Uhlig, Ronald

    2017-01-01

    This paper examines the potential of business administration vs. computer science degrees in terms of earnings, job security, and job satisfaction. The paper focuses on earnings potential five years and ten years after the completion of business administration and computer science degrees. Moreover, the paper presents the income changes with…

  5. The Competence Promoting by NNSA for Keeping High Level Nuclear Safety: The Corner Stone of the Nuclear Safety Regulation Edifice

    International Nuclear Information System (INIS)

    Hu, L.

    2016-01-01

    Facing the fast development of the nuclear power industry and the application of radioactive sources, The MEP(NNSA) is endeavoured to promoting its competency, including: complementing the law system, training and recruiting staff to keep a capable team, constructing the R&D base to keep the basic capability, promoting safety culture both for the industry and the regulator. After the Fukushima nuclear accident, the MEP(NNSA) planned to construct R&D base, in which the Platform Nuclear Safety Monitoring and Emergency Responding, the Platform of Safety Technology of PWR Testing, the Laboratory of Safety Management Technology of Nuclear Waste Verification, the Laboratory of Environmental Radiation Monitoring and the Center of International Cooperation are included. On the other hand, the MEP(NNSA) issued Chinese nuclear safety culture policy declaration in 2014, and carried out a large scale Specialized Action for Nuclear Safety Promotion to promote the nuclear safety culture both for the industry and herself. For the nuclear regulator, It is essential to conduct the competence promoting by both “hardware” and “software”, the former is the material foundation of regulation authority, which will be effectively functioning under the facilitating of the latter. (author)

  6. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  7. Exploring the Application of Shared Ledger Technology to Safeguards and other National Security Topics

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.; Joslyn, Cliff A.; West, Curtis L.; Schanfein, Mark J.; Sayre, Amanda M.

    2017-07-17

    In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLT to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.

  8. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  9. Measurement issues associated with using survey data matched with administrative data from the Social Security Administration.

    Science.gov (United States)

    Davies, Paul S; Fisher, T Lynn

    2009-01-01

    Researchers using survey data matched with administrative data benefit from the rich demographic and economic detail available from survey data combined with detailed programmatic data from administrative records. The research benefits of using these matched data are too numerous to mention. But there are drawbacks as well, and those drawbacks have received less systematic attention from researchers. We focus on survey data matched with administrative data from the Social Security Administration and address the strengths and weaknesses of each in four specific areas: (1) program participation and benefits, (2) disability and health information, (3) earnings, and (4) deferred compensation. We discuss the implications of these strengths and weaknesses for decisions that researchers must make regarding the appropriate data source and definition for the concepts in question. From this discussion, some general conclusions are drawn about measurement issues associated with using matched survey and administrative data for research, policy evaluation, and statistics.

  10. 10 CFR 712.1 - Purpose.

    Science.gov (United States)

    2010-01-01

    ... (HRP) in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA... the highest standards of reliability and physical and mental suitability. This objective is... judgment and reliability may be impaired by physical or mental/personality disorders, alcohol abuse, use of...

  11. Annual Waste Minimization Summary Report, Calendar Year 2008

    International Nuclear Information System (INIS)

    2009-01-01

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during calendar year 2008. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit (No. NEV HW0021), and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the U.S. Department of Energy, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume and toxicity of waste generated by NNSA/NSO activities and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO

  12. Annual Waste Minimization Summary Report, Calendar Year 2009

    International Nuclear Information System (INIS)

    2010-01-01

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC, for the U. S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during calendar year 2009. This report was developed in accordance with the requirements of the Nevada Test Site Resource Conservation and Recovery Act Permit (No. NEV HW0021), and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the U.S. Department of Energy, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume and toxicity of waste generated by NNSA/NSO activities and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by NNSA/NSO.

  13. Annual Waste Minimization Summary Report Calendar Year 2007

    International Nuclear Information System (INIS)

    NSTec Environmental Management

    2008-01-01

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during calendar year (CY) 2007. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit (number NEV HW0021), and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the U.S. Department of Energy, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume and toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO

  14. Social Security Administration - Quarterly Data for Spoken Language Preferences of Supplemental Security Income Blind and Disabled Applicants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for SSI Blind and Disabled benefits from fiscal...

  15. Security bingo for administrators

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Have you ever thought about the security of your service(s) or system(s)? Show us and win one of three marvellous books on computer security! Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us at Computer.Security@cern.ch or P.O. Box G19710, by November 14th 2011.   Winners[1] must show us that they follow at least five good practices in a continuous horizontal row, vertical column or diagonal. For details on CERN Computer Security, please consult http://cern.ch/security. My service or system…   …is following a software development life-cycle. …is patched in an automatic and timely fashion. …runs a tightened local ingress/egress firewall. …uses CERN Single-Sign-On (SSO). …has physical access protections in place. …runs all processes / services / applications with least privileges. …has ...

  16. The global threat reduction initiative's radiological security cooperation with Russia - 59361

    International Nuclear Information System (INIS)

    Blanchard, Tiffany A.; Abramson, William J.; Russell, James W. Jr.; Roberts, Catherine K.

    2012-01-01

    The United States (U.S.) Department of Energy (DOE) / National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) supports both U.S. and international threat reduction goals by securing vulnerable nuclear and radiological material located at civilian sites throughout the world. GTRI's approach to reducing the threat posed by vulnerable, high-activity radioactive sources includes removing and disposing of orphan or disused radioactive sources; implementing physical security upgrades at civilian sites containing radioactive sources; and establishing a cooperative sustainability program at sites to ensure that upgrades are maintained. For many years GTRI has collaborated successfully with the Russian Federation and international partners to improve radiological security in Russia. This paper provides a synopsis of GTRI's accomplishments and cooperation with Russia in the following areas: 1.) recovering and disposing of orphan and disused radioactive sources, 2.) recovering and disposing of radioisotope thermoelectric generators (RTGs), and 3.) providing physical security upgrades at civilian sites that contain vulnerable radiological material. The success of GTRI's program to secure radiological material in the Russian Federation over the past decade is due largely to the hard work, technical expertise, and tenacity of the U.S. laboratory teams and the Russian partner organizations with whom GTRI has worked. GTRI plans to continue building on this history of cooperation in order to recover and secure additional, vulnerable radioactive sources in locations throughout Russia. GTRI also is committed to sustainability efforts so that facilities in Russia receiving physical protection equipment and training are prepared to eventually assume responsibility for those security upgrades. In the years to come, GTRI will combine financial support with capacity building to enhance Russia's domestic programs to address these challenges. Through

  17. 10 CFR 712.11 - General requirements for HRP certification.

    Science.gov (United States)

    2010-01-01

    ..., “Drug-Free Federal Workplace Testing Implementation Program,” for DOE employees; (9) An initial alcohol... the HRP and complete initial instruction on the importance of security, safety, reliability, and... the Manager, the NNSA Administrator, his or her designee, or the appropriate Lead Program Secretarial...

  18. The Stewardship Science Academic Alliance: A Model of Education for Fundamental and Applied Low-energy Nuclear Science

    Energy Technology Data Exchange (ETDEWEB)

    Cizewski, J.A., E-mail: cizewski@rutgers.edu

    2014-06-15

    The Stewardship Science Academic Alliances (SSAA) were inaugurated in 2002 by the National Nuclear Security Administration of the U. S. Department of Energy. The purpose is to enhance connections between NNSA laboratories and the activities of university scientists and their students in research areas important to NNSA, including low-energy nuclear science. This paper highlights some of the ways that the SSAA fosters education and training of graduate students and postdoctoral scholars in low-energy nuclear science, preparing them for careers in fundamental and applied research and development.

  19. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  20. Nevada Test Site Environmental Report 2009

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed.

    2010-09-13

    The Nevada Test Site Environmental Report 2009 was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years’ Nevada Test Site Environmental Reports (NTSERs) are posted on the NNSA/NSO website at http://www.nv.doe.gov/library/publications/aser.aspx. This NTSER was prepared to satisfy DOE Order DOE O 231.1A, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NTSER summarizes data and compliance status for calendar year 2009 at the Nevada Test Site (NTS) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory (RSL)-Nellis. It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  1. Accelerator-driven Medical Sterilization to Replace Co-60 Sources

    Energy Technology Data Exchange (ETDEWEB)

    Kroc, Thomas K. [Fermilab; Thangaraj, Jayakar C.T. [Fermilab; Penning, Richard T. [Fermilab; Kephart, Robert D. [Fermilab

    2017-08-11

    This report documents the results of a study prepared at the request of the Office of Radiological Security of the National Nuclear Security Administration (NNSA), as part of the Domestic Protect and Reduce mission by the Illinois Accelerator Research Center (IARC) of Fermi National Accelerator Laboratory. The study included a literature survey of over 80 relevant documents and articles including industry standards, regulatory documents, technical papers, a court case, previous task force reports and industry white papers. The team also conducted interviews or had conversations with over 40 individuals representing over a dozen organizations over the course of its 10-month program. This report summarizes our findings, addresses the specific questions posed to us by NNSA, and concludes with a list of actionable recommendations.

  2. 75 FR 69009 - Acquisition Regulation: Socioeconomic Programs

    Science.gov (United States)

    2010-11-10

    ... 952.223-72, Radiation Protection and Nuclear Criticality. 12. Part 924 is a new part being added... Procurement and Assistance Management, or for the National Nuclear Security Administration (NNSA), to the... issue a Family Policymaking Assessment for any rulemaking or policy that may affect family well-being...

  3. Aerial Measuring System Technical Integration Annual Report 2002

    Energy Technology Data Exchange (ETDEWEB)

    Bechtel Nevada Remote Sensing Laboratory

    2003-06-01

    Fiscal Year 2002 is the second year of a five-year commitment by the U.S. Department of Energy, National Nuclear Security Administration (NNSA) to invest in development of new and state-of-the-art technologies for the Aerial Measuring Systems (AMS) project. In 2000, NNSA committed to two million dollars for AMS Technical Integration (TI) for each of five years. The tragedy of September 11, 2001, profoundly influenced the program. NNSA redirected people and funding resources at the Remote Sensing Laboratory (RSL) to more immediate needs. Funds intended for AMS TI were redirected to NNSA's new posture of leaning further forward throughout. AMS TI was brought to a complete halt on December 10, 2001. Then on April 30, 2002, NNSA Headquarters allowed the restart of AMS TI at the reduced level of $840,000. The year's events resulted in a slow beginning of several projects, some of which were resumed only a few weeks before the AMS TI Symposium held at RSL on July 30.

  4. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  5. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    on Integrated Management of Nuclear Materials to introduce modern technology development on nuclear safeguards, material accounting and control, and physical protection in October 2005. After the Tech Demo, a series of cooperation projects on nuclear safeguards and security were developed. To support the security of 2008 Beijing Summer Olympic Games, China Atomic Energy Authority (CAEA), worked with IAEA and the U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA), carried out trainings for the officials from public security, border control and customs, etc. for strengthening the response capabilities to the Major Public Events (MPEs) and implemented physical security upgrades and radioactive sources recovery at facilities near Olympic venues. As a partner state of the Global Initiative to Combat Nuclear Terrorism, China organized a scenario-based workshop on radioactive detection and emergency response in cooperation with U.S. in December 2007, more than 60 Participants from 20 more countries participated the workshop. To strengthen the training capability on nuclear safeguards and security, CAEA and the IAEA jointly established a 'CAEA-IAEA Joint Training Center on Nuclear Safeguards and Security' in December 2006, located at China Institute of Atomic Energy (CIAE). International Cooperation is a very important element in developing global nuclear security regime. China is willing to make continuous efforts to promoting the development of nuclear security through international cooperation. (author)

  6. Individual social security accounts: issues in assessing administrative feasibility and costs.

    Science.gov (United States)

    Olsen, K A; Salisbury, D L

    1998-11-01

    Whether to add individual accounts (IAs) to the Social Security system is a highly political issue. But almost lost in the debate so far have been any practical considerations about how to administer such accounts. Any discussion of whether to create individual accounts must also address the basic but critical questions of how they would work: Who would run them? What would they cost? Logistically, are they even possible? This EBRI Issue Brief provides an overview of the most salient administrative issues facing the current Social Security reform debate--issues that challenge proponents to carefully think through how their proposals could be implemented so as to achieve their policy goals. The options and difficulties in administering IAs raise concerns that cut across ideology. The object of this report is neither to dissuade the advocates nor support the critics of individual accounts. Rather, it is to bring practical considerations to a political debate that has largely ignored the pragmatic challenges of whether IAs would be too complex for participants to understand or too difficult for record keepers to administer. The major findings in this analysis include: Adding individual accounts to Social Security could be the largest undertaking in the history of the U.S. financial market, and no system to date has the capacity to administer such a system. The number of workers currently covered by Social Security--the largest single entitlement program in the nation--is at least four times higher than the combined number of all tax-favored employment-based retirement accounts in the United States, which are administered by hundreds of entities. Direct comparisons between employment-based retirement savings plans and Social Security reform are tenuous at best. Social Security covers workers and businesses that are disproportionately excluded from employment-based plans. Because of these differences, a system of individual Social Security accounts would be more

  7. Site Environmental Report for 2007: Sandia National Laboratories, California

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Barbara L. [Sandia National Lab. (SNL-CA), Livermore, CA (United States). Environmental Management Dept.

    2008-06-01

    Sandia National Laboratories, California (SNL/CA) is a government-owned/contractor-operated laboratory. Sandia Corporation, a Lockheed Martin Company, operates the laboratory for the Department of Energy’s National Nuclear Security Administration (NNSA). The NNSA Sandia Site Office oversees operations at the site, using Sandia Corporation as a management and operating contractor. This Site Environmental Report for 2007 was prepared in accordance with DOE Order 231.1A (DOE 2004a). The report provides a summary of environmental monitoring information and compliance activities that occurred at SNL/CA during calendar year 2007. General site and environmental program information is also included.

  8. Site environmental report for 2008 Sandia National Laboratories, California.

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Barbara L.

    2009-04-01

    Sandia National Laboratories, California (SNL/CA) is a government-owned/contractor operated laboratory. Sandia Corporation, a Lockheed Martin Company, operates the laboratory for the Department of Energy's National Nuclear Security Administration (NNSA). The NNSA Sandia Site Office oversees operations at the site, using Sandia Corporation as a management and operating contractor. This Site Environmental Report for 2008 was prepared in accordance with DOE Order 231.1A (DOE 2004a). The report provides a summary of environmental monitoring information and compliance activities that occurred at SNL/CA during calendar year 2008. General site and environmental program information is also included.

  9. Site environmental report for 2006 Sandia National Laboratories, California.

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Barbara L.

    2007-06-01

    Sandia National Laboratories, California (SNL/CA) is a government-owned/contractor-operated laboratory. Sandia Corporation, a Lockheed Martin Company, operates the laboratory for the Department of Energy's National Nuclear Security Administration (NNSA). The NNSA Sandia Site Office oversees operations at the site, using Sandia Corporation as a management and operating contractor. This Site Environmental Report for 2006 was prepared in accordance with DOE Order 231.1A (DOE 2004a). The report provides a summary of environmental monitoring information and compliance activities that occurred at SNL/CA during calendar year 2006. General site and environmental program information is also included.

  10. Site environmental report for 2005 Sandia National Laboratories, California.

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Barbara L.

    2006-06-01

    Sandia National Laboratories, California (SNL/CA) is a government-owned/contractor-operated laboratory. Sandia Corporation, a Lockheed Martin Company, operates the laboratory for the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). The DOE/NNSA Sandia Site Office (SSO) oversees operations at the site, using Sandia Corporation as a management and operating contractor. This Site Environmental Report for 2005 was prepared in accordance with DOE Order 231.1A. The report provides a summary of environmental monitoring information and compliance activities that occurred at SNL/CA during calendar year 2005. General site and environmental program information is also included.

  11. NEVADA TEST SITE WASTE ACCEPTANCE CRITERIA

    International Nuclear Information System (INIS)

    U.S. DEPARTMENT OF ENERGY, NATIONAL NUCLEAR SECURITY ADMINISTRATION, NEVADA SITE OFFICE

    2005-01-01

    This document establishes the U. S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) waste acceptance criteria (WAC). The WAC provides the requirements, terms, and conditions under which the Nevada Test Site will accept low-level radioactive and mixed waste for disposal. Mixed waste generated within the State of Nevada by NNSA/NSO activities is accepted for disposal. It includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the Nevada Test Site Area 3 and Area 5 Radioactive Waste Management Site for storage or disposal

  12. Underground Test Area Activity Preemptive Review Guidance Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    Preemptive reviews (PERs) of Underground Test Area (UGTA) Activity corrective action unit (CAU) studies are an important and long-maintained quality improvement process. The CAU-specific PER committees provide internal technical review of ongoing work throughout the CAU lifecycle. The reviews, identified in the UGTA Quality Assurance Plan (QAP) (Sections 1.3.5.1 and 3.2), assure work is comprehensive, accurate, in keeping with the state of the art, and consistent with CAU goals. PER committees review various products, including data, documents, software/codes, analyses, and models. PER committees may also review technical briefings including Federal Facility Agreement and Consent Order (FFACO)-required presentations to the Nevada Division of Environmental Protection (NDEP) and presentations supporting key technical decisions (e.g., investigation plans and approaches). PER committees provide technical recommendations to support regulatory decisions that are the responsibility of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and NDEP.

  13. Corrective Action Decision Document/Closure Report for Corrective Action Unit 372: Area 20 Cabriolet/Palanquin Unit Craters, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick and Sloop, Christy

    2011-04-01

    contamination areas and within the craters at Palanquin and Cabriolet exceed the FAL. It is also assumed that potential source material in the form of lead bricks at Little Feller I and lead-acid batteries at Palanquin and Cabriolet exceed the FAL. Therefore, corrective actions were undertaken that consist of removing potential source material, where present, and implementing a use restriction and posting warning signs at each CAS. These use restrictions were recorded in the FFACO database; the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Facility Information Management System; and the NNSA/NSO CAU/CAS files. Therefore, NNSA/NSO provides the following recommendations: • No further corrective actions are necessary for CAU 372. • A Notice of Completion to NNSA/NSO is requested from the Nevada Division of Environmental Protection for closure of CAU 372. • Corrective Action Unit 372 should be moved from Appendix III to Appendix IV of the FFACO.

  14. Corrective Action Decision Document/Closure Report for Corrective Action Unit 375: Area 30 Buggy Unit Craters, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-08-01

    consisted of removing the PSM. Use restrictions and warning signs were implemented for the remaining radiological contamination at CASs 25-23-22 and 30-45-01. These use restrictions were recorded in the FFACO database; the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Facility Information Management System; and the NNSA/NSO CAU/CAS files. Therefore, NNSA/NSO provides the following recommendations: (1) No further corrective actions are necessary for CAU 375; (2) A Notice of Completion to NNSA/NSO is requested from the Nevada Division of Environmental Protection for closure of CAU 375; and (3) Move CAU 375 from Appendix III to Appendix IV of the FFACO.

  15. Corrective Action Decision Document/Closure Report for Corrective Action Unit 365: Baneberry Contamination Area, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-09-01

    Corrective Action Unit 365 comprises one corrective action site (CAS), CAS 08-23-02, U-8d Contamination Area. The purpose of this CADD/CR is to provide justification and documentation supporting the recommendation that no further corrective action is needed for CAU 365 based on the implementation of the corrective action of closure in place with a use restriction (UR). Corrective action investigation (CAI) activities were performed from January 18, 2011, through August 2, 2011, as set forth in the Corrective Action Investigation Plan for Corrective Action Unit 365: Baneberry Contamination Area. The purpose of the CAI was to fulfill data needs as defined during the data quality objective (DQO) process. The CAU 365 dataset of investigation results was evaluated based on a data quality assessment. This assessment demonstrated the dataset is complete and acceptable for use in supporting the DQO decisions. Investigation results were evaluated against final action levels (FALs) established in this document. A radiological dose FAL of 25 millirem per year was established based on the Remote Work Area exposure scenario (336 hours of annual exposure). Radiological doses exceeding the FAL were found to be present to the southwest of the Baneberry crater. It was also assumed that radionuclide levels present within the crater and fissure exceed the FAL. Corrective actions were undertaken that consisted of establishing a UR and posting warning signs for the crater, fissure, and the area located to the southwest of the crater where soil concentrations exceeded the FAL. These URs were recorded in the FFACO database; the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Facility Information Management System; and the NNSA/NSO CAU/CAS files. Therefore, NNSA/NSO provides the following recommendations: (1) No further corrective actions beyond what are described in this document are necessary for CAU 365. (2) A Notice of Completion to

  16. U.S. uranium supply to the research and test reactor community

    International Nuclear Information System (INIS)

    Parker, Elaine M.

    2002-01-01

    From the 1950s through the early 1990s, the U.S. Department of Energy (DOE) was the primary supplier of low enriched uranium (LEU) and highly enriched uranium (HEU) to research and test reactors worldwide. The formerly called Y-12 Plant in Oak Ridge, Tennessee, was put into operational stand down in 1994 due to inadequate safety documentation. This paper will discuss the re-start of the Y-12 Plant and its current capabilities. Additionally, the paper will address recent changes within the DOE, with the creation of the National Nuclear Security Administration (NNSA). It will show how the change to NNSA and an organizational re-alignment has improved efficiencies. NNSA is committed to operate its sales program so that it is complementary to, and in support of, the Reduced Enrichment for Research and Test Reactors (RERTR) and Foreign Research Reactor Spent Nuclear Fuel (FRR SNF) Return Programs. The NNSA is committed to provide an assurance of competitively-priced, high-quality uranium supply to the research and test reactor community under long-term contracts. This paper will discuss some of NNSA's recent successes in long-term contracting and meeting deliveries. (author)

  17. Safeguards and security by design support for the next generation nuclear plant project - Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Bjornard, T.; Casey Durst, P.

    2013-01-01

    The Next Generation Nuclear Plant (NGNP) project was authorized by the United States Energy Policy Act of 2005 with the principal objective of designing, licensing, and building a Generation IV nuclear plant capable of producing both high-temperature process heat and electricity. The two candidate NGNP reactor concepts are pebble- and prismatic-fueled high-temperature gas reactors that will be licensed by the U.S. Nuclear Regulatory Commission (NRC). The conceptual design phase of the project was completed in December 2010. This paper summarizes support provided to the NGNP project to facilitate consideration of international safeguards during the design phase, or safeguards by design (SBD). Additional support was provided for domestic safeguards (material control and accounting) and physical protection, or safeguards and security by design (2SBD). The main focus of this paper is on SBD and international safeguards. Included is an overview of the international safeguards guidance contained in guidance reports for SBD. These reports contain guidance and suggestions intended to be useful to the industry design teams, but they do not contain ready-made solutions. Early and frequent interaction of design stakeholders with the International Atomic Energy Agency and the NRC are essential to a successful endeavor. The paper is followed by the slides of the presentation. (author)

  18. Closure Report for the 92-Acre Area and Corrective Action Unit 111: Area 5 WMD Retired Mixed Waste Pits, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2012-02-21

    This Closure Report (CR) presents information supporting closure of the 92-Acre Area, which includes Corrective Action Unit (CAU) 111, 'Area 5 WMD Retired Mixed Waste Pits.' This CR provides documentation supporting the completed corrective actions and confirmation that the closure objectives were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) (FFACO, 1996 [as amended March 2010]). Closure activities began in January 2011 and were completed in January 2012. Closure activities were conducted according to Revision 1 of the Corrective Action Decision Document/Corrective Action Plan (CADD/CAP) for the 92-Acre Area and CAU 111 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2010). The following closure activities were performed: (1) Construct an engineered evapotranspiration cover over the boreholes, trenches, and pits in the 92-Acre Area; (2) Install use restriction (UR) warning signs, concrete monuments, and subsidence survey monuments; and (3) Establish vegetation on the covers. UR documentation is included as Appendix C of this report. The post-closure plan is presented in detail in Revision 1 of the CADD/CAP for the 92-Acre Area and CAU 111, and the requirements are summarized in Section 5.2 of this document. When the next request for modification of Resource Conservation and Recovery Act Permit NEV HW0101 is submitted to the Nevada Division of Environmental Protection (NDEP), the requirements for post-closure monitoring of the 92-Acre Area will be included. NNSA/NSO requests the following: (1) A Notice of Completion from NDEP to NNSA/NSO for closure of CAU 111; and (2) The transfer of CAU 111 from Appendix III to Appendix IV, Closed Corrective Action Units, of the FFACO.

  19. Closure Report for the 92-Acre Area and Corrective Action Unit 111: Area 5 WMD Retired Mixed Waste Pits, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    2012-01-01

    This Closure Report (CR) presents information supporting closure of the 92-Acre Area, which includes Corrective Action Unit (CAU) 111, 'Area 5 WMD Retired Mixed Waste Pits.' This CR provides documentation supporting the completed corrective actions and confirmation that the closure objectives were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) (FFACO, 1996 (as amended March 2010)). Closure activities began in January 2011 and were completed in January 2012. Closure activities were conducted according to Revision 1 of the Corrective Action Decision Document/Corrective Action Plan (CADD/CAP) for the 92-Acre Area and CAU 111 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), 2010). The following closure activities were performed: (1) Construct an engineered evapotranspiration cover over the boreholes, trenches, and pits in the 92-Acre Area; (2) Install use restriction (UR) warning signs, concrete monuments, and subsidence survey monuments; and (3) Establish vegetation on the covers. UR documentation is included as Appendix C of this report. The post-closure plan is presented in detail in Revision 1 of the CADD/CAP for the 92-Acre Area and CAU 111, and the requirements are summarized in Section 5.2 of this document. When the next request for modification of Resource Conservation and Recovery Act Permit NEV HW0101 is submitted to the Nevada Division of Environmental Protection (NDEP), the requirements for post-closure monitoring of the 92-Acre Area will be included. NNSA/NSO requests the following: (1) A Notice of Completion from NDEP to NNSA/NSO for closure of CAU 111; and (2) The transfer of CAU 111 from Appendix III to Appendix IV, Closed Corrective Action Units, of the FFACO.

  20. NNSA Nonproliferation Graduate Fellowship Program Annual Report June 2009 - May 2010

    International Nuclear Information System (INIS)

    Berkman, Clarissa O.; Fankhauser, Jana G.

    2011-01-01

    In 2009, the Nonproliferation Graduate Fellowship Program (NGFP) completed its 17th successful year in support of the NNSA's mission by developing future leaders in nonproliferation and promoting awareness of career opportunities. This annual report to reviews program activities from June 2009 through May 2010 - the fellowship term for the Class of 2009. Contents include: Welcome Letter (Mission Driven: It's all about results), Introduction, Structure of the NGFP, Program Management Highlights, Annual Lifecycle, Class of 2009 Incoming Fellows, Orientation, Global Support of the Mission, Career Development, Management of the Fellows, Performance Highlights, Closing Ceremony, Where They Are Now, Alumni Highlight - Mission Success: Exceptional Leaders from the NGFP, Class of 2009 Fall Recruitment Activities, Established Partnerships, Face-to-Face, Recruiting Results, Interviews, Hiring and Clearances, Introducing the Class of 2010, Class of 2011 Recruitment Strategy, On the Horizon, Appendix A: Class of 2010 Fellow Biographies.

  1. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  2. Site Environmental Report for 2014 SNL/CA

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Barbara L. [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2015-06-01

    Sandia National Laboratories, California (SNL/CA) is a government-owned/contractoroperated laboratory. Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, manages and operates the laboratory for the Department of Energy’s National Nuclear Security Administration (NNSA). The NNSA Sandia Field Office administers the contract and oversees contractor operations at the site. This Site Environmental Report for 2014 was prepared in accordance with DOE Order 231.1B, Environment, Safety and Health Reporting (DOE 2011d). The report provides a summary of environmental monitoring information and compliance activities that occurred at SNL/CA during calendar year 2014. General site and environmental program information is also included.

  3. Site environmental report for 2011. Sandia National Laboratories, California

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Barbara L. [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2012-05-01

    Sandia National Laboratories, California (SNL/CA) is a government-owned/contractoroperated laboratory. Sandia Corporation, a wholly-owned subsidiary of Lockheed Martin Corporation, manages and operates the laboratory for the Department of Energy’s National Nuclear Security Administration (NNSA). The NNSA Sandia Site Office administers the contract and oversees contractor operations at the site. This Site Environmental Report for 2011 was prepared in accordance with DOE Order 231.1B, Environment, Safety and Health Reporting (DOE 2011d). The report provides a summary of environmental monitoring information and compliance activities that occurred at SNL/CA during calendar year 2011. General site and environmental program information is also included.

  4. Goals, Objectives, and Requirements (GOR) of the Ground-based Nuclear Detonation Detection (GNDD) Team for the Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D)

    International Nuclear Information System (INIS)

    Casey, Leslie A.

    2014-01-01

    The goal, objectives, and requirements (GOR) presented in this document define a framework for describing research directed specifically by the Ground-based Nuclear Detonation Detection (GNDD) Team of the National Nuclear Security Administration (NNSA). The intent of this document is to provide a communication tool for the GNDD Team with NNSA management and with its stakeholder community. It describes the GNDD expectation that much of the improvement in the proficiency of nuclear explosion monitoring will come from better understanding of the science behind the generation, propagation, recording, and interpretation of seismic, infrasound, hydroacoustic, and radionuclide signals and development of 'game-changer' advances in science and technology.

  5. Nuclear Explosion Monitoring Research and Engineering Program - Strategic Plan

    Energy Technology Data Exchange (ETDEWEB)

    Casey, Leslie A. [DOE/NNSA

    2004-09-01

    The Department of Energy (DOE)/National Nuclear Security Administration (NNSA) Nuclear Explosion Monitoring Research and Engineering (NEM R&E) Program is dedicated to providing knowledge, technical expertise, and products to US agencies responsible for monitoring nuclear explosions in all environments and is successful in turning scientific breakthroughs into tools for use by operational monitoring agencies. To effectively address the rapidly evolving state of affairs, the NNSA NEM R&E program is structured around three program elements described within this strategic plan: Integration of New Monitoring Assets, Advanced Event Characterization, and Next-Generation Monitoring Systems. How the Program fits into the National effort and historical accomplishments are also addressed.

  6. Site Environmental Report for 2012 Sandia National Laboratories California

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Barbara L. [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2013-05-01

    Sandia National Laboratories, California (SNL/CA) is a government-owned/contractor-operated laboratory. Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, manages and operates the laboratory for the Department of Energy’s National Nuclear Security Administration (NNSA). The NNSA Sandia Field Office administers the contract and oversees contractor operations at the site. This Site Environmental Report for 2012 was prepared in accordance with DOE Order 231.1B, Environment, Safety and Health Reporting (DOE 2011d). The report provides a summary of environmental monitoring information and compliance activities that occurred at SNL/CA during calendar year 2012. General site and environmental program information is also included.

  7. Goals, Objectives, and Requirements (GOR) of the Ground-based Nuclear Detonation Detection (GNDD) Team for the Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D)

    Energy Technology Data Exchange (ETDEWEB)

    Casey, Leslie A.

    2014-01-13

    The goal, objectives, and requirements (GOR) presented in this document define a framework for describing research directed specifically by the Ground-based Nuclear Detonation Detection (GNDD) Team of the National Nuclear Security Administration (NNSA). The intent of this document is to provide a communication tool for the GNDD Team with NNSA management and with its stakeholder community. It describes the GNDD expectation that much of the improvement in the proficiency of nuclear explosion monitoring will come from better understanding of the science behind the generation, propagation, recording, and interpretation of seismic, infrasound, hydroacoustic, and radionuclide signals and development of "game-changer" advances in science and technology.

  8. Design of security scheme of the radiotherapy planning administration system based on the hospital information system

    International Nuclear Information System (INIS)

    Zhuang Yongzhi; Zhao Jinzao

    2010-01-01

    Objective: To design a security scheme of radiotherapy planning administration system. Methods: Power Builder 9i language was used to program the system through the model of client-server machine. Oracle 9i was used as the database server. Results In this system, user registration management, user login management, application-level functions of control, database access control, and audit trail were designed to provide system security. Conclusions: As a prototype for the security analysis and protection of this scheme provides security of the system, application system, important data and message, which ensures the system work normally. (authors)

  9. NNSS Soils Monitoring: Plutonium Valley (CAU 366)

    International Nuclear Information System (INIS)

    Miller, Julianne J.; Mizell, Steve A.; Nikolich, George; Campbell, Scott

    2012-01-01

    The U.S. Department of Energy (DOE) National Nuclear Security Administration (NNSA), Nevada Site Office (NSO), Environmental Restoration Soils Activity has authorized the Desert Research Institute (DRI) to conduct field assessments of potential sediment transport of contaminated soil from Corrective Action Unit (CAU) 366, Area 11 Plutonium Valley Dispersion Sites Contamination Area (CA) during precipitation runoff events.

  10. Y-12 Integrated Materials Management System

    Energy Technology Data Exchange (ETDEWEB)

    Alspaugh, D. H.; Hickerson, T. W.

    2002-06-03

    The Integrated Materials Management System, when fully implemented, will provide the Y-12 National Security Complex with advanced inventory information and analysis capabilities and enable effective assessment, forecasting and management of nuclear materials, critical non-nuclear materials, and certified supplies. These capabilities will facilitate future Y-12 stockpile management work, enhance interfaces to existing National Nuclear Security Administration (NNSA) corporate-level information systems, and enable interfaces to planned NNSA systems. In the current national nuclear defense environment where, for example, weapons testing is not permitted, material managers need better, faster, more complete information about material properties and characteristics. They now must manage non-special nuclear material at the same high-level they have managed SNM, and information capabilities about both must be improved. The full automation and integration of business activities related to nuclear and non-nuclear materials that will be put into effect by the Integrated Materials Management System (IMMS) will significantly improve and streamline the process of providing vital information to Y-12 and NNSA managers. This overview looks at the kinds of information improvements targeted by the IMMS project, related issues, the proposed information architecture, and the progress to date in implementing the system.

  11. Y-12 Integrated Materials Management System

    International Nuclear Information System (INIS)

    Alspaugh, D. H.; Hickerson, T. W.

    2002-01-01

    The Integrated Materials Management System, when fully implemented, will provide the Y-12 National Security Complex with advanced inventory information and analysis capabilities and enable effective assessment, forecasting and management of nuclear materials, critical non-nuclear materials, and certified supplies. These capabilities will facilitate future Y-12 stockpile management work, enhance interfaces to existing National Nuclear Security Administration (NNSA) corporate-level information systems, and enable interfaces to planned NNSA systems. In the current national nuclear defense environment where, for example, weapons testing is not permitted, material managers need better, faster, more complete information about material properties and characteristics. They now must manage non-special nuclear material at the same high-level they have managed SNM, and information capabilities about both must be improved. The full automation and integration of business activities related to nuclear and non-nuclear materials that will be put into effect by the Integrated Materials Management System (IMMS) will significantly improve and streamline the process of providing vital information to Y-12 and NNSA managers. This overview looks at the kinds of information improvements targeted by the IMMS project, related issues, the proposed information architecture, and the progress to date in implementing the system

  12. Marketing Strategy Research

    Energy Technology Data Exchange (ETDEWEB)

    None

    2010-03-31

    This report documents the research that has been undertaken as background for preparation of a marketing campaign for middle and high school students to increase interest in national security careers at the National Nuclear Security Administration. This work is a part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. Previous research on the development of a properly trained and skilled national security workforce has identified a lack of interest by k-12 students in the STEM (Science, Technology, Engineering, and Mathematics) fields. Further, participation in these careers by women and minority populations is limited and is not increasing. Added to this are low educational achievement levels in New Mexico, where the marketing campaign will be deployed.

  13. Aerial Measuring System (AMS)/ Israel Atomic Energy Commission (IAEC) Joint Comparison Study

    International Nuclear Information System (INIS)

    Halevy, I.; Dadon, S.; Sheinfeld, M.; Broide, A.; Rofe, S.; Yaar, I.; Wasiolek, P.

    2014-01-01

    In support of the U.S. Department of Energy (DOE) International Emergency Management and Cooperation (IEMC/NA-46) Program, the comparison of the U.S. and Israeli Aerial Measuring Systems (AMS) study was proposed and accepted. The study, organized by the DOE/National Nuclear Security Administration (NNSA) Remote Sensing Laboratory (RSL), involved the DOE/NNSA Aerial Measuring System Project based at the RSL and operated under a contractor agreement by National Security Technologies, LLC (NSTec), and the Israel Atomic Energy Commission (IAEC) Aerial Measuring System. The operational comparison was conducted at RSL-Nellis in Las Vegas, Nevada, during week of June 24–27, 2013. The Israeli system, Air RAM 2000 (figure 1, down), was shipped to RSL-Nellis and mounted together with the DOE Spectral Advanced Radiological Computer System, Model A (SPARCS-A, figure 1 up) on U.S. DOE Bell-412 helicopter for a series of aerial comparison measurements at local test ranges, including the Desert Rock Airport and Area 3 at the Nevada National Security Site (NNSS). A four-person Israeli team from the IAEC, Nuclear Research Center – Negev (NRCN) supported the activity. The main objective of this joint comparison was use the DOE/RSL Bell-412 helicopter aerial platform, perform the comparison study of measuring techniques and radiation acquisition systems utilized for emergency response by IEAC and NNSA AMS

  14. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  15. Applicants' preference for impression management tactic in employment interviews by Transportation Security Administration.

    Science.gov (United States)

    Scudder, Joseph N; Lamude, Kevin G

    2009-04-01

    Following past findings on employment interviews, this study hypothesized applicants would have a preference for using self-promoting tactics of impression management over other focuses. Self-reports of impression management tactics were collected from 124 applicants who had interviews for screener positions with the Transportation Security Administration. Contrary to the hypothesis, analysis indicated participants reported they used more ingratiation tactics attempting to praise the interviewer than self-promotion tactics which focused on their own accomplishments. Special qualifications for security jobs which required well-developed perceptual abilities and the controlling structure of the interview context were perhaps responsible for present results differing from prior findings.

  16. NV/YMP RADIOLOGICAL CONTROL MANUAL

    Energy Technology Data Exchange (ETDEWEB)

    U.S. DEPARTMENT OF ENERGY, NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE; BECHTEL NEVADA

    2004-11-01

    This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) and the Yucca Mountain Office of Repository Development (YMORD). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations Part 835 (10 CFR 835), Occupational Radiation Protection. Programs covered by this manual are located at the Nevada Test Site (NTS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Pleasanton, California; and at Andrews Air Force Base, Maryland. In addition, field work by NNSA/NSO at other locations is also covered by this manual.

  17. NV/YMP RADIOLOGICAL CONTROL MANUAL

    International Nuclear Information System (INIS)

    2004-01-01

    This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) and the Yucca Mountain Office of Repository Development (YMORD). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations Part 835 (10 CFR 835), Occupational Radiation Protection. Programs covered by this manual are located at the Nevada Test Site (NTS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Pleasanton, California; and at Andrews Air Force Base, Maryland. In addition, field work by NNSA/NSO at other locations is also covered by this manual

  18. The U.S. Department of Energy, National Nuclear Security Agency's Use of Geographic Information Systems for Nuclear Emergency Response Support

    International Nuclear Information System (INIS)

    Guber, A. L.

    2001-01-01

    The U.S, Department of Energy (DOE), National Nuclear Security Agency's (NNSA) Remote Sensing Laboratory (RSL) provides Geographic Information System (GIS) support during nuclear emergency response activities. As directed by the NNSA, the RSL GIS staff maintains databases and equipment for rapid field deployment during an emergency response. When on location, GIS operators provide information products to on-site emergency managers as well as to emergency managers at the DOE Headquarters (HQ) Emergency Operations Center (EOC) in Washington, D.C. Data products are derived from multiple information sources in the field including radiological prediction models, field measurements taken on the ground and from the air, and pertinent information researched on the Internet. The GIS functions as a central data hub where it supplies the information to response elements in the field, as well as to headquarters officials at HQ during emergency response activities

  19. How Strong Is Europeanisation, Really? The Danish Defence Administration and the Opt-Out from the European Security and Defence Policy

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2011-01-01

    The article questions how strong Europeanisation is as an explanation of administrative changes in EU member states. Denmark has an opt-out from the European cooperation on defence, and, therefore, its defence administration represents a critical or a less likely case to test the Europeanisation...... thesis. The article shows that in spite of the opt-out, the administrative structures and the policy processes in the Ministry of Foreign Affairs (MFA) have adapted to the common foreign and security policy (CFSP) and the European security and defence policy (ESDP). Surprisingly, the administrative...... structures and the decision-making processes in the Ministry of Defence (MoD) have also adapted to the ESDP. The latter example emphasises the strength of top-down Europeanisation as a possible explanation of domestic administrative changes in member states. It is argued that Europeanisation per se...

  20. 1st Quarter Transportation Report FY 2015: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    Energy Technology Data Exchange (ETDEWEB)

    Gregory, Louis [National Security Technologies, LLC, Las Vegas, NV (United States)

    2015-02-20

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to and from the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. This report summarizes the 1st quarter of Fiscal Year (FY) 2015 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. Tabular summaries are provided which include the following: Sources of and carriers for LLW and MLLW shipments to and from the NNSS; Number and external volume of LLW and MLLW shipments; Highway routes used by carriers; and Incident/accident data applicable to LLW and MLLW shipments. In this report shipments are accounted for upon arrival at the NNSS, while disposal volumes are accounted for upon waste burial. The disposal volumes presented in this report include minor volumes of non-radioactive classified waste/material that were approved for disposal (non-radioactive classified or nonradioactive classified hazardous). Volume reports showing cubic feet generated using the Low-Level Waste Information System may vary slightly due to rounding conventions for volumetric conversions from cubic meters to cubic feet.

  1. 3rd Quarter Transportation Report FY 2014: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    International Nuclear Information System (INIS)

    Gregory, Louis

    2014-01-01

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. This report summarizes the 3rd quarter of Fiscal Year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annual summaries for FY 2014 in Tables 4 and 5. Tabular summaries are provided which include the following: Sources of and carriers for LLW and MLLW shipments to and from the NNSS; Number and external volume of LLW and MLLW shipments; Highway routes used by carriers; and Incident/accident data applicable to LLW and MLLW shipments. In this report shipments are accounted for upon arrival at the NNSS, while disposal volumes are accounted for upon waste burial. The disposal volumes presented in this report do not include minor volumes of non-radioactive materials that were approved for disposal. Volume reports showing cubic feet generated using the Low-Level Waste Information System may vary slightly due to differing rounding conventions.

  2. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  3. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  4. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  5. VMware vCloud security

    CERN Document Server

    Sarkar, Prasenjit

    2013-01-01

    VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security.This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience who want to learn about advanced concepts of vCloud security and compliance.

  6. External Peer Review Team Report for Corrective Action Unit 97: Yucca Flat/Climax Mine, Nevada National Security Site, Nye County, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam J. [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Andrews, Robert [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2015-01-01

    The peer review team commends the Navarro-Intera, LLC (N-I), team for its efforts in using limited data to model the fate of radionuclides in groundwater at Yucca Flat. Recognizing the key uncertainties and related recommendations discussed in Section 6.0 of this report, the peer review team has concluded that U.S. Department of Energy (DOE) is ready for a transition to model evaluation studies in the corrective action decision document (CADD)/corrective action plan (CAP) stage. The DOE, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) clarified the charge to the peer review team in a letter dated October 9, 2014, from Bill R. Wilborn, NNSA/NFO Underground Test Area (UGTA) Activity Lead, to Sam J. Marutzky, N-I UGTA Project Manager: “The model and supporting information should be sufficiently complete that the key uncertainties can be adequately identified such that they can be addressed by appropriate model evaluation studies. The model evaluation studies may include data collection and model refinements conducted during the CADD/CAP stage. One major input to identifying ‘key uncertainties’ is the detailed peer review provided by independent qualified peers.” The key uncertainties that the peer review team recognized and potential concerns associated with each are outlined in Section 6.0, along with recommendations corresponding to each uncertainty. The uncertainties, concerns, and recommendations are summarized in Table ES-1. The number associated with each concern refers to the section in this report where the concern is discussed in detail.

  7. Corrective Action Plan for Corrective Action Unit 168: Area 25 and 26 Contaminated Materials and Waste Dumps, Nevada Test Site, Nevada, REV 1

    International Nuclear Information System (INIS)

    NSTec Environmental Restoration

    2007-01-01

    Corrective Action Unit (CAU) 168 is identified in the Federal Facility Agreement and Consent Order of 1996 as Area 25 and 26 Contaminated Materials and Waste Dumps. CAU 168 consists of twelve Corrective Action Sites (CASs) in Areas 25 and 26 of the Nevada Test Site, which is approximately 105 kilometers (65 miles) northwest of Las Vegas, Nevada. The CASs contain surface and subsurface debris, impacted soil, and contaminated materials. Site characterization activities were conducted in 2002, and the results are presented in the Corrective Action Decision Document (CADD) for CAU 168 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2006). Site characterization results indicated that soil at several sites exceeded the clean-up criteria for total petroleum hydrocarbons (TPH), polychlorinated biphenyls (PCBs), and radionuclides. The Nevada Division of Environmental Protection approved the proposed corrective actions specified in the CADD (NNSA/NSO, 2006). The approved corrective actions include no further action, clean closure, and closure in place with administrative controls

  8. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  9. The development of a mobile hot cell facility for the conditioning of spent high activity radioactive sources

    International Nuclear Information System (INIS)

    Liebenberg, G.R.; Al-Mughrabi, M.

    2010-01-01

    The International Atomic Energy Agency (IAEA) Waste Technology Section with additional support from the U.S. National Nuclear Security Administration (NNSA) through the IAEA Nuclear Security Fund has funded the design, fabrication, evaluation, and testing of a portable hot cell intended to address the problem of disused Spent High Activity Radioactive Sources (SHARS) in obsolete irradiation devices such as teletherapy heads and dry irradiators. The project is initially targeting the African continent but expected soon to expand to Latin America and Asia. This hot cell allows source removal, characterization, consolidation, repackaging in modern storage shields, and secure storage of high risk SHARS at national radioactive waste storage facilities. (authors)

  10. Corrective Action Decision Document/Closure Report for Corrective Action Unit 374: Area 20 Schooner Unit Crater, Nevada National Security Site, Nevada with ROTC 1 and 2, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick

    2011-07-01

    Schooner sites exceed the FAL. It is also assumed that PSM in the form of lead-acid batteries at Schooner exceeds the FAL. Therefore, corrective actions were undertaken that consist of removing PSM, where present, and implementing a use restriction and posting warning signs at the Danny Boy and Schooner sites. These use restrictions were recorded in the FFACO database; the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Facility Information Management System; and the NNSA/NSO CAU/CAS files. Therefore, NNSA/NSO provides the following recommendations: • No further corrective actions are necessary for CAU 374. • A Notice of Completion to NNSA/NSO is requested from the Nevada Division of Environmental Protection for closure of CAU 374. • Corrective Action Unit 374 should be moved from Appendix III to Appendix IV of the FFACO.

  11. Final Site-Wide Environmental Impact Statement for the Y-12 National Security Complex

    International Nuclear Information System (INIS)

    2001-01-01

    The National Nuclear Security Administration (NNSA) a separately organized agency within the U.S. Department of Energy (DOE) is responsible for providing the Nation with nuclear weapons and ensuring that those nuclear weapons remain safe, secure, and reliable. As one of the DOE major production facilities, the Y-12 National Security Complex has been DOE's primary site for enriched uranium processing and storage, and one of the manufacturing facilities for maintaining the U.S. nuclear weapons stockpile. In response to the end of the Cold War and changes in the world's political regimes, the emphasis of the U.S. weapons program has shifted dramatically over the past few years from developing and producing new weapons to dismantlement and maintenance of a smaller, enduring stockpile. The ''Stockpile Stewardship and Management Programmatic Environmental Impact Statement'' [SSM PEIS], DOE/EIS-0236, issued in September 1996, evaluated alternatives for maintaining the safety and reliability of the nuclear weapons stockpile without underground nuclear testing or production of new-design weapons. In the SSM PEIS Record of Decision (ROD), DOE decided to maintain the national security missions at the Y-12 National Security Complex, but to downsize Y-12 consistent with reduced requirements. These national security missions include (1) maintaining the capability and capacity to fabricate secondaries, limited life components, and case parts for nuclear response; (2) evaluating components and subsystems returned from the stockpile; (3) storing enriched uranium that is designated for national security purposes; (4) storing depleted uranium and lithium parts; (5) dismantling nuclear weapons secondaries returned from the stockpile; (6) processing uranium and lithium (which includes chemical recovery, purification, and conversion of enriched uranium and lithium to a form suitable for long-term storage and/or further use); and (7) providing support to weapons laboratories. During the

  12. Application for a Permit to Operate a Class III Solid Waste Disposal Site at the Nevada National Security Site Area 5 Asbestiform Low-Level Solid Waste Disposal Site

    International Nuclear Information System (INIS)

    2010-01-01

    The Nevada National Security Site (NNSS) is located approximately 105 km (65 mi) northwest of Las Vegas, Nevada. The U.S. Department of Energy National Nuclear Security Administration Nevada Site Office (NNSA/NSO) is the federal lands management authority for the NNSS and National Security Technologies, LLC (NSTec) is the Management and Operations contractor. Access on and off the NNSS is tightly controlled, restricted, and guarded on a 24-hour basis. The NNSS is posted with signs along its entire perimeter. NSTec is the operator of all solid waste disposal sites on the NNSS. The Area 5 Radioactive Waste Management Site (RWMS) is the location of the permitted facility for the Solid Waste Disposal Site (SWDS). The Area 5 RWMS is located near the eastern edge of the NNSS (Figure 1), approximately 26 km (16 mi) north of Mercury, Nevada. The Area 5 RWMS is used for the disposal of low-level waste (LLW) and mixed low-level waste. Many areas surrounding the RWMS have been used in conducting nuclear tests. The site will be used for the disposal of regulated Asbestiform Low-Level Waste (ALLW), small quantities of low-level radioactive hydrocarbon-burdened (LLHB) media and debris, LLW, LLW that contains Polychlorinated Biphenyl (PCB) Bulk Product Waste greater than 50 ppm that leaches at a rate of less than 10 micrograms of PCB per liter of water, and small quantities of LLHB demolition and construction waste (hereafter called permissible waste). Waste containing free liquids, or waste that is regulated as hazardous waste under the Resource Conservation and Recovery Act (RCRA) or state-of-generation hazardous waste regulations, will not be accepted for disposal at the site. Waste regulated under the Toxic Substances Control Act (TSCA) that will be accepted at the disposal site is regulated asbestos-containing materials (RACM) and PCB Bulk Product Waste greater than 50 ppm that leaches at a rate of less than 10 micrograms of PCB per liter of water. The term asbestiform is

  13. Application for a Permit to Operate a Class III Solid Waste Disposal Site at the Nevada National Security Site Area 5 Asbestiform Low-Level Solid Waste Disposal Site

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Programs

    2010-10-04

    The Nevada National Security Site (NNSS) is located approximately 105 km (65 mi) northwest of Las Vegas, Nevada. The U.S. Department of Energy National Nuclear Security Administration Nevada Site Office (NNSA/NSO) is the federal lands management authority for the NNSS and National Security Technologies, LLC (NSTec) is the Management and Operations contractor. Access on and off the NNSS is tightly controlled, restricted, and guarded on a 24-hour basis. The NNSS is posted with signs along its entire perimeter. NSTec is the operator of all solid waste disposal sites on the NNSS. The Area 5 Radioactive Waste Management Site (RWMS) is the location of the permitted facility for the Solid Waste Disposal Site (SWDS). The Area 5 RWMS is located near the eastern edge of the NNSS (Figure 1), approximately 26 km (16 mi) north of Mercury, Nevada. The Area 5 RWMS is used for the disposal of low-level waste (LLW) and mixed low-level waste. Many areas surrounding the RWMS have been used in conducting nuclear tests. The site will be used for the disposal of regulated Asbestiform Low-Level Waste (ALLW), small quantities of low-level radioactive hydrocarbon-burdened (LLHB) media and debris, LLW, LLW that contains Polychlorinated Biphenyl (PCB) Bulk Product Waste greater than 50 ppm that leaches at a rate of less than 10 micrograms of PCB per liter of water, and small quantities of LLHB demolition and construction waste (hereafter called permissible waste). Waste containing free liquids, or waste that is regulated as hazardous waste under the Resource Conservation and Recovery Act (RCRA) or state-of-generation hazardous waste regulations, will not be accepted for disposal at the site. Waste regulated under the Toxic Substances Control Act (TSCA) that will be accepted at the disposal site is regulated asbestos-containing materials (RACM) and PCB Bulk Product Waste greater than 50 ppm that leaches at a rate of less than 10 micrograms of PCB per liter of water. The term asbestiform is

  14. Closure Report for Corrective Action Unit 116: Area 25 Test Cell C Facility, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2011-09-29

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 116, Area 25 Test Cell C Facility. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 [as amended March 2010]). CAU 116 consists of the following two Corrective Action Sites (CASs), located in Area 25 of the Nevada National Security Site: (1) CAS 25-23-20, Nuclear Furnace Piping and (2) CAS 25-41-05, Test Cell C Facility. CAS 25-41-05 consisted of Building 3210 and the attached concrete shield wall. CAS 25-23-20 consisted of the nuclear furnace piping and tanks. Closure activities began in January 2007 and were completed in August 2011. Activities were conducted according to Revision 1 of the Streamlined Approach for Environmental Restoration Plan for CAU 116 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2008). This CR provides documentation supporting the completed corrective actions and provides data confirming that closure objectives for CAU 116 were met. Site characterization data and process knowledge indicated that surface areas were radiologically contaminated above release limits and that regulated and/or hazardous wastes were present in the facility.

  15. Nevada Test Site Environmental Report Summary 2009

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed.

    2010-09-13

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada Test Site (NTS). NNSA/NSO prepares the Nevada Test Site Environmental Report (NTSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NTS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NTSER is a comprehensive report of environmental activities performed at the NTS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NTSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NTS environment, or all environmental program activities performed throughout the year. The reader may obtain a hard copy of the full NTSER as directed on the inside front cover of this summary report.

  16. Well Completion Report for Corrective Action Unit 447, Project Shoal Area, Churchill County, Nevada, Rev. No.: 0

    Energy Technology Data Exchange (ETDEWEB)

    Rick Findlay

    2006-09-01

    This Well Completion Report is being provided as part of the implementation of the Corrective Action Decision Document (CADD)/Corrective Action Plan (CAP) for Corrective Action Unit (CAU) 447 (NNSA/NSO, 2006a). The CADD/CAP is part of an ongoing U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) funded project for the investigation of CAU 447 at the Project Shoal Area (PSA). All work performed on this project was conducted in accordance with the ''Federal Facility Agreement and Consent Order'' (FFACO) (1996), and all applicable Nevada Division of Environmental Protection (NDEP) policies and regulations. Investigation activities included the drilling, construction, and development of three monitoring/validation (MV) wells at the PSA. This report summarizes the field activities and data collected during the investigation.

  17. Monitoring the Long-Term Effectiveness of Integrated Safety Management System (ISMS) Implementation Through Use of a Performance Dashboard Process

    International Nuclear Information System (INIS)

    Kinney, Michael D.; Barrick, William D.

    2008-01-01

    This session will examine a method developed by Federal and Contractor personnel at the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) to examine long-term maintenance of DOE Integrated Safety Management System (ISMS) criteria, including safety culture attributes, as well as identification of process improvement opportunities. This process was initially developed in the summer of 2000 and has since been expanded to recognize the importance of safety culture attributes, and associated safety culture elements, as defined in DOE M 450.4-1, 'Integrated Safety Management System Manual'. This process has proven to significantly enhance collective awareness of the importance of long-term ISMS implementation as well as support commitments by NNSA/NSO personnel to examine the continued effectiveness of ISMS processes

  18. Calendar Year 2013 Annual Site Environmental Report for Sandia National Laboratories, Albuquerque, New Mexico

    Energy Technology Data Exchange (ETDEWEB)

    Griffith, Stacy [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Sandia National Laboratories, New Mexico is a government-owned/contractor-operated facility. Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, manages and operates the laboratory for the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA). The DOE/NNSA, Sandia Field Office administers the contract and oversees contractor operations at the site. This annual report summarizes data and the compliance status of Sandia Corporation’s sustainability, environmental protection, and monitoring programs through December 31, 2013. Major environmental programs include air quality, water quality, groundwater protection, terrestrial surveillance, waste management, pollution prevention, environmental restoration, oil and chemical spill prevention, and implementation of the National Environmental Policy Act. Environmental monitoring and surveillance programs are required by DOE Order 231.1B, Environment, Safety, and Health Reporting (DOE 2012).

  19. Well Completion Report for Corrective Action Unit 447, Project Shoal Area, Churchill County, Nevada

    International Nuclear Information System (INIS)

    Rick Findlay

    2006-01-01

    This Well Completion Report is being provided as part of the implementation of the Corrective Action Decision Document (CADD)/Corrective Action Plan (CAP) for Corrective Action Unit (CAU) 447 (NNSA/NSO, 2006a). The CADD/CAP is part of an ongoing U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) funded project for the investigation of CAU 447 at the Project Shoal Area (PSA). All work performed on this project was conducted in accordance with the ''Federal Facility Agreement and Consent Order'' (FFACO) (1996), and all applicable Nevada Division of Environmental Protection (NDEP) policies and regulations. Investigation activities included the drilling, construction, and development of three monitoring/validation (MV) wells at the PSA. This report summarizes the field activities and data collected during the investigation

  20. Calendar Year 2013 Annual Site Environmental Report for Sandia National Laboratories, Albuquerque, New Mexico

    International Nuclear Information System (INIS)

    Griffith, Stacy

    2014-01-01

    Sandia National Laboratories, New Mexico is a government-owned/contractor-operated facility. Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, manages and operates the laboratory for the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA). The DOE/NNSA, Sandia Field Office administers the contract and oversees contractor operations at the site. This annual report summarizes data and the compliance status of Sandia Corporation's sustainability, environmental protection, and monitoring programs through December 31, 2013. Major environmental programs include air quality, water quality, groundwater protection, terrestrial surveillance, waste management, pollution prevention, environmental restoration, oil and chemical spill prevention, and implementation of the National Environmental Policy Act. Environmental monitoring and surveillance programs are required by DOE Order 231.1B, Environment, Safety, and Health Reporting (DOE 2012).

  1. Site Environmental Report for 2016 Sandia National Laboratories California.

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Barbara L. [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2017-06-01

    Sandia National Laboratories, California (SNL/CA) is a Department of Energy (DOE) facility. The management and operations of the facility are under a contract with the DOE’s National Nuclear Security Administration (NNSA). On May 1, 2017, the name of the management and operating contractor changed from Sandia Corporation to National Technology and Engineering Solutions of Sandia, LLC (NTESS). The DOE, NNSA, Sandia Field Office administers the contract and oversees contractor operations at the site. This Site Environmental Report for 2016 was prepared in accordance with DOE Order 231.1B, Environment, Safety and Health Reporting (DOE 2012). The report provides a summary of environmental monitoring information and compliance activities that occurred at SNL/CA during calendar year 2016, unless noted otherwise. General site and environmental program information is also included.

  2. Centers for Disease Control and Prevention (CDC) Radiation Hazard Scale Data Product Review Feedback Report

    Energy Technology Data Exchange (ETDEWEB)

    Askin, A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Buddemeier, B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Alai, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Yu, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-09-20

    In support of the Department of Energy (DOE) National nuclear Security Administration (NNSA) and the Centers for Disease Control and Prevention (CDC), Lawrence Livermore National Laboratory (LLNL) assisted in the development of new data templates for disseminating and communicating FRMAC1 data products using the CDC Radiation Hazard Scale communication tool. To ensure these data products will be useful to stakeholders during a radiological emergency, LLNL facilitated opportunities for product socialization and review.

  3. 20 CFR 416.105 - Administration.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Administration. 416.105 Section 416.105 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Introduction, General Provisions and Definitions § 416.105 Administration. The Supplemental...

  4. Development and Implementation of a Program Management Maturity Model

    Energy Technology Data Exchange (ETDEWEB)

    Hartwig, Laura; Smith, Matt

    2008-12-15

    In 2006, Honeywell Federal Manufacturing & Technologies (FM&T) announced an updatedvision statement for the organization. The vision is “To be the most admired team within the NNSA [National Nuclear Security Administration] for our relentless drive to convert ideas into the highest quality products and services for National Security by applying the right technology, outstanding program management and best commercial practices.” The challenge to provide outstanding program management was taken up by the Program Management division and the Program Integration Office (PIO) of the company. This article describes how Honeywell developed and deployed a program management maturity model to drive toward excellence.

  5. Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences

    Energy Technology Data Exchange (ETDEWEB)

    Pope, Ronald; Liu, Yung; Shuler, J.M.

    2016-01-01

    Beginning in 2013, the U.S. Department of Energy (DOE) Packaging Certification Program (PCP), Office of Packaging and Transportation, Office of Environmental Management has sponsored a series of three training courses on Security of Nuclear and Other Radioactive Materials during Transport. These courses were developed and hosted by Argonne National Laboratory staff with guest lecturers from both the U.S. and international organizations and agencies including the U.S. Nuclear Regulatory Commission (NRC), Federal Bureau of Investigation (FBI), the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), DOE national laboratories, the International Atomic Energy Agency (IAEA), the World Nuclear Transport Institute (WNTI), and the World Institute for Nuclear Security (WINS). Each of the three courses held to date were one-week in length. The courses delved in detail into the regulatory requirements for transport security, focusing on international and U.S.-domestic requirements and guidance documents. Lectures, in-class discussions and small group exercises, including tabletop (TTX) and field exercises were designed to enhance the learning objectives for the participants. For example, the field exercise used the ARG-US radio frequency identification (RFID) remote surveillance system developed by Argonne for DOE/PCP to track and monitor packages in a mock shipment, following in-class exercises of developing a transport security plan (TSP) for the mock shipment, performing a readiness review and identifying needed corrective actions. Participants were able to follow the mock shipment on the webpage in real time in the ARG-US Command Center at Argonne including “staged” incidents that were designed to illustrate the importance of control, command, communication and coordination in ensuring transport security. Great lessons were learned based on feedback from the participant’s course evaluations with the series of the courses. Since the

  6. Calculation of Hazard Category 2/3 Threshold Quantities Using Contemporary Dosimetric Data

    Energy Technology Data Exchange (ETDEWEB)

    Walker, William C. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-11-01

    The purpose of this report is to describe the methodology and selection of input data utilized to calculate updated Hazard Category 2 and Hazard Category 3 Threshold Quantities (TQs) using contemporary dosimetric information. The calculation of the updated TQs will be considered for use in the revision to the Department of Energy (DOE) Technical Standard (STD-) 1027-92 Change Notice (CN)-1, “Hazard Categorization and Accident Analysis Techniques for Compliance with DOE Order 5480.23, Nuclear Safety Analysis Reports.” The updated TQs documented in this report complement an effort previously undertaken by the National Nuclear Security Administration (NNSA), which in 2014 issued revised Supplemental Guidance documenting the calculation of updated TQs for approximately 100 radionuclides listed in DOE-STD-1027-92, CN-1. The calculations documented in this report complement the NNSA effort by expanding the set of radionuclides to more than 1,250 radionuclides with a published TQ. The development of this report was sponsored by the Department of Energy’s Office of Nuclear Safety (AU-30) within the Associate Under Secretary for Environment, Health, Safety, and Security organization.

  7. Ecological Monitoring and Compliance Program 2015 Report

    Energy Technology Data Exchange (ETDEWEB)

    Hall, Derek B. [National Security Technologies, LLC. (NSTec), Las Vegas, NV (United States); Ostler, W. Kent [National Security Technologies, LLC. (NSTec), Las Vegas, NV (United States); Anderson, David C. [National Security Technologies, LLC. (NSTec), Las Vegas, NV (United States); Greger, Paul D. [National Security Technologies, LLC. (NSTec), Las Vegas, NV (United States)

    2016-01-01

    The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2015. Program activities included (a) biological surveys at proposed activity sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, and (f) habitat restoration monitoring. During 2015, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.

  8. Ecological Monitoring and Compliance Program 2016 Report

    Energy Technology Data Exchange (ETDEWEB)

    Hall, Derek [National Security Technologies, LLC. (NSTec), Mercury, NV (United States); Perry, Jeanette [National Security Technologies, LLC. (NSTec), Mercury, NV (United States); Ostler, W. Kent [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-06

    The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2016. Program activities included (a) biological surveys at proposed activity sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, and (f) habitat restoration monitoring. During 2016, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.

  9. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  10. Twenty-Five Year Site Plan FY2013 - FY2037

    Energy Technology Data Exchange (ETDEWEB)

    Jones, William H. [Los Alamos National Laboratory

    2012-07-12

    Los Alamos National Laboratory (the Laboratory) is the nation's premier national security science laboratory. Its mission is to develop and apply science and technology to ensure the safety, security, and reliability of the United States (U.S.) nuclear stockpile; reduce the threat of weapons of mass destruction, proliferation, and terrorism; and solve national problems in defense, energy, and the environment. The fiscal year (FY) 2013-2037 Twenty-Five Year Site Plan (TYSP) is a vital component for planning to meet the National Nuclear Security Administration (NNSA) commitment to ensure the U.S. has a safe, secure, and reliable nuclear deterrent. The Laboratory also uses the TYSP as an integrated planning tool to guide development of an efficient and responsive infrastructure that effectively supports the Laboratory's missions and workforce. Emphasizing the Laboratory's core capabilities, this TYSP reflects the Laboratory's role as a prominent contributor to NNSA missions through its programs and campaigns. The Laboratory is aligned with Nuclear Security Enterprise (NSE) modernization activities outlined in the NNSA Strategic Plan (May 2011) which include: (1) ensuring laboratory plutonium space effectively supports pit manufacturing and enterprise-wide special nuclear materials consolidation; (2) constructing the Chemistry and Metallurgy Research Replacement Nuclear Facility (CMRR-NF); (3) establishing shared user facilities to more cost effectively manage high-value, experimental, computational and production capabilities; and (4) modernizing enduring facilities while reducing the excess facility footprint. Th is TYSP is viewed by the Laboratory as a vital planning tool to develop an effi cient and responsive infrastructure. Long range facility and infrastructure development planning are critical to assure sustainment and modernization. Out-year re-investment is essential for sustaining existing facilities, and will be re-evaluated on an annual

  11. 78 FR 46309 - Rules of Administrative Finality

    Science.gov (United States)

    2013-07-31

    ...-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA 2013-0011] Rules of Administrative Finality AGENCY: Social Security Administration (SSA) ACTION: Notice and request for comments...

  12. 48 CFR 3028.106 - Administration.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Administration. 3028.106 Section 3028.106 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY... 3028.106 Administration. ...

  13. 2017 Annual Terrestrial Sampling Plan for Sandia National Laboratories/New Mexico on Kirtland Air Force Base

    Energy Technology Data Exchange (ETDEWEB)

    Griffith, Stacy R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The 2017 Annual Terrestrial Sampling Plan for Sandia National Laboratories/New Mexico on Kirtland Air Force Base has been prepared in accordance with the “Letter of Agreement Between Department of Energy, National Nuclear Security Administration, Sandia Field Office (DOE/NNSA/SFO) and 377th Air Base Wing (ABW), Kirtland Air Force Base (KAFB) for Terrestrial Sampling” (signed January 2017), Sandia National Laboratories, New Mexico (SNL/NM). The Letter of Agreement requires submittal of an annual terrestrial sampling plan.

  14. 2018 Annual Terrestrial Sampling Plan for Sandia National Laboratories/New Mexico on Kirtland Air Force Base.

    Energy Technology Data Exchange (ETDEWEB)

    Griffith, Stacy R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2018-01-01

    The 2018 Annual Terrestrial Sampling Plan for Sandia National Laboratories/New Mexico on Kirtland Air Force Base has been prepared in accordance with the “Letter of Agreement Between Department of Energy, National Nuclear Security Administration, Sandia Field Office (DOE/NNSA/SFO) and 377th Air Base Wing (ABW), Kirtland Air Force Base (KAFB) for Terrestrial Sampling” (signed January 2017), Sandia National Laboratories, New Mexico (SNL/NM). The Letter of Agreement requires submittal of an annual terrestrial sampling plan.

  15. AMS National Reachback Capability - New Tools for Helping Emergency Responders

    International Nuclear Information System (INIS)

    Wasiolek, Piotr; Lyons, Craig

    2008-01-01

    The Remote Sensing Laboratory's (RSL) Aerial Measuring System (AMS) is one of the emergency response assets belonging to the U.S. Department of Energy (DOE) National Nuclear Security Administration (NNSA). The AMS is used to detect, measure, and track radioactive material before and during emergencies to locate sources or determine contamination levels. Since September 11, 2001, increasing numbers of local, state, and federal entities have developed aerial radiation detection capabilities. NNSA has recognized a need by these entities for an AMS Reachback Center that would provide training and assistance on all aspects of AMS. The Center will assist local, state, and federal agencies in establishing the skills, resources, and training needed for a successful AMS regional operation. Beginning in January 2008, and continuing through April 2008, a pilot program was created in collaboration between NNSA and the U.S. Department of Homeland Security's Domestic Nuclear Detection Office (DNDO). The purpose of this collaboration was to provide aerial radiological surveillance and equipment technique training to local law enforcement offices in four major U.S. cities: Chicago, Washington DC, New York, and Los Angeles. The Mobile Aerial Radiological Surveillance (MARS) training curriculum was jointly developed by NNSA and DNDO headquarters and NNSA support teams. A total of 44 students participated in the training events held during this period. The positive reaction to this program has led to the establishment of the RSL as the headquarters for the National Aerial Measuring System Reachback (NAMSR) Center. The NAMSR Center will provide an AMS Home Team stand-by duty team for local, state, and federal agencies to discuss, plan, and analyze available data for aerial responses. An additional role of the Center will be to serve as the source of subject matter experts (SME) for the training of newly established aerial radiological monitoring assets. The purpose of this paper is to

  16. 2016 Annual Site Environmental Report Sandia National Laboratories/New Mexico.

    Energy Technology Data Exchange (ETDEWEB)

    Salas, Angela Maria [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Griffith, Stacy R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-07-01

    Sandia National Laboratories (SNL) is a multimission laboratory managed and operated by National Technology & Engineering Solutions of Sandia, LLC, a wholly owned subsidiary of Honeywell International Inc., for the U.S. Department of Energy’s (DOE’s), National Nuclear Security Administration (NNSA). The DOE/NNSA Sandia Field Office administers the contract and oversees contractor operations at SNL, New Mexico. This Annual Site Environmental Report (ASER) summarizes data and the compliance status of sustainability, environmental protection, and monitoring programs at SNL/NM during calendar year 2016. Major environmental programs include air quality, water quality, groundwater protection, terrestrial and ecological surveillance, waste management, pollution prevention, environmental restoration, oil and chemical spill prevention, and implementation of the National Environmental Policy Act. This ASER is prepared in accordance with and required by DOE O 231.1B, Admin Change 1, Environment, Safety, and Health Reporting.

  17. International topical meeting on research reactor fuel management (RRFM) - United States foreign research reactor (FRR) spent nuclear fuel (SNF) acceptance program: 2010 update

    International Nuclear Information System (INIS)

    Messick, C.E.; Taylor, J.L.; Niehus, M.T.; Landers, C.

    2010-01-01

    The Nuclear Weapons Nonproliferation Policy Concerning Foreign Research Reactor Spent Nuclear Fuel, adopted by the United States Department of Energy (DOE), in consultation with the Department of State (DOS) in May 1996, scheduled to expire May 12, 2016, to return research reactor fuel until May 12, 2019 to the U.S. is in its fourteenth year. This paper provides a brief update on the program, part of the National Nuclear Security Administration (NNSA), and discusses program initiatives and future activities. The goal of the program continues to be recovery of U.S.-origin nuclear materials, which could otherwise be used in weapons, while assisting other countries to enjoy the benefits of nuclear technology. The NNSA is seeking feedback from research reactor operators to help us understand ways to include eligible research reactors who have not yet participated in the program. (author)

  18. The Changing Adventures of Mixed Low-Level Waste Disposal at the Nevada Test Site

    International Nuclear Information System (INIS)

    2007-01-01

    After a 15-year hiatus, the United States Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO) began accepting DOE off-site generated mixed low-level radioactive waste (MLLW) for disposal at the Nevada Test Site (NTS) in December 2005. This action was predicated on the acceptance by the Nevada Division of Environmental Protection (NDEP) of a waste analysis plan (WAP). The NNSA/NSO agreed to limit mixed waste disposal to 20,000 cubic meters (approximately 706,000 cubic feet) and close the facility by December 2010 or sooner, if the volume limit is reached. The WAP and implementing procedures were developed based on Hanford?s system of verification to the extent possible so the two regional disposal sites could have similar processes. Since the NNSA/NSO does not have a breaching facility to allow the opening of boxes at the site, verification of the waste occurs by visual inspection at the generator/treatment facility or by Real-Time-Radiography (RTR) at the NTS. This system allows the NTS to effectively, efficiently, and compliantly accept MLLW for disposal. The WAP, NTS Waste Acceptance Criteria, and procedures have been revised based on learning experiences. These changes include: RTR expectations; visual inspection techniques; tamper-indicating device selection; void space requirements; and chemical screening concerns. The NNSA/NSO, NDEP, and the generators have been working together throughout the debugging of the verification processes. Additionally, the NNSA/NSO will continue to refine the MLLW acceptance processes and strive for continual improvement of the program

  19. Nevada Test Site Environmental Report 2007 Summary

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills

    2008-09-01

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada Test Site (NTS). The NTS is the nation's historical testing site for nuclear weapons from 1951 through 1992 and is currently the nation's unique site for ongoing national-security related missions and high-risk operations. NNSA/NSO strives to provide to the public an understanding of the current activities on the NTS, including environmental monitoring and compliance activities aimed at protecting the public and the environment from radiation hazards and from nonradiological impacts. This document is a summary of the Nevada Test Site Environmental Report (NTSER) for calendar year 2007 (see attached compact disc on inside back cover). The NTSER is a comprehensive report of environmental activities performed at the NTS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. To provide an abbreviated and more readable version of the NTSER, this summary report is produced. This summary does not include detailed data tables, monitoring methods or design, a description of the NTS environment, or a discussion of all environmental program activities performed throughout the year. The reader may obtain a hard copy of the full NTSER as directed on the inside front cover of this summary report.

  20. 34 CFR 668.36 - Social security number.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Social security number. 668.36 Section 668.36 Education... Islands, and the Republic of Palau, the Secretary attempts to confirm the social security number a student... Security Administration. If the Social Security Administration confirms that number, the Secretary notifies...

  1. Oak Ridge National Laboratory Office of International Nuclear Safeguards: Human Capital Development Activity in FY16

    International Nuclear Information System (INIS)

    Gilligan, Kimberly V.; Gaudet, Rachel N.

    2016-01-01

    In 2007, the U.S. Department of Energy National Nuclear Security Administration (DOE NNSA) Office of Nonproliferation and Arms Control (NPAC) completed a comprehensive review of the current and potential future challenges facing the international safeguards system. One of the report's key recommendations was for DOE NNSA to launch a major new program to revitalize the international safeguards technology and human resource base. In 2007, at the International Atomic Energy Agency (IAEA) General Conference, then Secretary of Energy Samuel W. Bodman announced the newly created Next Generation Safeguards Initiative (NGSI). NGSI consists of five program elements: policy development and outreach, concepts and approaches, technology and analytical methodologies, human capital development (HCD), and infrastructure development. This report addresses the HCD component of NGSI. The goal of the HCD component as defined in the NNSA Program Plan is ''to revitalize and expand the international safeguards human capital base by attracting and training a new generation of talent.'' The major objectives listed in the HCD goal include education and training, outreach to universities and professional societies, postdoctoral appointments, and summer internships at national laboratories.

  2. Oak Ridge National Laboratory Office of International Nuclear Safeguards: Human Capital Development Activity in FY16

    Energy Technology Data Exchange (ETDEWEB)

    Gilligan, Kimberly V. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Nuclear Security and Isotope Technology Division; Gaudet, Rachel N. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Nuclear Security and Isotope Technology Division

    2016-09-30

    In 2007, the U.S. Department of Energy National Nuclear Security Administration (DOE NNSA) Office of Nonproliferation and Arms Control (NPAC) completed a comprehensive review of the current and potential future challenges facing the international safeguards system. One of the report’s key recommendations was for DOE NNSA to launch a major new program to revitalize the international safeguards technology and human resource base. In 2007, at the International Atomic Energy Agency (IAEA) General Conference, then Secretary of Energy Samuel W. Bodman announced the newly created Next Generation Safeguards Initiative (NGSI). NGSI consists of five program elements: policy development and outreach, concepts and approaches, technology and analytical methodologies, human capital development (HCD), and infrastructure development. This report addresses the HCD component of NGSI. The goal of the HCD component as defined in the NNSA Program Plan is “to revitalize and expand the international safeguards human capital base by attracting and training a new generation of talent.” The major objectives listed in the HCD goal include education and training, outreach to universities and professional societies, postdoctoral appointments, and summer internships at national laboratories.

  3. Ecological Monitoring and Compliance Program 2008 Report

    Energy Technology Data Exchange (ETDEWEB)

    Hansen, Dennis J.; Anderson, David C.; Hall, Derek B.; Greger, Paul D.; Ostler, W. Kent

    2009-04-30

    The Ecological Monitoring and Compliance Program, funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), monitors the ecosystem of the Nevada Test Site (NTS) and ensures compliance with laws and regulations pertaining to NTS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2008. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem mapping and data management, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat monitoring, (g) habitat restoration monitoring, and (h) monitoring of the Nonproliferation Test and Evaluation Complex (NPTEC).

  4. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... transportation operators, flight students, and others, where appropriate, for services related to security threat.... Enforce safety- and security-related regulations and requirements; 3. Assess and distribute intelligence...

  5. Network Security: What Non-Technical Administrators Must Know

    Science.gov (United States)

    Council, Chip

    2005-01-01

    Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…

  6. DOE Human Reliability Program Removals Report 2004-2006

    International Nuclear Information System (INIS)

    Center for Human Reliability Studies

    2007-01-01

    This report presents results of the comprehensive data analysis and assessment of all U.S. Department of Energy (DOE) and National Nuclear Security Administration (NNSA) facilities that have positions requiring workers to be certified in the Human Reliability Program (HRP). Those facilities include: Albuquerque, Amarillo, DOE Headquarters, Hanford, Idaho, Nevada, Oak Ridge, Oakland, and Savannah River. The HRP was established to ensure, through continuous review and evaluation, the reliability of individuals who have access to the DOE's most sensitive facilities, materials, and information

  7. Ecological Monitoring and Compliance Program 2010 Report

    Energy Technology Data Exchange (ETDEWEB)

    Hansen, D.J.; Anderson, D.C.; Hall, D.B.; Greger, P.D.; Ostler, W.K.

    2011-07-01

    The Ecological Monitoring and Compliance (EMAC) Program, funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2010. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat restoration monitoring, and (g) monitoring of the Nonproliferation Test and Evaluation Complex (NPTEC). During 2010, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.

  8. Ecological Monitoring and Compliance Program 2013 Report

    Energy Technology Data Exchange (ETDEWEB)

    Hall, Derek B. [National Security Technologies, LLC, Las Vegas, NV (United States); Anderson, David C. [National Security Technologies, LLC, Las Vegas, NV (United States); Greger, Paul D. [National Security Technologies, LLC, Las Vegas, NV (United States)

    2014-07-01

    The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO, formerly Nevada Site Office), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2013. Program activities included (a) biological surveys at proposed activity sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, and (f) habitat restoration monitoring. During 2013, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.

  9. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  10. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  11. Preserving Nuclear Grade Knowledge

    Energy Technology Data Exchange (ETDEWEB)

    Lange, Bob

    2008-02-05

    When people think of the government they think of the President, or Congress, or the Internal Revenue Service (IRS), but there are thousands of people in government-related jobs doing things most don’t really notice everyday. You can find them everywhere, from the space science folks at NASA, to the Federal Bureau of Investigations (FBI) watching out for the bad guys. There are Rangers, and Social Workers, Nurses and Agricultural Managers. They are people working to keep the many facets of the USA rolling. One very diverse bunch is The Department of Energy (DOE) , a group who is expanding the ways we make and save energy to power our cars, homes, and businesses. Tucked away under the DOE is the National Nuclear Security Administration, the NNSA is an agency that maintains the safety, security, and reliability of the U.S. nuclear weapons stockpile. It works to reduce global danger from weapons of mass destruction. It provides the U.S. Navy with safe nuclear propulsion, and it responds to nuclear and radiological emergencies in the United States and abroad, and it supports efforts in science and technology*. (* DOE/NNSA/KCP website info)

  12. Annual Site Environmental Report Sandia National Laboratories, Albuquerque, New Mexico, Calendar year 2007

    Energy Technology Data Exchange (ETDEWEB)

    Agogino, Karen [National Nuclear Security Administration (NNSA), Washington, DC (United States); Sanchez, Rebecca [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-09-30

    Sandia National Laboratories, New Mexico (SNL/NM) is a government-owned/contractor-operated facility. Sandia Corporation (Sandia), a wholly owned subsidiary of Lockheed Martin Corporation, manages and operates the laboratory for the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA). The DOE/NNSA Sandia Site Office (SSO) administers the contract and oversees contractor operations at the site. This annual report summarizes data and the compliance status of Sandia Corporation’s environmental protection and monitoring programs through December 31, 2007. Major environmental programs include air quality, water quality, groundwater protection, terrestrial surveillance, waste management, pollution prevention (P2), environmental restoration (ER), oil and chemical spill prevention, and implementation of the National Environmental Policy Act (NEPA). Environmental monitoring and surveillance programs are required by DOE Order 450.1, Environmental Protection Program (DOE 2007a) and DOE Manual 231.1-1A, Environment, Safety, and Health Reporting (DOE 2007).

  13. Y-12 Site Sustainability Plan

    Energy Technology Data Exchange (ETDEWEB)

    Spencer, Charles G

    2012-12-01

    The accomplishments to date and the long-range planning of the Y-12 Energy Management and Sustainability and Stewardship programs support the U.S. Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) vision for a commitment to energy effi ciency and sustainability and to achievement of the Guiding Principles. Specifi cally, the Y-12 vision is to support the Environment, Safety and Health Policy and the DOE Strategic Sustainability Performance Plan, while promoting overall sustainability and reduction of greenhouse gas emissions. The mission of the Y-12 Energy Management program is to incorporate energy-effi cient technologies site-wide and to position Y-12 to meet NNSA energy requirement needs through 2025 and beyond. The plan addresses greenhouse gases, buildings, fleet management, water use, pollution prevention, waste reduction, sustainable acquisition, electronic stewardship and data centers, site innovation and government-wide support.

  14. Practical Unix and Internet Security

    CERN Document Server

    Garfinkel, Simson; Spafford, Gene

    2003-01-01

    When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world. Focusing on the four most popular Unix varia

  15. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  16. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  17. 77 FR 1971 - Supplemental Security Income and Homeless Individuals

    Science.gov (United States)

    2012-01-12

    ... visit our Internet site, Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0087] Supplemental Security Income and Homeless Individuals AGENCY: Social Security Administration. ACTION: Notice; Request for Comments. SUMMARY...

  18. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  19. Japanese Prime Minister Shinzo Abe’s Two Administrations: Successes and Failures of Domestic and Security Policies

    Science.gov (United States)

    2016-12-01

    parties as well. It seemed also difficult to make coalitions among the opposition parties, with their diverse political identities , to win a district...explanations for Abe’s political success in his second administration. Abe’s pragmatism in statecraft mainly originated from his own political experiences...and was crucial for accumulating his political capital and realizing security policy. At the domestic level, political influence from former

  20. Health Information Security in Hospitals: the Application of Security Safeguards.

    Science.gov (United States)

    Mehraeen, Esmaeil; Ayatollahi, Haleh; Ahmadi, Maryam

    2016-02-01

    A hospital information system has potentials to improve the accessibility of clinical information and the quality of health care. However, the use of this system has resulted in new challenges, such as concerns over health information security. This paper aims to assess the status of information security in terms of administrative, technical and physical safeguards in the university hospitals. This was a survey study in which the participants were information technology (IT) managers (n=36) who worked in the hospitals affiliated to the top ranked medical universities (university A and university B). Data were collected using a questionnaire. The content validity of the questionnaire was examined by the experts and the reliability of the questionnaire was determined using Cronbach's coefficient alpha (α=0.75). The results showed that the administrative safeguards were arranged at a medium level. In terms of the technical safeguards and the physical safeguards, the IT managers rated them at a strong level. According to the results, among three types of security safeguards, the administrative safeguards were assessed at the medium level. To improve it, developing security policies, implementing access control models and training users are recommended.

  1. Monitoring Potential Transport of Radioactive Contaminants in Shallow Ephemeral Channels

    International Nuclear Information System (INIS)

    Miller Julianne J.; Mizell Steve A.; Nikolich George; Campbell Scott A.

    2012-01-01

    The U.S. Department of Energy (DOE) National Nuclear Security Administration (NNSA), Nevada Site Office (NSO), Environmental Restoration Soils Activity has authorized the Desert Research Institute (DRI) to conduct field assessments of potential sediment transport of contaminated soil from Corrective Action Unit (CAU) 550, Area 8 Smoky Contamination Area (CA), during precipitation runoff events. CAU 550 includes Corrective Action Sites (CASs) 08-23-03, 08-23-04, 08-23-06, and 08-23-07; these CASs are associated with tests designated Ceres, Smoky, Oberon, and Titania, respectively.

  2. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  3. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  4. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  5. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  6. Evaluation Report on The Department's Unclassified Cyber Security Program - 2009

    International Nuclear Information System (INIS)

    Anon

    2009-01-01

    defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to

  7. 28 CFR 501.2 - National security cases.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is a...

  8. Operations Plan for Support Network Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report describes the operational processes and strategies that are building a support network for the National Security Technology Incubator (NSTI) program. The NSTI program currently is under development as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA) Grant No. DE FG52-07NA28084. Although the NSTI program offers a wide array of in-house business services, there are a certain number of services that will be provided by entities outside of Arrowhead Center. This report identifies the steps needed to develop an appropriate support network. The Arrowhead Center is working with external service providers and key stakeholders to establish feasible referral and implementation mechanics offering NSTI program participants the most comprehensive incubation services possible.

  9. Ecological Monitoring and Compliance Program 2012 Report

    Energy Technology Data Exchange (ETDEWEB)

    Hall, Derek B.; Anderson, David C.; Greger, Paul D.; Ostler, W. Kent; Hansen, Dennis J.

    2013-07-03

    The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO, formerly Nevada Site Office), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2012. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat restoration monitoring, and (g) monitoring of the Nonproliferation Test and Evaluation Complex (NPTEC). During 2012, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.

  10. Achievements in testing of the MGA and FRAM isotopic software codes under the DOE/NNSA-IRSN cooperation of gamma-ray isotopic measurement systems

    International Nuclear Information System (INIS)

    Vo, Duc; Wang, Tzu-Fang; Funk, Pierre; Weber, Anne-Laure; Pepin, Nicolas; Karcher, Anna

    2009-01-01

    DOE/NNSA and IRSN collaborated on a study of gamma-ray instruments and analysis methods used to perform isotopic measurements of special nuclear materials. The two agencies agreed to collaborate on the project in response to inconsistencies that were found in the various versions of software and hardware used to determine the isotopic abundances of uranium and plutonium. IRSN used software developed internally to test the MGA and FRAM isotopic analysis codes for criteria used to stop data acquisition. The stop-criterion test revealed several unusual behaviors in both the MGA and FRAM software codes.

  11. Closure Report for Corrective Action Unit 539: Areas 25 and 26 Railroad Tracks Nevada National Security Site, Nevada, Revision 0

    International Nuclear Information System (INIS)

    Kauss, Mark

    2011-01-01

    This Closure Report (CR) presents information supporting the closure of Corrective Action Unit (CAU) 539: Areas 25 and 26 Railroad Tracks, Nevada National Security Site, Nevada. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; U.S. Department of Energy (DOE), Environmental Management; U.S. Department of Defense; and DOE, Legacy Management. The corrective action sites (CASs) within CAU 539 are located within Areas 25 and 26 of the Nevada National Security Site. Corrective Action Unit 539 comprises the following CASs: (1) 25-99-21, Area 25 Railroad Tracks; and (2) 26-99-05, Area 26 Railroad Tracks The purpose of this CR is to provide documentation supporting the completed corrective actions and provide data confirming that the closure objectives for CASs within CAU 539 were met. To achieve this, the following actions were performed: (1) Reviewed documentation on historical and current site conditions, including the concentration and extent of contamination; (2) Conducted radiological walkover surveys of railroad tracks in both Areas 25 and 26; (3) Collected ballast and soil samples and calculated internal dose estimates for radiological releases; (4) Collected in situ thermoluminescent dosimeter measurements and calculated external dose estimates for radiological releases; (5) Removed lead bricks as potential source material (PSM) and collected verification samples; (6) Implemented corrective actions as necessary to protect human health and the environment; (7) Properly disposed of corrective action and investigation wastes; and (8) Implemented an FFACO use restriction (UR) for radiological contamination at CAS 25-99-21. The approved UR form and map are provided in Appendix F and will be filed in the DOE, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Facility Information Management System; the FFACO database; and the NNSA/NSO CAU/CAS files. From

  12. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... security screening and identity verification of individuals, including identification media and identifying... undergoing screening of their person (including identity verification) or property; individuals against whom... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  13. 6 CFR 13.44 - Right to administrative offset.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Right to administrative offset. 13.44 Section 13.44 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.44 Right to administrative offset. The amount of any penalty or assessment that has become...

  14. Calendar Year 2009 Annual Site Environmental Report for Sandia National Laboratories, New Mexico

    Energy Technology Data Exchange (ETDEWEB)

    Armstrong, Karen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bailey-White, Brenda [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bonaguidi, Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Brown, Mendy [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Byrd, Caroline [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Cabble, Kevin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Castillo, Dave [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Coplen, Amy [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Curran, Kelsey [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Deola, Regina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Duran, Leroy [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Eckstein, Joanna [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evelo, Stacie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Fitzgerald, Tanja [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); French, Chris [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gerard, Morgan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzales, Linda [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gorman, Susan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jackson, Timothy [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jarry, Jeff [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lauffer, Franz [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mauser, Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mayeux, Lucie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); McCord, Samuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Miller, Mark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Oborny, Stephanie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Perini, Robin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Puissant, Pamela [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Reiser, Anita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Roma, Charles [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Salinas, Stephanie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skelly, Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ullrich, Rebecca [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Wagner, Katrina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Wrons, Ralph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2010-09-30

    Sandia National Laboratories, New Mexico (SNL/NM) is a government-owned/contractor operated facility. Sandia Corporation (Sandia), a wholly owned subsidiary of Lockheed Martin Corporation (LMC), manages and operates the laboratory for the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA). The DOE/NNSA, Sandia Site O ffice (SSO) administers the contract and oversees contractor operations at the site. This annual report summarizes data and the compliance status of Sandia Corporation’s environmental protection and monitoring programs through December 31, 2009. Major environmental programs include air quality, water quality, groundwater protection, terrestrial surveillance, waste management, pollution prevention (P2), environmental restoration (ER), oil and chemical spill prevention, and implementation of the National Environmental Policy Act (NEPA). Environmental monitoring and surveillance programs are required by DOE Order 450.1A, Environmental Protection Program (DOE 2008a) and DOE Manual 231.1-1A, Environment, Safety, and Health Reporting (DOE 2007).

  15. Y-12 Site Sustainability Plan

    Energy Technology Data Exchange (ETDEWEB)

    Erhart, Steven C. [National Nuclear Security Administration (NNSA), Washington, DC (United States); Spencer, Charles G. [Y-12 National Security Complex, Oak Ridge, TN (United States)

    2013-12-01

    The accomplishments to date and the long-range planning of the Y-12 Energy Management and Sustainability and Stewardship programs support the U.S. Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) vision for a commitment to energy effi ciency and sustainability and to achievement of the Guiding Principles. Specifi cally, the Y-12 vision is to support the Environment, Safety and Health Policy and the DOE Strategic Sustainability Performance Plan (SSPP), while promoting overall sustainability and reduction of greenhouse gas (GHG) emissions. The mission of the Y-12 Energy Management program is to incorporate energy-efficient technologies site-wide and to position Y-12 to meet NNSA energy requirement needs through 2025 and beyond. This plan addresses: Greenhouse Gas Reduction and Comprehensive Greenhouse Gas Inventory; Buildings, ESPC Initiative Schedule, and Regional and Local Planning; Fleet Management; Water Use Efficiency and Management; Pollution Prevention and Waste Reduction; Sustainable Acquisition; Electronic Stewardship and Data Centers; Renewable Energy; Climate Change; and Budget and Funding.

  16. 28 CFR 700.24 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...

  17. Nevada Test Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    Radiological Control Managers' Council, Nevada Test Site

    2007-08-09

    Title 10 Code of Federal Regulations (CFR) 835, 'Occupational Radiation Protection', establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada Test Site (NTS), related (onsite or offsite) DOE National Nuclear Security Administration Nevada Site Office (NNSA/NSO) operations, and environmental restoration offsite projects.

  18. Nevada Test Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    U. S. Department of Energy, National Nuclear Security Administration Nevada Site Office

    2005-01-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) waste acceptance criteria (WAC). The WAC provides the requirements, terms, and conditions under which the Nevada Test Site (NTS) will accept low-level radioactive (LLW) and mixed waste (MW) for disposal. It includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NTS Area 3 and Area 5 Radioactive Waste Management Complex (RWMC) for storage or disposal

  19. 36 CFR 1275.22 - Security.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Security. 1275.22 Section... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials. ...

  20. Security and Office Administration Coordinator | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Under the supervision of the Manager, Local Operations (MLO), the Security and ... Sees to the continuous updating and relevance of the Business Continuity Plan ... BCP to local management (Manager and Regional Director) and to the Head ...

  1. 26 CFR 301.7701-11 - Social security number.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...

  2. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  3. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  4. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  5. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  6. 14 CFR 460.53 - Security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Security. 460.53 Section 460.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....53 Security. An operator must implement security requirements to prevent any space flight participant...

  7. 76 FR 65558 - Rescission of Social Security Ruling 97-2p

    Science.gov (United States)

    2011-10-21

    ...-800-325-0778, or visit our Internet site, Social Security Online, at http://www.socialsecurity.gov... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2007-0092] Rescission of Social Security Ruling 97-2p AGENCY: Social Security Administration. ACTION: Notice of rescission of Social Security Ruling...

  8. The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report

    International Nuclear Information System (INIS)

    Bragg-Sitton, S.; Bess, J.; Werner, J.

    2011-01-01

    The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

  9. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... their official duties. The computer system also maintains a real-time audit of individuals who access... Secure Flight Program regulations \\4\\ for the purpose of enhancing the security of air travel in the... detection of individuals on federal government watch lists who seek to travel by air, and to facilitate the...

  10. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  11. Underground Test Area Fiscal Year 2014 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan

    2015-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities from October 1, 2013, through September 30, 2014 (fiscal year [FY] 2014). All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); National Security Technologies, LLC (NSTec); Navarro-Intera, LLC (N-I); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2014. The activities included conducting oversight assessments for QAP compliance, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. UGTA Activity participants conducted 25 assessments on topics including safe operations, QAP compliance, activity planning, and sampling. These assessments are summarized in Section 2.0. Corrective actions tracked in FY 2014 are presented in Appendix A. Laboratory performance was evaluated based on three approaches: (1) established performance evaluation programs (PEPs), (2) interlaboratory comparisons, or (3) data review. The results of the laboratory performance evaluations, and interlaboratory comparison results are summarized in Section 4.0. The UGTA Activity published three public documents and a variety of other publications in FY 2014. The titles, dates, and main authors are identified in Section 5.0. The Contract Managers, Corrective Action Unit (CAU) Leads, Preemptive Review (PER) Committee members, and Topical Committee members are listed by name and organization in Section 6.0. Other activities that affected UGTA quality are discussed in Section 7.0. Section 8.0 provides the FY 2014 UGTA QA program conclusions, and Section 9.0 lists the references not identified in Section 5.0.

  12. MICRO-SEISMOMETERS VIA ADVANCED MESO-SCALE FABRICATION

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, Caesar A; Onaran, Guclu; Avenson, Brad; Hall, Neal

    2014-11-07

    The Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) seek revolutionary sensing innovations for the monitoring of nuclear detonations. Performance specifications are to be consistent with those obtainable by only an elite few products available today, but with orders of magnitude reduction in size, weight, power, and cost. The proposed commercial innovation calls upon several technologies including the combination of meso-scale fabrication and assembly, photonics-based displacement / motion detection methods, and the use of digital control electronics . Early Phase II development has demonstrated verified and repeatable sub 2ng noise floor from 3Hz to 100Hz, compact integration of 3-axis prototypes, and robust deployment exercises. Ongoing developments are focusing on low frequency challenges, low power consumption, ultra-miniature size, and low cross axis sensitivity. We are also addressing the rigorous set of specifications required for repeatable and reliable long-term explosion monitoring, including thermal stability, reduced recovery time from mass re-centering and large mechanical shocks, sensitivity stability, and transportability. Successful implementation will result in small, hand-held demonstration units with the ability to address national security needs of the DOE/NNSA. Additional applications envisioned include military/defense, scientific instrumentation, oil and gas exploration, inertial navigation, and civil infrastructure monitoring.

  13. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  14. Closure Report for Corrective Action Unit 539: Areas 25 and 26 Railroad Tracks Nevada National Security Site, Nevada with ROTC-1, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Mark Kauss

    2011-06-01

    This Closure Report (CR) presents information supporting the closure of Corrective Action Unit (CAU) 539: Areas 25 and 26 Railroad Tracks, Nevada National Security Site, Nevada. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; U.S. Department of Energy (DOE), Environmental Management; U.S. Department of Defense; and DOE, Legacy Management. The corrective action sites (CASs) within CAU 539 are located within Areas 25 and 26 of the Nevada National Security Site. Corrective Action Unit 539 comprises the following CASs: • 25-99-21, Area 25 Railroad Tracks • 26-99-05, Area 26 Railroad Tracks The purpose of this CR is to provide documentation supporting the completed corrective actions and provide data confirming that the closure objectives for CASs within CAU 539 were met. To achieve this, the following actions were performed: • Reviewed documentation on historical and current site conditions, including the concentration and extent of contamination. • Conducted radiological walkover surveys of railroad tracks in both Areas 25 and 26. • Collected ballast and soil samples and calculated internal dose estimates for radiological releases. • Collected in situ thermoluminescent dosimeter measurements and calculated external dose estimates for radiological releases. • Removed lead bricks as potential source material (PSM) and collected verification samples. • Implemented corrective actions as necessary to protect human health and the environment. • Properly disposed of corrective action and investigation wastes. • Implemented an FFACO use restriction (UR) for radiological contamination at CAS 25-99-21. The approved UR form and map are provided in Appendix F and will be filed in the DOE, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Facility Information Management System; the FFACO database; and the NNSA/NSO CAU/CAS files. From November 29

  15. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Science.gov (United States)

    2010-07-01

    ... for National Security, who shall refer such questions to the Office of Legal Counsel, as appropriate... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security...

  16. Closure Report for Corrective Action Unit 568: Area 3 Plutonium Dispersion Sites Nevada National Security Site, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro, Las Vegas, NV (United States)

    2017-06-01

    The purpose of this CR is to provide documentation and justification that no further corrective action is needed for the closure of CAU 568 based on the implementation of corrective actions. This includes a description of closure activities that were performed and an evaluation of the verification data. The CAP (NNSA/NFO, 2016a) and ROTC-1 (NNSA/NFO, 2016c) provide information relating to the selection of CAAs and the reasoning behind their selection. The CADD (NNSA/NFO, 2015) identifies the release sites that require additional corrective action and presents information supporting the selection of CAAs.

  17. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ... Transportation Security Administration's (TSA) Frequent Traveler Program; examine evolving threats in cyber... Evolving Threats in Cyber Security. Basis for Closure: In accordance with Section 10(d) of the Federal... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0111] Homeland Security Advisory Council...

  18. Department of Homeland Security Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-04-26

    ... NUMERICAL LIMITATIONS Legal Authority: 8 USC 1184(g) Abstract: The Department of Homeland Security is... Stage Transportation Security Administration (TSA) 197. AIRCRAFT REPAIR STATION SECURITY Legal Authority.... MODIFICATION OF THE AVIATION SECURITY INFRASTRUCTURE FEE (ASIF) (MARKET SHARE) Legal Authority: 49 USC 44901...

  19. 25 CFR 40.4 - Security.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Security. 40.4 Section 40.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION ADMINISTRATION OF EDUCATIONAL LOANS, GRANTS AND OTHER ASSISTANCE FOR HIGHER EDUCATION § 40.4 Security. If a borrower or cosigner has security to offer for an...

  20. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  1. 77 FR 67724 - Rescission of Social Security Acquiescence Ruling 05-1(9)

    Science.gov (United States)

    2012-11-13

    ...-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0058] Rescission of Social Security Acquiescence Ruling 05-1(9) AGENCY: Social Security Administration. [[Page 67725

  2. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    .... 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment...

  3. Social security administration in India- study of provident funds and pension scheme

    OpenAIRE

    Rao, Madhava P

    2005-01-01

    Social Security is becoming a distinct part of social policy of India and the time has come to give a serious thought to ever increasing Social Security needs of the population. There are diversified views on extension of Social Security coverage. Some say it should be limited to only working population and to their families and while others say that the entire population should be covered under Social Security programmes. Social Security schemes further have been branched out as protective...

  4. 14 CFR 1203.201 - Information security objectives.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  5. Privacy in confidential administrative micro data: implementing statistical disclosure control in a secure computing environment.

    Science.gov (United States)

    Hochfellner, Daniela; Müller, Dana; Schmucker, Alexandra

    2014-12-01

    The demand for comprehensive and innovative data is constantly growing in social science. In particular, micro data from various social security agencies become more and more attractive. In contrast to survey data, administrative data offer a census with highly reliable information but are restricted in their usage. To make them accessible for researchers, data or research output either have to be anonymized or released after disclosure review procedures have been used. This article discusses the trade-off between maintaining a high capability of research potential while protecting private information, by exploiting the data disclosure portfolio and the adopted disclosure strategies of the Research Data Center of the German Federal Employment Agency. © The Author(s) 2014.

  6. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  7. Sewer System Management Plan.

    Energy Technology Data Exchange (ETDEWEB)

    Holland, Robert C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    A Sewer System Management Plan (SSMP) is required by the State Water Resources Control Board (SWRCB) Order No. 2006-0003-DWQ Statewide General Waste Discharge Requirements (WDR) for Sanitary Sewer Systems (General Permit). DOE, National Nuclear Security Administration (NNSA), Sandia Field Office has filed a Notice of Intent to be covered under this General Permit. The General Permit requires a proactive approach to reduce the number and frequency of sanitary sewer overflows (SSOs) within the State. SSMPs must include provisions to provide proper and efficient management, operation, and maintenance of sanitary sewer systems and must contain a spill response plan.

  8. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  9. 10 CFR 725.24 - Administration.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Administration. 725.24 Section 725.24 Energy DEPARTMENT OF ENERGY PERMITS FOR ACCESS TO RESTRICTED DATA Permits § 725.24 Administration. With respect to each permit... designate a DOE or National Nuclear Security Administration office which will: (a) Process all personnel...

  10. Transparent Proxy for Secure E-Mail

    Science.gov (United States)

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  11. 12 CFR 605.501 - Information Security Officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  12. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  13. Social Security Number Replacement Card Applications filed via the Internet

    Data.gov (United States)

    Social Security Administration — The Social Security Administration (SSA) provides a variety of ways to conduct business with the agency. SSA offers members of the public the opportunity to request...

  14. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  15. 78 FR 5116 - NASA Information Security Protection

    Science.gov (United States)

    2013-01-24

    ... 2700-AD61 NASA Information Security Protection AGENCY: National Aeronautics and Space Administration..., projects, plans, or protection services relating to the national security; or (h) The development... implement the provisions of Executive Order (E.O.) 13526, Classified National Security Information, and...

  16. 15 CFR 742.4 - National security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States to...

  17. 7 CFR 1738.22 - Loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Loan security. 1738.22 Section 1738.22 Agriculture... RURAL BROADBAND ACCESS LOANS AND LOAN GUARANTEES Loan Purposes and Basic Policies § 1738.22 Loan security. (a) RUS makes loans only if, in the judgment of the Administrator, the security therefore is...

  18. Security of M-Commerce transactions

    OpenAIRE

    Ion IVAN; Daniel MILODIN; Alin ZAMFIROIU

    2013-01-01

    In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here’s how to analyze the security of M-commerce transactions and ways to increase security for these transactions taki...

  19. Succession planning for technical experts

    International Nuclear Information System (INIS)

    Kirk, Bernadette Lugue; Cain, Ronald A.; Dewji, Shaheen A.; Agreda, Carla L.

    2017-01-01

    This report describes a methodology for identifying, evaluating, and mitigating the loss of key technical skills at nuclear operations facilities. The methodology can be adapted for application within regulatory authorities and research and development organizations, and can be directly applied by international engagement partners of the Department of Energy’s National Nuclear Security Administration (NNSA). The resultant product will be of direct benefit to two types of NNSA missions: (1) domestic human capital development programs tasked to provide focused technical expertise to succeed an aging nuclear operations workforce, and (2) international safeguards programs charged with maintaining operational safeguards for developing/existing nuclear power program in nations where minimal available resources must be used effectively. This report considers succession planning and the critical skills necessary to meet an institution’s goals and mission. Closely tied to succession planning are knowledge management and mentorship. In considering succession planning, critical skill sets are identified and are greatly dependent on the subject matter expert in question. This report also provides examples of critical skills that are job specific.

  20. International topical meeting on research reactor fuel management (RRFM) - United States Foreign Research Reactor (FRR) Spent Nuclear Fuel (SNF) acceptance program: 2007 update

    International Nuclear Information System (INIS)

    Messick, C.E.; Taylor, J.L.

    2007-01-01

    The Nuclear Weapons Non-proliferation Policy Concerning Foreign Research Reactor Spent Nuclear Fuel, adopted by The United States Department of Energy (DOE), in consultation with the Department of State in May 1996, has been extended to expire May 12, 2016, providing an additional 10 years to return fuel to the U.S. This paper provides a brief update on the program, now transferred to the National Nuclear Security Administration (NNSA), and discusses program initiatives and future activities. The goal of the program continues to be recovery of nuclear materials (27 countries have participated so far, returning a total of 7620 spent nuclear fuel elements), which could otherwise be used in weapons, while assisting other countries to enjoy the benefits of nuclear technology. More than ever before, DOE and reactor operators need to work together to schedule shipments as soon as possible, to optimize shipment efficiency over the remaining years of the program. The NNSA is seeking feedback from research reactor operators to help us understand ways to include eligible reactor who have not yet participated in the program

  1. Succession planning for technical experts

    Energy Technology Data Exchange (ETDEWEB)

    Kirk, Bernadette Lugue [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Cain, Ronald A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Dewji, Shaheen A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Agreda, Carla L. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-07-01

    This report describes a methodology for identifying, evaluating, and mitigating the loss of key technical skills at nuclear operations facilities. The methodology can be adapted for application within regulatory authorities and research and development organizations, and can be directly applied by international engagement partners of the Department of Energy’s National Nuclear Security Administration (NNSA). The resultant product will be of direct benefit to two types of NNSA missions: (1) domestic human capital development programs tasked to provide focused technical expertise to succeed an aging nuclear operations workforce, and (2) international safeguards programs charged with maintaining operational safeguards for developing/existing nuclear power program in nations where minimal available resources must be used effectively. This report considers succession planning and the critical skills necessary to meet an institution’s goals and mission. Closely tied to succession planning are knowledge management and mentorship. In considering succession planning, critical skill sets are identified and are greatly dependent on the subject matter expert in question. This report also provides examples of critical skills that are job specific.

  2. 77 FR 15114 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2012-03-14

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice...

  3. 75 FR 2556 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2010-01-15

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day notice. SUMMARY: This notice...

  4. 49 CFR 176.162 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Security. 176.162 Section 176.162 Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION... Class 1 (Explosive) Materials Precautions During Loading and Unloading § 176.162 Security. A responsible...

  5. Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

    OpenAIRE

    Ayub Hussein Shirandula; Dr. G. Wanyembi; Mr. Maina karume

    2012-01-01

    Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that wer...

  6. Second Line of Defense Spares Program Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  7. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Science.gov (United States)

    2010-10-01

    ... threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR...

  8. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  9. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  10. Department of Homeland Security (DHS I-131)

    Data.gov (United States)

    Social Security Administration — This identifies resident aliens who should have their Supplemental Security Income benefit payment suspended because they have voluntarily left the United States for...

  11. Administrative corruption from sociology perspective and the relationship between administrative corruption and social security

    OpenAIRE

    Mohsen Zarei Jlyany; Gholam Reza Sharafi; Mustafa Tavani; Mansour Haghighatian; Moslem Tavani

    2014-01-01

    certain principles Observance and non- Observance on organizing a social system will have Indisputable effect at the Organization. And administrative systems are not exempt from this, also the selection of the Administration components and also How to Place the components together can affect its performance. Meanwhile, the government's role in the prevalence or no-prevalence, the extent type and the way of administrative corruption influence, in this article, researchers wants to explore the ...

  12. 15 CFR 756.2 - Appeal from an administrative action.

    Science.gov (United States)

    2010-01-01

    ... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS APPEALS... Industry and Security, U.S. Department of Commerce, Room 3898, 14th Street and Pennsylvania Avenue, NW... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Appeal from an administrative action...

  13. SELinux policy administration

    CERN Document Server

    Vermeulen, Sven

    2013-01-01

    A step-by-step guide to learn how to set up security on Linux servers by taking SELinux policies into your own hands.Linux administrators will enjoy the various SELinux features that this book covers and the approach used to guide the admin into understanding how SELinux works. The book assumes that you have basic knowledge in Linux administration, especially Linux permission and user management.

  14. 12 CFR 208.61 - Bank security procedures.

    Science.gov (United States)

    2010-01-01

    ... procedures for opening and closing for business and for the safekeeping of all currency, negotiable...; the cost of the security devices; other security measures in effect at the banking office; and the... directors on the implementation, administration, and effectiveness of the security program. (e) Reserve...

  15. Let's talk conflict: using mediation in healthcare security disputes.

    Science.gov (United States)

    Armstrong, Brad

    2013-01-01

    Healthcare security administrators face weekly, if not daily challenges and conflict. This article considers that security leaders must anticipate disputes in highly complex healthcare systems. When disputes cannot be resolved by organizational efforts, security administrators may be in a position to recommend or participate in mediation. Here the concept of mediation is introduced to healthcare security leaders as a viable means to resolve disputes with patients, visitors, and the community. This includes a description of the facilitative versus evaluative mediation processes, as well as pragmatic guidance when preparing for mediation.

  16. Management of refuelling, modifications and accidental shut-down of nuclear power plant

    International Nuclear Information System (INIS)

    1996-01-01

    This document is the appendix of HAF 0300 (91) 'Code on the Safety of Nuclear Power Plant Operation', which was promulgated by the National Nuclear Safety Administration (NNSA) on March 2, 1994, and has the same legal effect. This appendix is applicable to establish the administrative management procedures for refuelling, modifications and accidental shut-down in the period of operation of pressurized water thermal neutron reactor of nuclear power plants. The NNSA shall be responsible for interpretation of this document

  17. Online, Batch and CICS Social Security Statement

    Data.gov (United States)

    Social Security Administration — A database that contains client preference information for the SSA initiated Social Security Statement as well as other data including SSN, disposition for paper SS...

  18. 76 FR 68243 - Social Security Rulings, SSR 91-1c and SSR 66-18c; Rescission of Social Security Rulings (SSR) 66...

    Science.gov (United States)

    2011-11-03

    ..., Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: SSRs make available... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0068] Social Security Rulings, SSR 91-1c and SSR 66-18c; Rescission of Social Security Rulings (SSR) 66-18c and SSR 91-1c AGENCY: Social Security...

  19. 33 CFR 174.103 - Administration.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Administration. 174.103 Section 174.103 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED....103 Administration. The State casualty reporting system must be administered by a State agency that...

  20. 76 FR 40296 - Declassification of National Security Information

    Science.gov (United States)

    2011-07-08

    ... Declassification of National Security Information AGENCY: National Archives and Records Administration. ACTION... classified national security information in records transferred to NARA's legal custody. The rule incorporates changes resulting from issuance of Executive Order 13526, Classified National Security Information...

  1. 28 CFR 16.51 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Security of systems of records. 16.51... Security of systems of records. (a) Each component shall establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent unauthorized disclosure of records, and...

  2. Utilization of a Technical Peer Review to Support the Mission of the Nevada Test Site Community Advisory Board

    International Nuclear Information System (INIS)

    Dixon, Earle C.; Peterson, Kathleen

    2003-01-01

    The U. S. Department of Energy's (DOE) National Nuclear Security Administration Nevada Operations Office (NNSA/NV) Environmental Management (EM) Underground Test Area (UGTA) project addresses the characterization and needs for long-term monitoring of the subsurface contamination resulting from 828 underground nuclear weapon tests at the Nevada Test Site (NTS). EM promotes, and is required, to include stakeholders in its program. However, UGTA is a very complex program not easily understood by members of the public. The NTS Community Advisory Board (CAB), a federally chartered Site Specific Advisory Board (SSAB), has studied the UGTA project since 1996, and has found it a challenge to completely comprehend and provide NNSA/NV meaningful citizen input. The CAB realized the benefit of a technical peer review and in 2000 recommended to NNSA/NV that a peer review of the UGTA strategy would provide valuable feedback to the program to address underground contamination at the NTS. N NSA agreed to the CAB's recommendation, and moved forward with a scope of work to have the American Society of Mechanical Engineers (ASME) perform the peer review of the UGTA strategy. The ASME began the peer review in June 2001, and their final report was published in November 2001. In January 2002, the CAB devoted their monthly meeting in Las Vegas, Nevada to reporting the results of the peer review of the UGTA strategy to the public. Two public workshops were later held in the community of Amargosa, Nevada during the month of January to help educate and build interest in the CAB February 2002 monthly meeting which was also held in Amargosa. The CAB recommendation to NNSA to utilize a technical peer review has provided valuable information to NNSA, the State of Nevada, and the CAB. At other DOE sites SSABs are challenged by a number of complex, technical programs requiring considerable time and resources for the board to comprehend. It is worth considering the utilization of an independent

  3. Information Security Management in Context of Globalization

    OpenAIRE

    Wawak, Slawomir

    2012-01-01

    Modern information technologies are the engine of globalization. At the same time, the global market influences the way of looking at information security. Information security thus becomes an increasingly important field. The article discuses the results of research on information security management systems in public administration in Poland.

  4. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    Science.gov (United States)

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  5. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  6. 77 FR 54646 - Social Security Acquiescence Ruling (AR) 12-1(8); Correction; Petersen v. Astrue, 633 F.3d 633...

    Science.gov (United States)

    2012-09-05

    ... II of the Social Security Act AGENCY: Social Security Administration. ACTION: Notice of Social Security Acquiescence Ruling; Correction. SUMMARY: The Social Security Administration published a document... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0046] Social Security Acquiescence Ruling (AR...

  7. Legal rights, efficiency and citizen involvement in the administration of social security cash benefits

    DEFF Research Database (Denmark)

    Von Hielmcrone, Nina

    2010-01-01

    for the accretion of new special rules. They merely have to be coded into the system. The government’s modernisation programme has been carried out at the expense of transparency and the legal rights of the citizens. This article deals with Danish legislation; the mechanisms in question are common not only......The Danish social security legislation has been distinguished in recent years by an intense growth in rules and regulations. Numerous laws and ordinances have been promulgated, which make it extremely difficult for both citizens and authorities to come to grips with the laws, much less to gain...... to a vast growth in very detailed and complex rules and thereby lack of transparency for citizens and social workers. The fact that benefits are administered with the aid of computers means that neither administrators nor politicians find the abundance of rules to be a problem, and no limits are thereby set...

  8. Status of Nuclear Safety evaluation in China

    International Nuclear Information System (INIS)

    Tian Jiashu

    1999-01-01

    Chinese nuclear safety management and control follows international practice, the regulations are mainly from IAEA with the Chinese condition. The regulatory body is National Nuclear Safety Administration (NNSA). The nuclear safety management, surveillance, safety review and evaluation are guided by NNSA with technical support by several units. Beijing Review Center of Nuclear Safety is one of these units, which was founded in 1987 within Beijing Institute of nuclear Engineering (BINE), co-directed by NNSA and BINE, it is the first technical support team to NNSA. Most of the safety reviews and evaluations of Chinese nuclear installations has been finished by this unit. It is described briefly in this paper that the NNSA's main function and organization, regulations on the nuclear safety, procedure of application and issuing of license, the main activities performed by Beijing Review Center of Nuclear Safety, the situation of severe accident analyses in China, etc. (author)

  9. 77 FR 19680 - Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security

    Science.gov (United States)

    2012-04-02

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2006-26514] Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice announces that the...

  10. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  11. Flexible Land Administration

    DEFF Research Database (Denmark)

    Enemark, Stig

    2014-01-01

    Security of tenure is widely considered to be the missing piece of the puzzle when it comes to eradication of poverty. And, as explained in the previous issue of Geoinformatics, the European Union is now placing land rights at the heart of EU development policy. This article presents a way forwar...... in terms of building flexible and "fit-for-purpose" land administration systems in developing countries. This will ensure security of tenure for all and sustainable management of the use of land....

  12. Security vs. Safety.

    Science.gov (United States)

    Sturgeon, Julie

    1999-01-01

    Provides administrative advice on how some safety experts have made college campuses safer and friendlier without breaking the budget. Tips on security and advice on safety management that encompasses the whole environment are highlighted. (GR)

  13. Monitoring Potential Transport of Radioactive Contaminants in Shallow Ephemeral Channels: FY2015 and FY2016

    Energy Technology Data Exchange (ETDEWEB)

    Mizell, Steve A [Desert Research Inst. (DRI), Las Vegas, NV (United States); Miller, Julianne J [Desert Research Inst. (DRI), Las Vegas, NV (United States); McCurdy, Greg [Desert Research Inst. (DRI), Las Vegas, NV (United States); Campbell, Scott A [Desert Research Inst. (DRI), Las Vegas, NV (United States)

    2017-10-01

    The Desert Research Institute (DRI) is conducting a field assessment of the potential for contaminated soil to be transported from the Smoky Contamination Area (CA) as a result of storm runoff. This activity supports Nevada Nuclear Security Administration (NNSA) efforts to complete regulatory closure of the Soils Corrective Action Unit (CAU) contamination areas. The work is intended to confirm the likely mechanism of transport and determine the meteorological conditions that might cause movement of contaminated soils, as well as determine the particle size fraction that is most closely associated with transported radionuclide-contaminated soils. These data will facilitate the appropriate closure design and post-closure monitoring program.

  14. Closure Report for Corrective Action Unit 330: Areas 6, 22, and 23 Tanks and Spill Sites, Nevada Test Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    A. T. Urbon

    2003-07-01

    This Closure Report (CR) documents the activities performed to close Corrective Action Unit (CAU) 330: Areas 6, 22, and 23 Tanks and Spill Sites, in accordance with the Federal Facility Agreement and Consent Order (FFACO of 1996), and the Nevada Division of Environmental Protection (NDEP)-approved Streamlined Approach for Environmental Restoration (SAFER) Plan for CAU 330: Areas 6, 22, and 23 Tanks and Spill Sites, Nevada Test Site (NTS), Nevada (U.S. Department of Energy, National Nuclear Security Administration Nevada Operation Office [NNSA/NV], 2001). CAU 330 consists of the following four Corrective Action Sites (CASs): 06-02-04, 22-99-06, 23-01-02, and 23-25-05 (Figure 1).

  15. ECOLOGICAL MONITORING AND COMPLIANCE PROGRAM CALENDAR YEAR 2005 REPORT

    Energy Technology Data Exchange (ETDEWEB)

    BECHTEL NEVADA ECOLOGICAL SERVICES

    2006-03-01

    The Ecological Monitoring and Compliance program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), monitors the ecosystem of the Nevada Test Site (NTS) and ensures compliance with laws and regulations pertaining to NTS biota. This report summarizes the program’s activities conducted by Bechtel Nevada (BN) during the Calendar Year 2005. Program activities included: (1) biological surveys at proposed construction sites, (2) desert tortoise compliance, (3) ecosystem mapping and data management, (4) sensitive and protected/regulated species and unique habitat monitoring, (5) habitat restoration monitoring, and (6) biological monitoring at the Non-Proliferation Test and Evaluation Complex (NPTEC).

  16. University of Texas Safeguards by Design Problem Statement

    Energy Technology Data Exchange (ETDEWEB)

    Rauch, Eric Benton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Scherer, Carolynn P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Ruggiero, Christy E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-22

    This document describes the problem statement that students at the University of Texas will use for their senior level capstone design class. The purpose of this project is to introduce students to Safeguards by Design concepts as part of their capstone design course at the culmination of their degree program. This work is supported by Los Alamos National Laboratory with FY17 and FY18 programmatic funding from the U. S. Department of Energy’s (DOE) National Nuclear Security Administration (NNSA), through the Office of Defense Nuclear Nonproliferation (DNN), Office of International Nuclear Safeguards (INS), Next Generation Safeguards Initiative (NGSI), Human Resource Development Program, Safeguards by Design Project.

  17. Monitoring Potential Transport of Radioactive Contaminants in Shallow Ephemeral Channels: FY2013 and FY2014 (revised)

    Energy Technology Data Exchange (ETDEWEB)

    Mizell, Steve A. [Desert Research Inst. (DRI), Las Vegas, NV (United States); Miller, Julianne J. [Desert Research Inst. (DRI), Las Vegas, NV (United States); McCurdy, Greg D. [Desert Research Inst. (DRI), Reno, NV (United States); Campbell, Scott A. [Desert Research Inst. (DRI), Las Vegas, NV (United States)

    2017-06-01

    The Desert Research Institute (DRI) is conducting a field assessment of the potential for contaminated soil to be transported from the Smoky Contamination Area (CA) as a result of storm runoff, which supports National Nuclear Security Administration (NNSA) efforts to complete regulatory closure of the Soils Corrective Action Unit (CAU) contamination areas. The work is intended to confirm the likely mechanism of transport and determine the meteorological conditions that might cause movement of contaminated soils, as well as determine the particle size fraction that is most closely associated with transported radionuclide-contaminated soils. These data will facilitate the appropriate closure design and post-closure monitoring program.

  18. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    Science.gov (United States)

    2011-12-01

    national security and the interagency process ( Marcella , 2010). All these documents reviewed focused mainly on national security and overseas...administration, they were considered “the heart and soul of the process” ( Marcella , 2010). While subtle differences exist across administrations, the IPC...and build consensus across the government for action ( Marcella , 2010). During the second term of the Bush administration and during the first years

  19. Nevada Test Site Radiation Protection Program - Revision 1

    International Nuclear Information System (INIS)

    Nevada Test Site Radiological Control Managers' Council

    2008-01-01

    Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection,' establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada Test Site (NTS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) operations, and environmental restoration off-site projects. This NTS RPP promulgates the radiation protection standards, limits, and program requirements for occupational exposure to ionizing radiation resulting from NNSA/NSO activities at the NTS and other operational areas as stated in 10 CFR 835.1(a). NNSA/NSO activities (including design, construction, operation, and decommissioning) within the scope of this RPP may result in occupational exposures to radiation or radioactive material. Therefore, a system of control is implemented through specific references to the site-specific NV/YMP RCM. This system of control is intended to ensure that the following criteria are met: (1) occupational exposures are maintained as low as reasonably achievable (ALARA), (2) DOE's limiting values are not exceeded, (3) employees are aware of and are prepared to cope with emergency conditions, and (4) employees are not inadvertently exposed to radiation or radioactive material

  20. Corrective Action Decision Document for Corrective Action Unit 204: Storage Bunkers, Nevada Test Site, Nevada

    International Nuclear Information System (INIS)

    Boehlecke, Robert

    2004-01-01

    The six bunkers included in CAU 204 were primarily used to monitor atmospheric testing or store munitions. The 'Corrective Action Investigation Plan (CAIP) for Corrective Action Unit 204: Storage Bunkers, Nevada Test Site, Nevada' (NNSA/NV, 2002a) provides information relating to the history, planning, and scope of the investigation; therefore, it will not be repeated in this CADD. This CADD identifies potential corrective action alternatives and provides a rationale for the selection of a recommended corrective action alternative for each CAS within CAU 204. The evaluation of corrective action alternatives is based on process knowledge and the results of investigative activities conducted in accordance with the CAIP (NNSA/NV, 2002a) that was approved prior to the start of the Corrective Action Investigation (CAI). Record of Technical Change (ROTC) No. 1 to the CAIP (approval pending) documents changes to the preliminary action levels (PALs) agreed to by the Nevada Division of Environmental Protection (NDEP) and DOE, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This ROTC specifically discusses the radiological PALs and their application to the findings of the CAU 204 corrective action investigation. The scope of this CADD consists of the following: (1) Develop corrective action objectives; (2) Identify corrective action alternative screening criteria; (3) Develop corrective action alternatives; (4) Perform detailed and comparative evaluations of corrective action alternatives in relation to corrective action objectives and screening criteria; and (5) Recommend and justify a preferred corrective action alternative for each CAS within CAU 204

  1. Calendar Year 2004 annual site environmental report : Tonopah Test Range, Nevada and Kauai Test Facility, Hawaii

    International Nuclear Information System (INIS)

    Montoya, Amber L.; Wagner, Katrina; Goering, Teresa Lynn; Koss, Susan I.; Salinas, Stephanie A.

    2005-01-01

    Tonopah Test Range (TTR) in Nevada and Kauai Test Facility (KTF) in Hawaii are government-owned, contractor-operated facilities operated by Sandia Corporation, a subsidiary of Lockheed Martin Corporation. The U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), through the Sandia Site Office (SSO), in Albuquerque, NM, manages TTR and KTF's operations. Sandia Corporation conducts operations at TTR in support of DOE/NNSA's Weapons Ordnance Program and has operated the site since 1957. Westinghouse Government Services subcontracts to Sandia Corporation in administering most of the environmental programs at TTR. Sandia Corporation operates KTF as a rocket preparation launching and tracking facility. This Annual Site Environmental Report (ASER) summarizes data and the compliance status of the environmental protection and monitoring program at TTR and KTF through Calendar Year (CY) 2004. The compliance status of environmental regulations applicable at these sites include state and federal regulations governing air emissions, wastewater effluent, waste management, terrestrial surveillance, and Environmental Restoration (ER) cleanup activities. Sandia Corporation is responsible only for those environmental program activities related to its operations. The DOE/NNSA, Nevada Site Office (NSO) retains responsibility for the cleanup and management of ER TTR sites. Currently, there are no ER Sites at KTF. Environmental monitoring and surveillance programs are required by DOE Order 450.1, Environmental Protection Program (DOE 2005) and DOE Order 231.1A, Environment, Safety, and Health Reporting (DOE 2004b)

  2. Calendar Year 2004 annual site environmental report : Tonopah Test Range, Nevada & Kauai Test Facility, Hawaii.

    Energy Technology Data Exchange (ETDEWEB)

    Montoya, Amber L.; Wagner, Katrina; Goering, Teresa Lynn; Koss, Susan I.; Salinas, Stephanie A.

    2005-09-01

    Tonopah Test Range (TTR) in Nevada and Kauai Test Facility (KTF) in Hawaii are government-owned, contractor-operated facilities operated by Sandia Corporation, a subsidiary of Lockheed Martin Corporation. The U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), through the Sandia Site Office (SSO), in Albuquerque, NM, manages TTR and KTF's operations. Sandia Corporation conducts operations at TTR in support of DOE/NNSA's Weapons Ordnance Program and has operated the site since 1957. Westinghouse Government Services subcontracts to Sandia Corporation in administering most of the environmental programs at TTR. Sandia Corporation operates KTF as a rocket preparation launching and tracking facility. This Annual Site Environmental Report (ASER) summarizes data and the compliance status of the environmental protection and monitoring program at TTR and KTF through Calendar Year (CY) 2004. The compliance status of environmental regulations applicable at these sites include state and federal regulations governing air emissions, wastewater effluent, waste management, terrestrial surveillance, and Environmental Restoration (ER) cleanup activities. Sandia Corporation is responsible only for those environmental program activities related to its operations. The DOE/NNSA, Nevada Site Office (NSO) retains responsibility for the cleanup and management of ER TTR sites. Currently, there are no ER Sites at KTF. Environmental monitoring and surveillance programs are required by DOE Order 450.1, Environmental Protection Program (DOE 2005) and DOE Order 231.1A, Environment, Safety, and Health Reporting (DOE 2004b).

  3. Calendar year 2002 annual site environmental report for Tonopah Test Range, Nevada and Kauai Test Facility, Hawaii.

    Energy Technology Data Exchange (ETDEWEB)

    Wagner, Katrina; Sanchez, Rebecca V.; Mayeux, Lucie; Koss, Susan I.; Salinas, Stephanie A.

    2003-09-01

    Tonopah Test Range (TTR) in Nevada and Kauai Test Facility (KTF) in Hawaii are government-owned, contractor-operated facilities operated by Sandia Corporation, a subsidiary of Lockheed Martin Corporation. The U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), through the Sandia Site Office (SSO), in Albuquerque, NM, oversees TTR and KTF's operations. Sandia Corporation conducts operations at TTR in support of DOE/NNSA's Weapons Ordnance Program and has operated the site since 1957. Westinghouse Government Services subcontracts to Sandia Corporation in administering most of the environmental programs at TTR. Sandia Corporation operates KTF as a rocket preparation launching and tracking facility. This Annual Site Environmental Report (ASER) summarizes data and the compliance status of the environmental protection and monitoring program at TTR and KTF through Calendar Year (CY) 2002. The compliance status of environmental regulations applicable at these sites include state and federal regulations governing air emissions, wastewater effluent, waste management, terrestrial surveillance, and Environmental Restoration (ER) cleanup activities. Sandia Corporation is responsible only for those environmental program activities related to its operations. The DOE/NNSA, Nevada Site Office (NSO) retains responsibility for the cleanup and management of ER TTR sites. Currently, there are no ER Sites at KTF. Environmental monitoring and surveillance programs are required by DOE Order 5400.1, General Environmental Protection Program (DOE 1990) and DOE Order 231.1, Environment, Safety, and Health Reporting (DOE 1996).

  4. Nevada Test Site Radiation Protection Program - Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Radiological Control Managers' Council

    2008-06-01

    Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection,' establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada Test Site (NTS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) operations, and environmental restoration off-site projects. This NTS RPP promulgates the radiation protection standards, limits, and program requirements for occupational exposure to ionizing radiation resulting from NNSA/NSO activities at the NTS and other operational areas as stated in 10 CFR 835.1(a). NNSA/NSO activities (including design, construction, operation, and decommissioning) within the scope of this RPP may result in occupational exposures to radiation or radioactive material. Therefore, a system of control is implemented through specific references to the site-specific NV/YMP RCM. This system of control is intended to ensure that the following criteria are met: (1) occupational exposures are maintained as low as reasonably achievable (ALARA), (2) DOE's limiting values are not exceeded, (3) employees are aware of and are prepared to cope with emergency conditions, and (4) employees are not inadvertently exposed to radiation or radioactive material.

  5. Savannah River Site nuclear materials management plan FY 2017-2031

    Energy Technology Data Exchange (ETDEWEB)

    Magoulas, V. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2017-06-22

    The purpose of the Nuclear Materials Management Plan (herein referred to as “this Plan”) is to integrate and document the activities required to disposition the legacy and/or surplus Enriched Uranium (EU) and Plutonium (Pu) and other nuclear materials already stored or anticipated to be received by facilities at the Department of Energy (DOE) Savannah River Site (SRS) as well as the activities to support the DOE Tritium mission. It establishes a planning basis for EU and Pu processing operations in Environmental Management Operations (EMO) facilities through the end of their program missions and for the tritium through the National Nuclear Security Administration (NNSA) Defense Programs (DP) facilities. Its development is a joint effort among the Department of Energy - Savannah River (DOE-SR), DOE – Environmental Management (EM), NNSA Office of Material Management and Minimization (M3), NNSA Savannah River Field Office (SRFO), and the Management and Operations (M&O) contractor, Savannah River Nuclear Solutions, LLC (SRNS). Life-cycle program planning for Nuclear Materials Stabilization and Disposition and the Tritium Enterprise may use this Plan as a basis for the development of the nuclear materials disposition scope and schedule. This Plan assumes full funding to accomplish the required project and operations activities. It is recognized that some aspects of this Plan are pre decisional with regard to National Environmental Policy Act (NEPA); in such cases new NEPA actions will be required.

  6. 2016 Annual Site Environmental report Sandia National Laboratories Tonopah Test Range Nevada & Kaua'i Test Facility Hawai'i.

    Energy Technology Data Exchange (ETDEWEB)

    Salas, Angela Maria [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Griffith, Stacy R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-07-01

    Sandia National Laboratories (SNL) is a multimission laboratory managed and operated by National Technology & Engineering Solutions of Sandia, LLC, a wholly owned subsidiary of Honeywell International Inc., for the U.S. Department of Energy’s (DOE’s), National Nuclear Security Administration (NNSA) under contract DE-NA0003525. The DOE/NNSA Sandia Field Office administers the contract and oversees contractor operations at the SNL, Tonopah Test Range (SNL/TTR) in Nevada and the SNL, Kaua‘i Test Facility (SNL/KTF) in Hawai‘i. SNL personnel manage and conduct operations at SNL/TTR in support of the DOE/NNSA’s Weapons Ordnance Program and have operated the site since 1957. Navarro Research and Engineering personnel perform most of the environmental programs activities at SNL/TTR. The DOE/NNSA/Nevada Field Office retains responsibility for cleanup and management of SNL/TTR Environmental Restoration sites. SNL personnel operate SNL/KTF as a rocket preparation launching and tracking facility. This Annual Site Environmental Report (ASER) summarizes data and the compliance status of sustainability, environmental protection, and monitoring programs at SNL/TTR and SNL/KTF during calendar year 2016. Major environmental programs include air quality, water quality, groundwater protection, terrestrial and biological surveillance, waste management, pollution prevention, environmental restoration, oil and chemical spill prevention, and implementation of the National Environmental Policy Act. This ASER is prepared in accordance with and as required by DOE O 231.1B, Admin Change 1, Environment, Safety, and Health Reporting.

  7. 33 CFR 135.7 - Delegation-Fund Administrator.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Delegation-Fund Administrator. 135.7 Section 135.7 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... FUND General § 135.7 Delegation—Fund Administrator. (a) The Fund Administrator is delegated authority...

  8. U.S. Department of Energy Program of International Technical Cooperation for Research Reactor Utilization

    International Nuclear Information System (INIS)

    Chong, D.; Manning, M.; Ellis, R.; Apt, K.; Flaim, S.; Sylvester, K.

    2004-01-01

    The U.S. Department of Energy, National Nuclear Security Administration (DOE/NNSA) has initiated collaborations with the national nuclear authorities of Egypt, Peru, and Romania for the purpose of advancing the commercial potential and utilization of their respective research reactors. Under its Office of International Safeguards ''Sister Laboratory'' program, DOE/NNSA has undertaken numerous technical collaborations over the past decade intended to promote peaceful applications of nuclear technology. Among these has been technical assistance in research reactor applications, such as neutron activation analysis, nuclear analysis, reactor physics, and medical radioisotope production. The current collaborations are intended to provide the subject countries with a methodology for greater commercialization of research reactor products and services. Our primary goal is the transfer of knowledge, both in administrative and technical issues, needed for the establishment of an effective business plan and utilization strategy for the continued operation of the countries' research reactors. Technical consultation, cooperation, and the information transfer provided are related to: identification, evaluation, and assessment of current research reactor capabilities for products and services; identification of opportunities for technical upgrades for new or expanded products and services; advice and consultation on research reactor upgrades and technical modifications; characterization of markets for reactor products and services; identification of competition and estimation of potential for market penetration; integration of technical constraints; estimation of cash flow streams; and case studies

  9. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  10. Veterans Health Administration (VHA)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSNs and other identifying information for the Department of Veterans Affairs, VHA. DVA will use the information...

  11. Identifying the Key Weaknesses in Network Security at Colleges.

    Science.gov (United States)

    Olsen, Florence

    2000-01-01

    A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)

  12. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  13. Security of M-Commerce transactions

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-07-01

    Full Text Available In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here's how to analyze the security of M-commerce transactions and ways to increase security for these transactions taking into account the organization of M-Commerce applications, software used, hardware used and other important issues in the development of these applications.

  14. 45 CFR 1336.67 - Security and collateral: Responsibilities of the Loan Administrator.

    Science.gov (United States)

    2010-10-01

    ... inventory or proceeds of inventory sales as well as marketable securities and cash collateral accounts. (1... security at any time during the term of the loan if after review and monitoring an assessment indicates the...

  15. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene

    2018-03-01

    . Frenchman Flat is currently the only UGTA CAU in the CR stage. Sampling requirements for this CAU are described in Underground Test Area (UGTA) Closure Report for Corrective Action Unit 98: Frenchman Flat Nevada National Security Site, Nevada (NNSA/NFO, 2016).

  16. Report of a workshop on nuclear forces and nonproliferation Woodrow Wilson international center for scholars, Washington, DC October 28, 2010

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F [Los Alamos National Laboratory

    2010-12-08

    A workshop sponsored by the Los Alamos National Laboratory in cooperation with the Woodrow Wilson International Center for Scholars was held at the Wilson Center in Washington, DC, on October 28, 2010. The workshop addressed evolving nuclear forces and their impacts on nonproliferation in the context of the new strategic environment, the Obama Administration's Nuclear Posture Review and the 2010 NPT Review Conference. The discussions reflected the importance of the NPR for defining the role of US nuclear forces in dealing with 21st century threats and providing guidance for National Nuclear Security Administration (NNSA) and Department of Defense (DoD) programs and, for many but not all participants, highlighted its role in the successful outcome of the NPT RevCon. There was widespread support for the NPR and its role in developing the foundations for a sustainable nuclear-weapon program that addresses nuclear weapons, infrastructure and expertise in the broader nonproliferation, disarmament and international security contexts. However, some participants raised concerns about its implementation and its long-term effectiveness and sustainability.

  17. DATA SECURITY ISSUES IN CLOUD COMPUTING: REVIEW

    Directory of Open Access Journals (Sweden)

    Hussam Alddin Shihab Ahmed

    2016-02-01

    Full Text Available Cloud computing is an internet based model that empower on demand ease of access and pay for the usage of each access to shared pool of networks. It is yet another innovation that fulfills a client's necessity for computing resources like systems, stockpiling, servers, administrations and applications. Securing the Data is considered one of the principle significant challenges and concerns for cloud computing. This persistent problem is getting more affective due to the changes in improving cloud computing technology. From the perspective of the Clients, cloud computing is a security hazard especially when it comes to assurance affirmation issues and data security, remain the most basically which backs off for appropriation of Cloud Computing administrations. This paper audits and breaks down the essential issue of cloud computing and depicts the information security and protection of privacy issues in cloud.

  18. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  19. 2005 Annual Report

    International Nuclear Information System (INIS)

    Chrzanowski, P; Walter, K

    2006-01-01

    As the cover of our ''2005 Annual Report'' highlights, Lawrence Livermore National Laboratory joined the international science community in celebrating the World Year of Physics in 2005, with special events and science outreach and education programs. Einstein's remarkable discoveries in 1905 provided an opportunity to reflect on how physics has changed the world during the last century and on the promise of future beneficial discoveries. For half of the past century, Lawrence Livermore, which was established to meet an urgent national security need, has been contributing to the advancement of science and technology in a very special way. Co-founder Ernest O. Lawrence was the leading proponent in his generation of large-scale, multidisciplinary science and technology teams. That's Livermore's distinctive heritage and our continuing approach as a national laboratory managed and operated by the University of California for the Department of Energy's National Nuclear Security Administration (DOE/NNSA). We focus on important problems that affect our nation's security and seek breakthrough advances in science and technology to achieve mission goals. An event in 2005 exemplifies our focus on science and technology advances in support of mission goals. In October, distinguished visitors came to Livermore to celebrate the tenth anniversary of the Accelerated Strategic Computing Initiative (now called the Advanced Simulation and Computing Program, or ASC). ASC was launched in 1995 by DOE/NNSA to achieve a million-fold increase in computing power in a decade. The goal was motivated by the need to simulate the three-dimensional performance of a nuclear weapon in sufficient resolution and with the appropriately detailed physics models included. This mission-driven goal is a key part of fulfilling Livermore's foremost responsibility to ensure that the nuclear weapons in the nation's smaller 21st-century stockpile remain safe, reliable, and secure

  20. 75 FR 33682 - Export Administration Regulations; Technical Amendments

    Science.gov (United States)

    2010-06-15

    ...-01] RIN 0694-AE93 Export Administration Regulations; Technical Amendments AGENCY: Bureau of Industry... Bureau of Industry and Security (BIS) makes a technical amendment to the Export Administration... review of final decisions and orders issued in BIS export control administrative enforcement proceedings...

  1. CompTIA Security+ Deluxe Study Guide Exam SY0-301

    CERN Document Server

    Dulaney, Emmett

    2011-01-01

    Get a host of extras with this Deluxe version including a Security Administration Simulator!  Prepare for CompTIA's new Security+ exam SY0-301 with this Deluxe Edition of our popular CompTIA Security+ Study Guide, 5th Edition. In addition to the 100% coverage of all exam essentials and study tools you'll find in the regular study guide, the Deluxe Edition gives you over additional hands-on lab exercises and study tools, three additional practice exams, author videos, and the exclusive Security Administration simulator. This book is a CompTIA Recommended product. Provides 100% coverage of all e

  2. Social Security Programs Throughout the World: Africa, 2015

    Data.gov (United States)

    Social Security Administration — This report, which is part of a four-volume series, provides a cross-national comparison of the social security systems in 48 countries in Africa. It summarizes the...

  3. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  4. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  5. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  6. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  7. 20 CFR 416.1020 - General administrative requirements.

    Science.gov (United States)

    2010-04-01

    ... cause the State to be substantially failing to comply with our regulations or other written guidelines... substantially failing to follow our regulations or other written guidelines. (b) The State is responsible for... Section 416.1020 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE...

  8. Securing social media in the enterprise

    CERN Document Server

    Dalziel, Henry

    2015-01-01

    Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media wi

  9. 7 CFR 1735.22 - Loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Loan security. 1735.22 Section 1735.22 Agriculture... GENERAL POLICIES, TYPES OF LOANS, LOAN REQUIREMENTS-TELECOMMUNICATIONS PROGRAM Loan Purposes and Basic Policies § 1735.22 Loan security. (a) RUS makes loans only if, in the judgment of the Administrator, the...

  10. Building Fit-For-Purpose Land Administration Systems

    DEFF Research Database (Denmark)

    Lemmen, Christiaan; Enemark, Stig; McLaren, Robin

    2016-01-01

    New solutions in land administration are required that can deliver security of tenure for all, are affordable and can be quickly developed and incrementally improved over time. The Fit-For-Purpose (FFP) approach to land administration has emerged to meet these simple, but challenging requirements...... administration following the FFP principles for building the spatial framework. The Social Tenure Domain Model (STDM) is recommended.  ‘Review (Conversion)’ means assessing the evidence of rights and any possible out-standing claims and when conditions are met, the security of the rights will be increased...... of formality, legality and technical accuracy. Such flexibility also relates to the recordation that should be organised at various levels rather than through one central register. The land administration system can then be upgraded and incrementally improved over time in response to social and legal needs...

  11. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  12. 76 FR 5232 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-01-28

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  13. 75 FR 77934 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-12-14

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the second meeting of the Small Business Information Security...

  14. 75 FR 70764 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-11-18

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the first meeting of the Small Business Information Security...

  15. 76 FR 11307 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-03-01

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  16. Closure Strategy for a Waste Disposal Facility with Multiple Waste Types and Regulatory Drivers at the Nevada Test Site - 8422

    International Nuclear Information System (INIS)

    D Wieland; V Yucel; L Desotell; G Shott; J Wrapp

    2008-01-01

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) plans to close the waste and classified material storage cells in the southeast quadrant of the Area 5 Radioactive Waste Management Site (RWMS), informally known as the '92-Acre Area', by 2011. The 25 shallow trenches and pits and the 13 Greater Confinement Disposal (GCD) borings contain various waste streams including low-level waste (LLW), low-level mixed waste (LLMW), transuranic (TRU), mixed transuranic (MTRU), and high specific activity LLW. The cells are managed under several regulatory and permit programs by the U.S. Department of Energy (DOE) and the Nevada Division of Environmental Protection (NDEP). Although the specific closure requirements for each cell vary, 37 closely spaced cells will be closed under a single integrated monolayer evapotranspirative (ET) final cover. One cell will be closed under a separate cover concurrently. The site setting and climate constrain transport pathways and are factors in the technical approach to closure and performance assessment. Successful implementation of the integrated closure plan requires excellent communication and coordination between NNSA/NSO and the regulators

  17. Analysis of vertical flow during ambient and pumped conditions in four monitoring wells at the Pantex Plant, Carson County, Texas, July-September 2008

    Science.gov (United States)

    Stanton, Gregory P.; Thomas, Jonathan V.; Stoval, Jeffery

    2009-01-01

    The Pantex Plant is a U.S. Department of Energy/National Nuclear Security Administration (USDOE/NNSA)-owned, contractor-operated facility managed by Babcock & Wilcox Technical Services Pantex, LLC (B&W Pantex) in Carson County, Texas, approximately 17 miles northeast of Amarillo. The U.S. Geological Survey, in cooperation with B&W Pantex through the USDOE/NNSA, made a series of flowmeter measurements and collected other borehole geophysical logs during July–September 2008 to analyze vertical flow in screened intervals of four selected monitoring wells (PTX01–1012, PTX06–1044, PTX06–1056, and PTX06–1068) at the Pantex Plant. Hydraulic properties (transmissivity values) of the section of High Plains (Ogallala) aquifer penetrated by the wells also were computed. Geophysical data were collected under ambient and pumped flow conditions in the four monitoring wells. Unusually large drawdowns occurred at two monitoring wells (PTX06–1044 and PTX06–1056) while the wells were pumped at relatively low rates. A decision was made to redevelop those wells, and logs were run again after redevelopment in the two monitoring wells.

  18. National Ignition Facility, High-Energy-Density and Inertial Confinement Fusion, Peer-Review Panel (PRP) Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Keane, C. J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-01-28

    The National Ignition Facility (NIF) at Lawrence Livermore National Laboratory (LLNL) is operated as a National Nuclear Security Administration (NNSA) user facility in accordance with Department of Energy (DOE) best practices, including peer-reviewed experiments, regular external reviews of performance, and the use of a management structure that facilitates user and stakeholder feedback. NIF facility time is managed using processes similar to those in other DOE science facilities and is tailored to meet the mix of missions and customers that NIF supports. The NIF Governance Plan describes the process for allocating facility time on NIF and for creating the shot schedule. It also includes the flow of responsibility from entity to entity. The plan works to ensure that NIF meets its mission goals using the principles of scientific peer review, including transparency and cooperation among the sponsor, the NIF staff, and the various user communities. The NIF Governance Plan, dated September 28, 2012, was accepted and signed by LLNL Director Parney Albright, NIF Director Ed Moses, and Don Cook and Thomas D’Agostino of NNSA. Figure 1 shows the organizational structure for NIF Governance.

  19. An analysis of patient-provider secure messaging at two Veterans Health Administration medical centers: message content and resolution through secure messaging.

    Science.gov (United States)

    Shimada, Stephanie L; Petrakis, Beth Ann; Rothendler, James A; Zirkle, Maryan; Zhao, Shibei; Feng, Hua; Fix, Gemmae M; Ozkaynak, Mustafa; Martin, Tracey; Johnson, Sharon A; Tulu, Bengisu; Gordon, Howard S; Simon, Steven R; Woods, Susan S

    2017-09-01

    We sought to understand how patients and primary care teams use secure messaging (SM) to communicate with one another by analyzing secure message threads from 2 Department of Veterans Affairs facilities. We coded 1000 threads of SM communication sampled from 40 primary care teams. Most threads (94.5%) were initiated by patients (90.4%) or caregivers (4.1%); only 5.5% were initiated by primary care team members proactively reaching out to patients. Medication renewals and refills (47.2%), scheduling requests (17.6%), medication issues (12.9%), and health issues (12.7%) were the most common patient-initiated requests, followed by referrals (7.0%), administrative issues (6.5%), test results (5.4%), test issues (5.2%), informing messages (4.9%), comments about the patient portal or SM (4.1%), appreciation (3.9%), self-reported data (2.8%), life issues (1.5%), and complaints (1.5%). Very few messages were clinically urgent (0.7%) or contained other potentially challenging content. Message threads were mostly short (2.7 messages), comprising an average of 1.35 discrete content types. A substantial proportion of issues (24.2%) did not show any evidence of being resolved through SM. Time to response and extent of resolution via SM varied by message content. Proactive SM use by teams varied, but was most often for test results (32.7%), medication-related issues (21.8%), medication renewals (16.4%), or scheduling issues (18.2%). The majority of messages were transactional and initiated by patients or caregivers. Not all content categories were fully addressed over SM. Further education and training for both patients and clinical teams could improve the quality and efficiency of SM communication. Published by Oxford University Press on behalf of the American Medical Informatics Association 2017. This work is written by US Government employees and is in the public domain in the United States.

  20. FAA computer security : recommendations to address continuing weaknesses

    Science.gov (United States)

    2000-12-01

    In September, testimony before the Committee on Science, House of Representatives, focused on the Federal Aviation Administration's (FAA) computer security program. In brief, we reported that FAA's agency-wide computer security program has serious, p...

  1. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records... boarding pass printing instruction. If the passenger's identifying information matches the entry on the TSA... enforcement, immigration, intelligence, or other homeland security functions. In addition, TSA may share...

  2. 28 CFR 105.11 - Individuals not requiring a security risk assessment.

    Science.gov (United States)

    2010-07-01

    ... requiring a security risk assessment. (a) Citizens and nationals of the United States. A citizen or national... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY...

  3. Poverty Mapping Project: Poverty and Food Security Case Studies

    Data.gov (United States)

    National Aeronautics and Space Administration — The Poverty and Food Security Case Studies dataset consists of small area estimates of poverty, inequality, food security and related measures for subnational...

  4. 78 FR 30319 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Security...

    Science.gov (United States)

    2013-05-22

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2002-11602] Intent to Request Renewal From OMB of One Current Public Collection of Information: Security Programs for..., Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6011. FOR FURTHER INFORMATION...

  5. 12 CFR 615.5462 - Restrictive endorsement of bearer securities.

    Science.gov (United States)

    2010-01-01

    ... Credit Securities § 615.5462 Restrictive endorsement of bearer securities. When consolidated and... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Restrictive endorsement of bearer securities. 615.5462 Section 615.5462 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FUNDING AND...

  6. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... source categories, retention and disposal, and notification procedure. The Transportation Security... recipients of information about individuals who are their employees, job applicants, or contractors, or.... For each system of records covered by this notice, the retention and disposal sections are updated to...

  7. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  8. Disability Case Review of Administrative Law Judge Hearing Decisions

    Data.gov (United States)

    Social Security Administration — The Disability Case Review is a post-effectuation quality review of administrative law judge (ALJ) disability hearing decisions. This dataset includes results from...

  9. Social Security Funds Clamor for Reform

    Institute of Scientific and Technical Information of China (English)

    郑秉文

    2008-01-01

    This paper analyzed the institutional deficiencies inherent in China’s social security system based on a dissection of various social security fund violations. It holds that the unscientific design in social security system is the root cause for social security fund violations, which is reflected in low level of social security unification, irrational investment system and legislative loopholes etc. Currently, China’s social security funds are facing risks in management and in system; The key of risk control lies in the reforming of the overall framework of social security system through the following aspects: 1) readjust the unified account system structure to raise the level of unification; 2) reform funds investment system to boost ROI; 3) speeding up legislative to regulate the administrative costs and the behaviors of its entities.

  10. 76 FR 73011 - Pipeline and Hazardous Materials Safety Administration

    Science.gov (United States)

    2011-11-28

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration Office of... Safety Administration (PHMSA), DOT. ACTION: Notice of actions on Special Permit Applications. SUMMARY: In... reissue the Nuclear 173.56(b)(3)(i special permit Security ). originally issued Administration on an...

  11. 20 CFR 404.1361 - Federal benefit payable other than by Veterans Administration.

    Science.gov (United States)

    2010-04-01

    ... Uniformed Services Effect of Other Benefits on Payment of Social Security Benefits and Payments § 404.1361... Veterans Administration. 404.1361 Section 404.1361 Employees' Benefits SOCIAL SECURITY ADMINISTRATION... on the veteran's World War II or post-World War II active service before we determine and certify...

  12. Supplemental Security Income Public-Use Microdata File, 2001 Data

    Data.gov (United States)

    Social Security Administration — The SSI Public-Use Microdata File contains an extract of data fields from SSA's Supplemental Security Record file and consists of a 5 percent random, representative...

  13. Successful Characterization Strategies for the Active High Risk Y-12 National Security Complex 9201-5 (Alpha-5) Facility, Oak Ridge, TN - 12164

    Energy Technology Data Exchange (ETDEWEB)

    Birchfield, Joseph W. III [Link Technologies (United States); Albrecht, Linda [Alliant Corporation (United States)

    2012-07-01

    Building 9201-5 (Alpha 5) was completed in May 1944 and served as a production facility for National Nuclear Security Administration (NNSA) Y-12 Weapons Plant. During the Manhattan Project, it functioned as a uranium enrichment facility. The facility was renovated and altered over the years, converting the calutrons to support other missions. Alpha 5 consists of 4 floors and a basement measuring approximately 600,000 square feet. The facility contains various pieces of equipment remaining from legacy operations. A significant amount (approximately 200,000 kgs) of mercury (Hg) has been spilled in the facility over the operational history of the building. To further complicate matters, beryllium (Be) contamination in 9201-5 is found throughout approximately sixty percent of the facility. Concentrations varying from very low (< 0.2 micrograms (μg)/100 cm{sup 2}) to areas where concentrations are relatively high, approximately 600 μg/100 cm{sup 2}, in regulated beryllium areas. The primary site related contaminants (SRCs) for the waste in this facility are enriched uranium, depleted uranium, beryllium and mercury. This facility represents the highest environmental risk for DOE-ORO EM and NNSA at Y-12 and must be quickly addressed to minimize impacts to future Y-12 missions, as well as human health and the environment. As part of the American Recovery and Reinvestment Act (ARRA), approximately 700,000 cubic feet of legacy material was removed in 2010 and 2011. In addition, characterization of the 9201-5 facility was scheduled in the winter and spring of 2011. This activity was initiated in January 2011 and was completed in July 2011. Heavy schedule pressure was further complicated by the fact that this building has active utility, security and process systems. Given these complex variables, a unique, out of the box characterization strategy was forged in an effort to bound radiological and chemical contaminants, as well as providing the appropriate level of quality to

  14. Update on the development and evaluation of a program of regional collaboration for non-proliferation and transparency

    International Nuclear Information System (INIS)

    Furaus, James P.; Hori, Masato; Glidewell, Don

    2003-01-01

    The purpose of the research is to develop and evaluate a Program of Regional Cooperation for Non-proliferation and transparency in the Pacific Rim arena. There has been interest in the development of regional collaboration in the Pacific Rim for over thirty years, but without the kind of results that have been observed in other areas of the world, such as Europe and South America. While there have been many discussions and many papers written on the topic, there has not been a concept or a program that has been proposed and successfully implemented. This research will identify attributes of existing successful regional collaborations in other parts of the world, research the open literature for past ideas and attempts for regional collaboration in the Pacific Rim, and propose a model for a sustainable regional collaboration in the Pacific Rim. One of the strategies for developing the program of collaboration is to create a Joint Program Plan for the Implementation of Technology Based Regional Cooperation. This plan will be developed jointly by Japan Nuclear Cycle Development Institute (JNC) and Sandia National Laboratories (SNL), with input from the US Department of Energy/National Nuclear Security Administration/National Nuclear Security Administration (USDOE/NNSA), the International Atomic Energy Agency (IAEA) and other interested organizations. The plan will be a 'living plan,' that will be reviewed on a yearly basis to review status, and update as necessary. Another strategy is to implement technical objectives in parallel with the development of the program plan. This would include the completion of the implementation of a Virtual Private Network (VPN) system at JNC and sharing transparency data with SNL, USDOE/NNSA, IAEA, and other interested Pacific Rim entities. The availability of commercial off-the-shelf VPN systems, a technology that allows secure, inexpensive transfer of data across the Internet, will potentially be a key ingredient in the development

  15. 14 CFR 99.7 - Special security instructions.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Special security instructions. 99.7 Section 99.7 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SECURITY CONTROL OF AIR TRAFFIC General § 99.7 Special...

  16. Case and Administrative Support Tools

    Data.gov (United States)

    U.S. Environmental Protection Agency — Case and Administrative Support Tools (CAST) is the secure portion of the Office of General Counsel (OGC) Dashboard business process automation tool used to help...

  17. Title XVI / Supplemental Security Record Point In Time (SSRPT)

    Data.gov (United States)

    Social Security Administration — This is the point-in-time database to house temporary Supplemental Security Record (SSR) images produced during the course of the operating day before they can be...

  18. Use of the Social Security Administration Death Master File for ascertainment of mortality status

    Directory of Open Access Journals (Sweden)

    Whitcomb Brian W

    2004-03-01

    Full Text Available Abstract Objectives Internet sources that use the Social Security Administration's (SSA Death Master File have demonstrated high sensitivity among males for detection of mortality status in comparisons to the National Death Index, but the sensitivity has not been investigated for other demographic groups. Methods The authors used the SSA Death Master File to determine the mortality status of 374 decedents from the ongoing Patient Outcomes Study at Cedars-Sinai Medical Center whose deaths were confirmed by physicians using hospital records. Results Decedents identified by the SSA Death Master File were significantly older than those not identified. Foreign-born decedents were significantly less likely to be identified as dead than American-born decedents. Gender and marital status were not significant factors for identification by the SSA Death Master File. Conclusion The results of this study suggest that Internet sources may be used as an inexpensive and effective tool for determination of mortality status. However, among certain populations use of these databases alone may provide incomplete information.

  19. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    To improve SSAs IT management practices, we recommend that the Acting Commissioner of Social Security direct the Chief Information Officer and the Deputy Commissioner for Systems to complete the following actions...

  20. Effect of bond administration on construction project delivery

    Directory of Open Access Journals (Sweden)

    Oke Ayodeji Emmanuel

    2016-12-01

    Full Text Available Construction bond administration involves management of bond issues from inception of obtaining bond from guarantor to the point of release of contractor by the client. This process has posted a lot of challenges to construction stakeholders; it is therefore, necessary to examine the relationship between bond administration and project success. Archival data of completed bonded building projects were gathered through a pro forma developed for this purpose. Using Pearson product moment of correlation, it was revealed that the cost of securing a construction bond has a positive and significant effect on the initial and final costs of the project, while the number of days needed to secure a construction bond has no significant effect on the initial and final durations of the construction project. In order to establish the relationship between project delivery indices of cost and time and the construction bond administration variables, iteration of linear regression was adopted to arrive at the best-fit equation. Factors affecting the cost of securing construction bonds from guarantors should be identified and given adequate attention by construction stakeholders in order to minimize the effect of construction bond administration on project delivery.

  1. Social Security and Medicare Benefits

    Data.gov (United States)

    Social Security Administration — Cash benefits and rehabilitation benefits paid in each year from the Old-Age and Survivors Insurance, and Disability Insurance Trust Funds, and benefits paid from...

  2. The Land Administration Domain Model

    NARCIS (Netherlands)

    Lemmen, C.; Van Oosterom, P.J.M.; Bennett, R.

    2015-01-01

    Societal drivers including poverty eradication, gender equality, indigenous recognition, adequate housing, sustainable agriculture, food security, climate change response, and good governance, influence contemporary land administration design. Equally, the opportunities provided by technological

  3. Sandia National Laboratories, California sewer system management plan.

    Energy Technology Data Exchange (ETDEWEB)

    Holland, Robert C.

    2010-02-01

    A Sewer System Management Plan (SSMP) is required by the State Water Resources Control Board (SWRCB) Order No. 2006-0003-DWQ Statewide General Waste Discharge Requirements (WDR) for Sanitary Sewer Systems (General Permit). DOE, National Nuclear Security Administration (NNSA), Sandia Site Office has filed a Notice of Intent to be covered under this General Permit. The General Permit requires a proactive approach to reduce the number and frequency of sanitary sewer overflows (SSOs) within the State. SSMPs must include provisions to provide proper and efficient management, operation, and maintenance of sanitary sewer systems and must contain a spill response plan. Elements of this Plan are under development in accordance with the SWRCB's schedule.

  4. Amchitka Mud Pit Sites 2006 Post-Closure Monitoring and Inspection Report, Amchitka Island, Alaska, Rev. No.: 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick

    2006-09-01

    In 2001, the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA/NSO) remediated six areas associated with Amchitka mud pit release sites located on Amchitka Island, Alaska. This included the construction of seven closure caps. To ensure the integrity and effectiveness of remedial action, the mud pit sites are to be inspected every five years as part of DOE's long-term monitoring and surveillance program. In August of 2006, the closure caps were inspected in accordance with the ''Post-Closure Monitoring and Inspection Plan for Amchitka Island Mud Pit Release Sites'' (Rev. 0, November 2005). This post-closure monitoring report provides the 2006 cap inspection results.

  5. Second Line of Defense Megaports Initiative Operational Testing and Evaluation Plan Colon Container Terminal (CCT) Panama

    Energy Technology Data Exchange (ETDEWEB)

    Newhouse, Robert N.

    2010-01-01

    Report on the Operational Testing and Evaluation to validate and baseline an operable system that meets the Second Line of Defense (SLD) mission requirements. An SLD system is defined as the detection technology and associated equipment, the system operators from the host country, the standard operating procedures (SOPs), and other elements such as training and maintenance which support long-term system sustainment. To this end, the activities conducted during the OT&E phase must demonstrate that the Megaports System can be operated effectively in real-time by Panama Direccion General de Aduanas (DGA Panama Customs) personnel to the standards of the U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA).

  6. NNSS Soils Monitoring: Plutonium Valley (CAU 366) FY2016

    Energy Technology Data Exchange (ETDEWEB)

    Nikolich, George [Desert Research Inst. (DRI), Las Vegas, NV (United States); Mizell, Steve [Desert Research Inst. (DRI), Las Vegas, NV (United States); McCurdy, Greg [Desert Research Inst. (DRI), Las Vegas, NV (United States); Campbell, Scott [Desert Research Inst. (DRI), Las Vegas, NV (United States); Miller, Julianne J. [Desert Research Inst. (DRI), Las Vegas, NV (United States)

    2017-10-01

    Desert Research Institute (DRI) is conducting a field assessment of the potential for contaminated soil transport from the Plutonium Valley Contamination Area (CA) as a result of wind transport and storm runoff in support of National Nuclear Security Administration (NNSA) efforts to complete regulatory closure of the contamination areas. The DRI work is intended to confirm the likely mechanism(s) of transport and determine the meteorological conditions that might cause movement of contaminated soils. The emphasis of the work is on collecting sediment transported by channelized storm runoff at the Plutonium Valley investigation sites. These data will inform closure plans that are being developed, which will facilitate the appropriate closure design and post-closure monitoring.

  7. Tribal Colleges and Universitie/American Indian Higher Education Consortium Advanced Manufacturing Technical Assistance Project

    Energy Technology Data Exchange (ETDEWEB)

    Atcitty, Stanley [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    The National Nuclear Security Agency (NNSA) created a Minority Serving Institution Partnership Plan (MSIPP) to 1) align investments in a university capacity and workforce development with the NNSA mission to develop the needed skills and talent for NNSA’s enduring technical workforce at the laboratories and production plants and 2) to enhance research and education at under-represented colleges and universities. Out of this effort, MSIPP launched a new program in early FY17 focused on Tribal Colleges and Universities (TCUs). The following report summarizes the project focus and status update during this reporting period.

  8. Tribal Colleges and Universitie/American Indian Higher Education Consortium Advanced Manufacturing Technical Assistance Project.

    Energy Technology Data Exchange (ETDEWEB)

    Atcitty, Stanley [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2018-02-01

    The National Nuclear Security Agency (NNSA) created a Minority Serving Institution Partnership Plan (MSIPP) to 1) align investments in a university capacity and workforce development with the NNSA mission to develop the needed skills and talent for NNSA’s enduring technical workforce at the laboratories and production plants and 2) to enhance research and education at under-represented colleges and universities. Out of this effort, MSIPP launched a new program in early FY17 focused on Tribal Colleges and Universities (TCUs). The following report summarizes the project focus and status update during this reporting period.

  9. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...

  10. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop a...

  11. 45 CFR 205.52 - Furnishing of social security numbers.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Furnishing of social security numbers. 205.52... GENERAL ADMINISTRATION-PUBLIC ASSISTANCE PROGRAMS § 205.52 Furnishing of social security numbers. The... furnish to the State or local agency a social security account number, hereinafter referred to as the SSN...

  12. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ... National Security Division Systems—limited access. (a) The following system of records is exempted from... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR...

  13. UNIX and Linux system administration handbook

    CERN Document Server

    Nemeth, Evi; Hein, Trent R; Whaley, Ben; Mackin, Dan; Garnett, James; Branca, Fabrizio; Mouat, Adrian

    2018-01-01

    Now fully updated for today’s Linux distributions and cloud environments, it details best practices for every facet of system administration, including storage management, network design and administration, web hosting and scale-out, automation, configuration management, performance analysis, virtualization, DNS, security, management of IT service organizations, and much more. For modern system and network administrators, this edition contains indispensable new coverage of cloud deployments, continuous delivery, Docker and other containerization solutions, and much more.

  14. Corrective Action Decision Document for Corrective Action Unit 204: Storage Bunkers, Nevada Test Site, Nevada, Rev. No. 0

    Energy Technology Data Exchange (ETDEWEB)

    Robert Boehlecke

    2004-04-01

    The six bunkers included in CAU 204 were primarily used to monitor atmospheric testing or store munitions. The ''Corrective Action Investigation Plan (CAIP) for Corrective Action Unit 204: Storage Bunkers, Nevada Test Site, Nevada'' (NNSA/NV, 2002a) provides information relating to the history, planning, and scope of the investigation; therefore, it will not be repeated in this CADD. This CADD identifies potential corrective action alternatives and provides a rationale for the selection of a recommended corrective action alternative for each CAS within CAU 204. The evaluation of corrective action alternatives is based on process knowledge and the results of investigative activities conducted in accordance with the CAIP (NNSA/NV, 2002a) that was approved prior to the start of the Corrective Action Investigation (CAI). Record of Technical Change (ROTC) No. 1 to the CAIP (approval pending) documents changes to the preliminary action levels (PALs) agreed to by the Nevada Division of Environmental Protection (NDEP) and DOE, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This ROTC specifically discusses the radiological PALs and their application to the findings of the CAU 204 corrective action investigation. The scope of this CADD consists of the following: (1) Develop corrective action objectives; (2) Identify corrective action alternative screening criteria; (3) Develop corrective action alternatives; (4) Perform detailed and comparative evaluations of corrective action alternatives in relation to corrective action objectives and screening criteria; and (5) Recommend and justify a preferred corrective action alternative for each CAS within CAU 204.

  15. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  16. Ecological Monitoring and Compliance Program 2006 Report

    Energy Technology Data Exchange (ETDEWEB)

    David C. Anderson; Paul D. Greger; Derek B. Hall; Dennis J. Hansen; William K. Ostler

    2007-03-01

    The Ecological Monitoring and Compliance program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), monitors the ecosystem of the Nevada Test Site (NTS) and ensures compliance with laws and regulations pertaining to NTS biota. This report summarizes the program's activities conducted by National Security Technologies LLC (NSTec) during the Calendar Year 2006. Program activities included: (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem mapping and data management, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat monitoring, (g) habitat restoration monitoring, and (h) monitoring of the Nonproliferation Test and Evaluation Complex (NPTEC). Sensitive and protected/regulated species of the NTS include 44 plants, 1 mollusk, 2 reptiles, over 250 birds, and 26 mammals protected, managed, or considered sensitive as per state or federal regulations and natural resource agencies and organizations. The threatened desert tortoise (Gopherus agassizii) is the only species on the NTS protected under the Endangered Species Act. Biological surveys for the presence of sensitive and protected/regulated species and important biological resources on which they depend were conducted for 34 projects. A total of 342.1 hectares (ha) (845.37 acres [ac]) was surveyed for these projects. Sensitive and protected/regulated species and important biological resources found included: 2 inactive tortoise burrows, 2 western burrowing owls (Athene cunicularia hypugaea), several horses (Equus caballus), 2 active predator burrows, mature Joshua trees (Yucca brevifolia), yuccas and cacti; and also 1 bird nest (2 eggs), 1 barn owl (Tyto alba) and 2 great-horned owls (Bubo virginianus). NSTec provided a written summary report of all survey findings and mitigation recommendations, where applicable. All flagged burrows

  17. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  18. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  19. US Fire Administration Fire Statistics

    Data.gov (United States)

    Department of Homeland Security — The U.S. Fire Administration collects data from a variety of sources to provide information and analyses on the status and scope of the fire problem in the United...

  20. PBX Security and Forensics A Practical Approach

    CERN Document Server

    Androulidakis, Iosif I

    2013-01-01

    PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and Forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems.

  1. Oak Ridge National Laboratory Next Generation Safeguards Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Kirk, Bernadette Lugue [ORNL; Eipeldauer, Mary D [ORNL; Whitaker, J Michael [ORNL

    2011-12-01

    In 2007, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) Office of Nonproliferation and International Security (NA-24) completed a comprehensive review of the current and potential future challenges facing the international safeguards system. The review examined trends and events impacting the mission of international safeguards and the implications of expanding and evolving mission requirements on the legal authorities and institutions that serve as the foundation of the international safeguards system, as well as the technological, financial, and human resources required for effective safeguards implementation. The review's findings and recommendations were summarized in the report, 'International Safeguards: Challenges and Opportunities for the 21st Century (October 2007)'. One of the report's key recommendations was for DOE/NNSA to launch a major new program to revitalize the international safeguards technology and human resource base. In 2007, at the International Atomic Energy Agency's General Conference, then Secretary of Energy Samuel W. Bodman announced the newly created Next Generation Safeguards Initiative (NGSI). NGSI consists of five program elements: (1) Policy development and outreach; (2) Concepts and approaches; (3) Technology and analytical methodologies; (4) Human resource development; and (5) Infrastructure development. The ensuing report addresses the 'Human Resource Development (HRD)' component of NGSI. The goal of the HRD as defined in the NNSA Program Plan (November 2008) is 'to revitalize and expand the international safeguards human capital base by attracting and training a new generation of talent.' One of the major objectives listed in the HRD goal includes education and training, outreach to universities, professional societies, postdoctoral appointments, and summer internships at national laboratories. ORNL is a participant in the NGSI program, together

  2. Evaluation of Agency's Public Personnel Administration

    OpenAIRE

    Neal W. Tamayo

    2017-01-01

    As a consultant for a government agency, this paper will design recommendations and improvements for the agency’s public personnel administration. In order to do this, the consultant has to become familiar with the agency, its departments and also understand the key factors. The department chosen from the government for this paper is the Social Security Administration (Kestenbaum, 2014).

  3. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  4. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  5. Top Ten Challenges Facing the Next Secretary of Homeland Security

    National Research Council Canada - National Science Library

    2008-01-01

    In an effort to assist with the first Presidential administration transition of the Department of Homeland Security, the Homeland Security Advisory Council has identified ten key challenges that will...

  6. Employee Retirement Income Security Act of 1974: rules and regulations for administration and enforcement; claims procedure. Pension and Welfare Benefits Administration, Labor. Final regulation.

    Science.gov (United States)

    2000-11-21

    This document contains a final regulation revising the minimum requirements for benefit claims procedures of employee benefit plans covered by Title I of the Employee Retirement Income Security Act of 1974 (ERISA or the Act). The regulation establishes new standards for the processing of claims under group health plans and plans providing disability benefits and further clarifies existing standards for all other employee benefit plans. The new standards are intended to ensure more timely benefit determinations, to improve access to information on which a benefit determination is made, and to assure that participants and beneficiaries will be afforded a full and fair review of denied claims. When effective, the regulation will affect participants and beneficiaries of employee benefit plans, employers who sponsor employee benefit plans, plan fiduciaries, and others who assist in the provision of plan benefits, such as third-party benefits administrators and health service providers or health maintenance organizations that provide benefits to participants and beneficiaries of employee benefit plans.

  7. NTS MC and A History

    International Nuclear Information System (INIS)

    Mary Alice Price; Kim Young

    2008-01-01

    Within the past three and a half years, the Nevada Test Site (NTS) has progressed from a Category IV to a Category I nuclear material facility. In accordance with direction from the U.S. Department of Energy (DOE) Secretary and National Nuclear Security Administration (NNSA) Administrator, NTS received shipments of large quantities of special nuclear material from Los Alamos National Laboratory (LANL) and other sites in the DOE complex. December 2004 was the first occurrence of Category I material at the NTS, with the exception of two weeks of sub-critical underground testing in 2001, since 1992. The Material Control and Accountability (MC and A) program was originally a jointlab effort by LANL, Lawrence Livermore National Laboratory, and Bechtel Nevada, but in March 2006 the NNSA Nevada Site Office appointed the NTS Management and Operations contractor with sole responsibility. This paper will discuss the process and steps taken to transition the NTS MC and A program from multiple organizations to a single entity and from a Category IV to a Category I program. This transition flourished as MC and A progressed from the 2004 Office of Assessment (OA) rating of 'Significant Weakness' to the 2007 OA assessment rating of 'Effective Performance'. The paper will provide timelines, funding and staffing issues, OA assessment findings and corrective actions, and future expectations. The process has been challenging, but MC and A's innovative responses to the challenges have been very successful

  8. ADMINISTRATIVE PUBLIC SAFETY REGIMES IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Dmitry Bezzubov

    2017-07-01

    Full Text Available Purpose: to analyze existing threats, dangers and challenges the EU countries in terms of the present and the formulation of the basic foundations for the formation of the concept of ensuring public safety in the EU. Methods: Using a comparative method of scientific knowledge identified the major security threats in the EU and proposed substantive provisions of the administrative doctrine improve safety through the use of formal legal method. Results: the paper is dedicated to the problems of public security maintenance in the present-day context. Methods, techniques and strategies of public security maintenance as a scientific and public phenomenon are revealed. The levels of public security maintenance within the European Community are defined. Summarizing mentioned above, the concept of the service state in terms of the EU countries public security maintenance is the definition of course of development of the state mechanism and management of all administrative control branches. The main aim of which is to create mechanisms of risks and threats prevention with the respect to individuals’ rights, freedoms and legal interests in the societies of the EU countries. The concept of the service state as such is a practical result of the EU countries policy on elimination and neutralization of migration, military and terrorist threats. Discussion: in this article the author offers the basic provisions of the administrative doctrine enhance public safety in the European society.

  9. Brazilian Hybrid Security in South America

    Directory of Open Access Journals (Sweden)

    Rafael Duarte Villa

    2017-10-01

    Full Text Available Abstract Existing research on security governance in South America functions on dichotomous lines. Analysis of Brazil’s security practices is a case in point. On the one hand, scholars point out the balance of power and hegemonic institutions as the main discourse in the security practices between Brazil and its South American neighbors. On the other hand, some other emphasize the importance of democracy, cooperation on defense and security, and peaceful conflict resolution between states in the region as indicators for the emergence of a security community between Brazil and its neighbors in the South American region. The way in which multiple orders coexist is not given adequate attention in empirical research. This article seeks to overcome this dichotomy. By foregrounding Brazil’s regional security practices, particularly during the Lula and Rousseff administration, I show the hybrid and sometimes ambivalent security governance system in Brazil, where mechanisms of balance of power and security community overlap in important ways.

  10. Healthcare information privacy and security regulatory compliance and data security in the age of electronic health records

    CERN Document Server

    Robichau, Bernard Peter

    2014-01-01

    Healthcare is a huge market--20% of yearly GDP in the U.S. It employs tens of thousands of computer programmers and IT administrators Regulations mandate electronic health records by 2015 (for anyone dealing with Medicare/Medicaid), which means new concerns for privacy and security Many medical organizations lagging, putting them at risk for government fines and private lawsuits when a breach in security occurs. Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge.

  11. Network Security Hacks Tips & Tools for Protecting Your Privacy

    CERN Document Server

    Lockhart, Andrew

    2009-01-01

    This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending, and incident response.

  12. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  13. Limitation of right of codetermination of the works council in case of an administrative order for security controls

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    BetrVG section 87, sub-sec. (1), No. 1 and 7, first sentence; Atomic Energy Act section 7, sub-sec. (2), No. 5; section 17, sub-sec. (1), sentence 2. On the basis of a right of codetermination, the works council may only claim an arrangement that could be decided upon by the employer alone outside the Works Constitution Act. In case the employer is obliged by an administrative act binding upon him, to take certain measures, the works council may not claim an arrangement deviating from this directive by referring to the right of codetermination. Federal Labour Court, decision of May 26, 1988 - 1 ABR 9/87 - concerning the execution of security controls on the personnel entering the WAK. (orig./HP) [de

  14. Instant SQL Server Analysis Services 2012 Cube Security

    CERN Document Server

    Jayanty, Satya SK

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Instant Microsoft SQL Server Analysis Services 2012 Cube Security is a practical, hands-on guide that provides a number of clear, step-by-step exercises for getting started with cube security.This book is aimed at Database Administrators, Data Architects, and Systems Administrators who are managing the SQL Server data platform. It is also beneficial for analysis services developers who already have some experience with the technology, but who want to go into more detail on advanced

  15. Ceramic Seal.

    Energy Technology Data Exchange (ETDEWEB)

    Smartt, Heidi A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Romero, Juan A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Custer, Joyce Olsen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hymel, Ross W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Krementz, Dan [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Gobin, Derek [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Harpring, Larry [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Martinez-Rodriguez, Michael [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Varble, Don [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); DiMaio, Jeff [Tetramer Technologies, Pendleton, SC (United States); Hudson, Stephen [Tetramer Technologies, Pendleton, SC (United States)

    2016-11-01

    Containment/Surveillance (C/S) measures are critical to any verification regime in order to maintain Continuity of Knowledge (CoK). The Ceramic Seal project is research into the next generation technologies to advance C/S, in particular improving security and efficiency. The Ceramic Seal is a small form factor loop seal with improved tamper-indication including a frangible seal body, tamper planes, external coatings, and electronic monitoring of the seal body integrity. It improves efficiency through a self-securing wire and in-situ verification with a handheld reader. Sandia National Laboratories (SNL) and Savannah River National Laboratory (SRNL), under sponsorship from the U.S. National Nuclear Security Administration (NNSA) Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D), have previously designed and have now fabricated and tested Ceramic Seals. Tests have occurred at both SNL and SRNL, with different types of tests occurring at each facility. This interim report will describe the Ceramic Seal prototype, the design and development of a handheld standalone reader and an interface to a data acquisition system, fabrication of the seals, and results of initial testing.

  16. Ceramic Seal

    International Nuclear Information System (INIS)

    Smartt, Heidi A.; Romero, Juan A.; Custer, Joyce Olsen; Hymel, Ross W.; Krementz, Dan; Gobin, Derek; Harpring, Larry; Martinez-Rodriguez, Michael; Varble, Don; DiMaio, Jeff; Hudson, Stephen

    2016-01-01

    Containment/Surveillance (C/S) measures are critical to any verification regime in order to maintain Continuity of Knowledge (CoK). The Ceramic Seal project is research into the next generation technologies to advance C/S, in particular improving security and efficiency. The Ceramic Seal is a small form factor loop seal with improved tamper-indication including a frangible seal body, tamper planes, external coatings, and electronic monitoring of the seal body integrity. It improves efficiency through a self-securing wire and in-situ verification with a handheld reader. Sandia National Laboratories (SNL) and Savannah River National Laboratory (SRNL), under sponsorship from the U.S. National Nuclear Security Administration (NNSA) Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D), have previously designed and have now fabricated and tested Ceramic Seals. Tests have occurred at both SNL and SRNL, with different types of tests occurring at each facility. This interim report will describe the Ceramic Seal prototype, the design and development of a handheld standalone reader and an interface to a data acquisition system, fabrication of the seals, and results of initial testing.

  17. Physical protection of mobile radioactive sources commonly used in the well logging and industrial radiography industries

    International Nuclear Information System (INIS)

    Barlow, Maegon E.

    2016-01-01

    The mission of the U.S. Department of Energy/National Nuclear Security Administration's (NNSA) Office of Radiological Security (ORS) is to protect high-activity radiological materials around the globe. ORS works domestically within the United States and collaborates with over 80 countries to protect medical, industrial, research and other radiological sources from being used by malicious actors in a radiological dispersal device (RDD) or radiation exposure device (RED). One area of specific concern is mobile radioactive sources, such as those used in radiography to inspect welds or metal integrity, and those in the oil and gas industry to characterize exploration and production wells in pursuit of oil caches. These mobile radiological sources are of sufficient Curie quantities to be categorized as desirable sources for malicious actors. This presentation will provide an overview of a mobile source tracking system developed by ORS in conjunction with Pacific Northwest National Laboratory (PNNL), and will discuss how the system can contribute to source security, as well as next steps to pilot this technology

  18. 2010 Administrative Law Judge Initial Decisions

    Data.gov (United States)

    Securities and Exchange Commission — The initial decisions issued by administrative law judges in 2010 that contains findings of fact, legal conclusions, and an order that often contains a sanction....

  19. 2009 Administrative Law Judge Initial Decisions

    Data.gov (United States)

    Securities and Exchange Commission — The initial decisions issued by administrative law judges in 2009 that contains findings of fact, legal conclusions, and an order that often contains a sanction....

  20. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  1. 20 CFR 416.1452 - Consolidated hearings before an administrative law judge.

    Science.gov (United States)

    2010-04-01

    ... are involved in another claim you have pending before us. (2) If the administrative law judge decides... administrative law judge. 416.1452 Section 416.1452 Employees' Benefits SOCIAL SECURITY ADMINISTRATION..., and Reopening of Determinations and Decisions Administrative Law Judge Hearing Procedures § 416.1452...

  2. 20 CFR 405.365 - Consolidated hearing before an administrative law judge.

    Science.gov (United States)

    2010-04-01

    ... before us. (2) If the administrative law judge consolidates the claims, he or she will decide both claims... law judge. 405.365 Section 405.365 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL DISABILITY CLAIMS Administrative Law Judge Hearing § 405.365...

  3. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  4. Protecting the Privacy and Security of Your Health Information

    Science.gov (United States)

    ... can be used and shared with others. The Security Rule sets rules for how your health information must be kept secure with administrative, technical, and physical safeguards. You may have additional protections and health information rights under your State's laws. ...

  5. ADP Security Plan, Math Building, Room 1139

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.

    1985-08-27

    This document provides the draft copy of an updated (ADP) Security Plan for an IBM Personal Computer to be used in the Math Building at PNL for classified data base management. Using the equipment specified in this document and implementing the administrative and physical procedures as outlined will provide the secure environment necessary for this work to proceed.

  6. Academic Training Lecture Regular Programme: Computer Security - Introduction to information and computer security (1/4)

    CERN Multimedia

    2012-01-01

    Computer Security: Introduction to information and computer security (1/4), by Sebastian Lopienski (CERN).   Monday, 21 May, 2012 from 11:00 to 12:00 (Europe/Zurich) at CERN ( 31-3-004 - IT Auditorium ) Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Ai...

  7. 78 FR 4968 - Privacy Act of 1974, Computer Matching Program-U.S. Small Business Administration and U.S...

    Science.gov (United States)

    2013-01-23

    ... Small Business Administration (SBA) and the Department of Homeland Security, Federal Emergency... Security Officer, Office of the Chief Information Officer, Small Business Administration. Eric Won, Chief... SMALL BUSINESS ADMINISTRATION Privacy Act of 1974, Computer Matching Program--U.S. Small Business...

  8. 28 CFR 17.11 - Authority of the Assistant Attorney General for Administration.

    Science.gov (United States)

    2010-07-01

    ... Assistant Attorney General for Administration. (a) The Assistant Attorney General for Administration is... Assistant Attorney General for Administration shall appoint a Department Security Officer and may delegate... necessary to effectively implement this part. (b) The Assistant Attorney General for Administration shall...

  9. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  10. Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety

    Science.gov (United States)

    1998-05-01

    Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...

  11. Discursive field of dissertation research on the state of information security of Ukraine

    OpenAIRE

    O. S. Zozulya

    2016-01-01

    The article analyzed the of dissertations for science «Public Administration» on the problems ensuring information security of Ukraine. According to the data system catalog Vernadsky National Library of Ukraine was found that within the limits of science «Public Administration» problems of ensuring information security were devoted only 4 work. In view of the small number of dissertations, which explored the problems of public-management of ensuring information security Ukraine, we have to ad...

  12. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  13. Current Research on Containment Technologies for Verification Activities: Advanced Tools for Maintaining Continuity of Knowledge

    International Nuclear Information System (INIS)

    Smartt, H.; Kuhn, M.; Krementz, D.

    2015-01-01

    The U.S. National Nuclear Security Administration (NNSA) Office of Non-proliferation and Verification Research and Development currently funds research on advanced containment technologies to support Continuity of Knowledge (CoK) objectives for verification regimes. One effort in this area is the Advanced Tools for Maintaining Continuity of Knowledge (ATCK) project. Recognizing that CoK assurances must withstand potential threats from sophisticated adversaries, and that containment options must therefore keep pace with technology advances, the NNSA research and development on advanced containment tools is an important investment. The two ATCK efforts underway at present address the technical containment requirements for securing access points (loop seals) and protecting defined volumes. Multiple U.S. national laboratories are supporting this project: Sandia National Laboratories (SNL), Savannah River National Laboratory (SRNL), and Oak Ridge National Laboratory (ORNL). SNL and SRNL are developing the ''Ceramic Seal,'' an active loop seal that integrates multiple advanced security capabilities and improved efficiency housed within a small-volume ceramic body. The development includes an associated handheld reader and interface software. Currently at the prototype stage, the Ceramic Seal will undergo a series of tests to determine operational readiness. It will be field tested in a representative verification trial in 2016. ORNL is developing the Whole Volume Containment Seal (WCS), a flexible conductive fabric capable of enclosing various sizes and shapes of monitored items. The WCS includes a distributed impedance measurement system for imaging the fabric surface area and passive tamper-indicating features such as permanent-staining conductive ink. With the expected technology advances from the Ceramic Seal and WCS, the ATCK project takes significant steps in advancing containment technologies to help maintain CoK for various verification

  14. The complexities of HIPAA and administration simplification.

    Science.gov (United States)

    Mozlin, R

    2000-11-01

    The Health Insurance Portability and Accessibility Act (HIPAA) was signed into law in 1996. Although focused on information technology issues, HIPAA will ultimately impact day-to-day operations at multiple levels within any clinical setting. Optometrists must begin to familiarize themselves with HIPAA in order to prepare themselves to practice in a technology-enriched environment. Title II of HIPAA, entitled "Administration Simplification," is intended to reduce the costs and administrative burden of healthcare by standardizing the electronic transmission of administrative and financial transactions. The Department of Health and Human Services is expected to publish the final rules and regulations that will govern HIPAA's implementation this year. The rules and regulations will cover three key aspects of healthcare delivery: electronic data interchange (EDI), security and privacy. EDI will standardize the format for healthcare transactions. Health plans must accept and respond to all transactions in the EDI format. Security refers to policies and procedures that protect the accuracy and integrity of information and limit access. Privacy focuses on how the information is used and disclosure of identifiable health information. Security and privacy regulations apply to all information that is maintained and transmitted in a digital format and require administrative, physical, and technical safeguards. HIPAA will force the healthcare industry to adopt an e-commerce paradigm and provide opportunities to improve patient care processes. Optometrists should take advantage of the opportunity to develop more efficient and profitable practices.

  15. 77 FR 51842 - Social Security Acquiescence Ruling (AR) 12-X(8); Petersen v. Astrue, 633 F.3d 633 (8th Cir. 2011...

    Science.gov (United States)

    2012-08-27

    ..., 1-800-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0046] Social Security Acquiescence Ruling (AR... Social Security Act AGENCY: Social Security Administration. ACTION: Notice of Social Security...

  16. Report of Official Foreign Travel to Canada 2-10 August 2002

    Energy Technology Data Exchange (ETDEWEB)

    Mason, J.D

    2002-08-26

    In support of DOE's use of SGML, XML, HTML, and related standards, I have served since 1985 as Chairman of the international committee responsible for SGML and related standards, ISO/IEC JTC1/SC34 (SC34) and its predecessor organizations. During my August 2002 trip, I attended the summer 2002 meeting of SC34/WG3 in Montreal, Canada. I also read a paper at Extreme Markup Languages 2002, a major conference on the use of SGML and XML sponsored by IDEAlliance. Supporting standards development allows the Department of Energy/National Nuclear Security Administration (DOE/NNSA) and the Y-12 National Security Complex (Y-12) the opportunity both to provide input into the process and to benefit from contact with some of the leading experts in the subject matter. Oak Ridge has been for some years the location to which other DOE sites turn for expertise in SGML, XML, and related topics.

  17. DOE 2012 occupational radiation exposure

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-10-01

    The U.S. Department of Energy (DOE) Office of Analysis within the Office of Health, Safety and Security (HSS) publishes the annual DOE Occupational Radiation Exposure Report to provide an overview of the status of radiation protection practices at DOE (including the National Nuclear Security Administration [NNSA]). The DOE 2012 Occupational Radiation Exposure Report provides an evaluation of DOE-wide performance regarding compliance with Title 10, Code of Federal Regulations (C.F.R.), Part 835, Occupational Radiation Protection dose limits and as low as reasonably achievable (ALARA) process requirements. In addition, the report provides data to DOE organizations responsible for developing policies for protection of individuals from the adverse health effects of radiation. The report provides a summary and an analysis of occupational radiation exposure information from the monitoring of individuals involved in DOE activities. Over the past 5-year period, the occupational radiation exposure information is analyzed in terms of aggregate data, dose to individuals, and dose by site.

  18. DOE 2011 occupational radiation exposure

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2012-12-01

    The U.S. Department of Energy (DOE) Office of Analysis within the Office of Health, Safety and Security (HSS) publishes the annual DOE Occupational Radiation Exposure Report to provide an overview of the status of radiation protection practices at DOE (including the National Nuclear Security Administration [NNSA]). The DOE 2011 Occupational Radiation Exposure Report provides an evaluation of DOE-wide performance regarding compliance with Title 10, Code of Federal Regulations (C.F.R.), Part 835, Occupational Radiation Protection dose limits and as low as reasonably achievable (ALARA) process requirements. In addition, the report provides data to DOE organizations responsible for developing policies for protection of individuals from the adverse health effects of radiation. The report provides a summary and an analysis of occupational radiation exposure information from the monitoring of individuals involved in DOE activities. The occupational radiation exposure information is analyzed in terms of aggregate data, dose to individuals, and dose by site over the past five years.

  19. DOE 2013 occupational radiation exposure

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2014-11-01

    The Office of Analysis within the U.S. Department of Energy (DOE) Office of Environment, Health, Safety and Security (EHSS) publishes the annual DOE Occupational Radiation Exposure Report to provide an overview of the status of radiation protection practices at DOE (including the National Nuclear Security Administration [NNSA]). The DOE 2013 Occupational Radiation Exposure Report provides an evaluation of DOE-wide performance regarding compliance with Title 10, Code of Federal Regulations (C.F.R.), Part 835, Occupational Radiation Protection dose limits and as low as reasonably achievable (ALARA) process requirements. In addition, the report provides data to DOE organizations responsible for developing policies for protection of individuals from the adverse health effects of radiation. The report provides a summary and an analysis of occupational radiation exposure information from the monitoring of individuals involved in DOE activities. Over the past five-year period, the occupational radiation exposure information has been analyzed in terms of aggregate data, dose to individuals, and dose by site.

  20. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  1. Industrial Sites Project Establishment of Final Action Levels

    International Nuclear Information System (INIS)

    Boehlecke, Robert F.

    2006-01-01

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees numerous sites on the Nevada Test Site (NTS) and other locations in the State of Nevada that have been impacted by activities related to the development and testing of nuclear devices and by other activities. NNSA/NSO is responsible for protecting members of the public, including site workers, from harmful exposure to both chemical and radiological contaminants at these sites as they remediate these sites. The Nevada Division of Environmental Protection (NDEP) is the primary state agency responsible for protection of human health and the environment with respect to chemical and radiological wastes. In 1996 the DOE, U.S. Department of Defense, and the State of Nevada entered into an agreement known as the ''Federal Facility Agreement and Consent Order'' (FFACO) (1996). Appendix VI to the FFACO describes the strategy employed to plan, implement, and complete environmental corrective action activities at NTS and other locations in the state of Nevada. One of the categories of corrective action units (CAUs) is Industrial Sites, which consists of approximately 1,150 locations that may require some level of investigation and corrective action. To evaluate the need for the extent of corrective action at a particular site, NNSA/NSO assesses the potential impacts to receptors by comparing measurements of contaminant concentrations to risk-based (chemical) and dose-based (radionuclide) standards (action levels). Preliminary action levels (PALs) are established as part of the data quality objective (DQO) process, and are presented in one or more FFACO documents generated as part of the corrective action process. This document formally defines and clarifies the NDEP-approved process NNSA/NSO Industrial Sites Project uses to fulfill the requirements of the FFACO and state regulations. This process establishes final action levels (FALs) based on the risk

  2. 76 FR 11433 - Federal Transition To Secure Hash Algorithm (SHA)-256

    Science.gov (United States)

    2011-03-02

    ... ADMINISTRATION [FAR-N-2011-01; Docket No. 2011-0083; Sequence 1] Federal Transition To Secure Hash Algorithm (SHA... acquisition community to transition to Secure Hash Algorithm SHA-256. SHA-256 is a cryptographic hash function... persons attending. Please cite ``Federal Transition to Secure Hash Algorithm SHA-256'' in all...

  3. 49 CFR 234.211 - Security of warning system apparatus.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Security of warning system apparatus. 234.211... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GRADE CROSSING SIGNAL SYSTEM SAFETY AND STATE ACTION PLANS Maintenance, Inspection, and Testing Maintenance Standards § 234.211 Security of warning system apparatus...

  4. The Security Gap in Syria: Individual and Collective Security in ‘Rebel-held’ Territories

    Directory of Open Access Journals (Sweden)

    Ali Abdul Kadir Ali

    2015-07-01

    Full Text Available This paper examines security in Syria through the conceptual lens of the security gap, understood as the gap between security practices and objectives which have implications for individual and collective security. Practices of security can be the state apparatus, the military, and militias. The objective – safety – can refer to the safety or security of a range of collectives including the state, political parties, and ethnic groups, while individual security refers to the general safety of inhabitants and the protection of human rights. This paper compares the security situation in so-called ‘rebel-held’ areas of Syria where alternative governance structures have emerged, examining the security approaches of Local Administrative Councils and Rebel Councils in Deir Azzor, Manbij, Dera, and areas dominated by the Kurdish Democratic Union Party (PYD. It argues that security and safety are strongly influenced by authority formation and the nature of deals and relationships involved in the formation of these nascent authorities. It also argues that security in these areas is strongly influenced by the Syrian government, which disrupts collectives that threaten its own collective security while giving limited support to those which serve its agenda of retaining power. It also demonstrates the limited utility of the ‘regime’ vs. ‘rebel-held’ dichotomy, as rebel groups at times must accommodate the Syrian state in limited ways for instrumental purposes. The article is based on fieldwork conducted in Turkey in 2013–2014, interviews conducted in 2015, and secondary sources based on field research.

  5. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    Science.gov (United States)

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  6. Social Security Number Verification Service (SSNVS)

    Data.gov (United States)

    Social Security Administration — SSNVS is a service offered by SSA's Business Services Online (BSO). It is used by employers and certain third-party submitters to verify the accuracy of the names...

  7. Site Environmental Report for 2010 Sandia National Laboratories, California.

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Barbara L.

    2011-06-01

    Sandia National Laboratories, California (SNL/CA) is a government-owned/contractor-operated laboratory. Sandia Corporation, a Lockheed Martin Company, manages and operates the laboratory for the Department of Energy's National Nuclear Security Administration (NNSA). The NNSA Sandia Site Office administers the contract and oversees contractor operations at the site. This Site Environmental Report for 2010 was prepared in accordance with DOE Order 231.1A (DOE 2004a). The report provides a summary of environmental monitoring information and compliance activities that occurred at SNL/CA during calendar year 2010. General site and environmental program information is also included. The Site Environmental Report is divided into ten chapters. Chapter 1, the Executive Summary, highlights compliance and monitoring results obtained in 2010. Chapter 2 provides a brief introduction to SNL/CA and the existing environment found on site. Chapter 3 summarizes SNL/CA's compliance activities with the major environmental requirements applicable to site operations. Chapter 4 presents information on environmental management, performance measures, and environmental programs. Chapter 5 presents the results of monitoring and surveillance activities in 2010. Chapter 6 discusses quality assurance. Chapters 7 through 9 provide supporting information for the report and Chapter 10 is the report distribution list.

  8. Site environmental report for 2009 : Sandia National Laboratories, California.

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Barbara L.

    2010-06-01

    Sandia National Laboratories, California (SNL/CA) is a government-owned/contractor-operated laboratory. Sandia Corporation, a Lockheed Martin Company, operates the laboratory for the Department of Energy's National Nuclear Security Administration (NNSA). The NNSA Sandia Site Office oversees operations at the site, using Sandia Corporation as a management and operating contractor. This Site Environmental Report for 2009 was prepared in accordance with DOE Order 231.1A (DOE 2004a). The report provides a summary of environmental monitoring information and compliance activities that occurred at SNL/CA during calendar year 2009. General site and environmental program information is also included. The Site Environmental Report is divided into ten chapters. Chapter 1, the Executive Summary, highlights compliance and monitoring results obtained in 2009. Chapter 2 provides a brief introduction to SNL/CA and the existing environment found on site. Chapter 3 summarizes SNL/CA's compliance activities with the major environmental requirements applicable to site operations. Chapter 4 presents information on environmental management, performance measures, and environmental programs. Chapter 5 presents the results of monitoring and surveillance activities in 2009. Chapter 6 discusses quality assurance. Chapters 7 through 9 provide supporting information for the report and Chapter 10 is the report distribution list.

  9. RF Regional Technical Centers for MPC and A Sustainability Operations

    International Nuclear Information System (INIS)

    Lambert, L D; Toth, W J; Hendrickson, S

    2004-01-01

    The National Nuclear Security Administration (NNSA) programmatic vision to be a catalyst in Russia's assumption of responsibility for long-term system operation is exemplified in the sustainability cooperation with the RF Ministry of Defense (MOD). An identified goal for the MPC and A Program is to encourage the development of Russian Federation (RF) capabilities and commitments to operate and maintain safeguard improvements. The RF MOD Technical Support Center development fulfills the NNSA mission and MPC and A Program goal. The regional technical center concept involves a systematic approach to aid in the determination of the level of sustainability assistance required to transition operators, maintenance, training, and testing of MPC and A systems to the RF MOD. This paper describes the process used to create the RF MOD Technical support center. First are described the needs analyses conducted to determine the key system sustainability factors requiring support. These sustainability functions are then compiled to influence the form and ultimate physical design of the technical support center. Operational interfaces are described, in detail that show the benefit of the center to the individual sites. Finally, benefits relating to information accessibility and other economies of scale are described that highlight the central center concept's strengths

  10. Feasibility studies to establish at the Kazakhstan Ulba metallurgical plant the manufacturing capability to produce low-enriched uranium certified reference materials

    Energy Technology Data Exchange (ETDEWEB)

    Kuzminski, Jozef [Los Alamos National Laboratory; Nesuhoff, J [NBL; Cratto, P [NBL; Pfennigwerth, G [Y12 NATIONAL SEC. COMPLEX; Mikhailenko, A [ULBA METALLURGICAL PLANT; Maliutina, I [ULBA METALLURGICAL PLANT; Nations, J [GREGG PROTECTION SERVICES

    2009-01-01

    One of the salient features of the transition plan that the United States Department of Energy/National Nuclear Security Administration (DOE/NNSA) is presently implementing in the Former Soviet Union countries is the availability of uranium certified reference materials for calibration of nondestructive assay (NDA) measurement equipment. To address this challenge, DOE/NNSA and U.S. national laboratories have focused their cooperative efforts on establishing a reliable source for manufacturing, certifying, and supplying of such standards. The Ulba Metallurgical Plant (UMP), Kazakhstan, which processes large quantities of low-enriched uranium to produce ceramic fuel pellets for nuclear-powered reactors, is well situated to become a key supplier of low-enriched uranium certified reference materials for the country and Central Asia region. We have recently completed Phase I of a feasibility study to establish at UMP capabilities of manufacturing these standards. In this paper we will discuss details of a proposed methodology for uranium down-blending, material selection and characterization, and a proposed methodology of measurement by destructive (DA) and non-destructive (NDA) analysis to form a database for material certification by the competent State authorities in the Republic of Kazakhstan. In addition, we will discuss the prospect for manufacturing of such standards at UMP.

  11. Phase II Transport Model of Corrective Action Unit 98: Frenchman Flat, Nevada Test Site, Nye County, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Gregg Ruskuaff

    2010-01-01

    This document, the Phase II Frenchman Flat transport report, presents the results of radionuclide transport simulations that incorporate groundwater radionuclide transport model statistical and structural uncertainty, and lead to forecasts of the contaminant boundary (CB) for a set of representative models from an ensemble of possible models. This work, as described in the Federal Facility Agreement and Consent Order (FFACO) Underground Test Area (UGTA) strategy (FFACO, 1996; amended 2010), forms an essential part of the technical basis for subsequent negotiation of the compliance boundary of the Frenchman Flat corrective action unit (CAU) by Nevada Division of Environmental Protection (NDEP) and National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Underground nuclear testing via deep vertical shafts was conducted at the Nevada Test Site (NTS) from 1951 until 1992. The Frenchman Flat area, the subject of this report, was used for seven years, with 10 underground nuclear tests being conducted. The U.S. Department of Energy (DOE), NNSA/NSO initiated the UGTA Project to assess and evaluate the effects of underground nuclear tests on groundwater at the NTS and vicinity through the FFACO (1996, amended 2010). The processes that will be used to complete UGTA corrective actions are described in the “Corrective Action Strategy” in the FFACO Appendix VI, Revision No. 2 (February 20, 2008).

  12. Calendar Year 2016 Annual Groundwater Monitoring Report.

    Energy Technology Data Exchange (ETDEWEB)

    Copland, John R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jackson, Timmie Okchumpulla [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Li, Jun [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mitchell, Michael Marquand [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skelly, Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    Sandia National Laboratories, New Mexico (SNL/NM) is a government-owned/contractoroperated laboratory. National Technology and Engineering Solutions of Sandia, LLC, a wholly owned subsidiary of Honeywell International, Inc., manages and operates SNL/NM for the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA). The DOE/NNSA Sandia Field Office administers the contract and oversees contractor operations at the site. Two types of groundwater surveillance monitoring are conducted at SNL/NM: (1) on a site-wide basis as part of the SNL/NM Long-Term Stewardship (LTS) Program’s Groundwater Monitoring Program (GMP) Groundwater Surveillance Task and (2) on a site-specific groundwater monitoring at LTS/Environmental Restoration (ER) Operations sites with ongoing groundwater investigations. This Annual Groundwater Monitoring Report summarizes data collected during groundwater monitoring events conducted at GMP locations and at the following SNL/NM sites through December 31, 2016: Burn Site Groundwater Area of Concern (AOC); Chemical Waste Landfill; Mixed Waste Landfill; Technical Area-V Groundwater AOC; and the Tijeras Arroyo Groundwater AOC. Environmental monitoring and surveillance programs are required by the New Mexico Environment Department (NMED) and DOE Order 436.1, Departmental Sustainability, and DOE Order 231.1B, Environment, Safety, and Health Reporting.

  13. The Community Environmental Monitoring Program: Reducing Public Perception of Risk through Stakeholder Involvement

    International Nuclear Information System (INIS)

    William T. Hartwell

    2007-01-01

    The Community Environmental Monitoring Program (CEMP) has promoted stakeholder involvement, awareness, and understanding of radiological surveillance in communities surrounding the Nevada Test Site (NTS) since 1981. It involves stakeholders in the operation, data collection, and dissemination of information obtained from a network of 29 stations across a wide area of Nevada, Utah and California. It is sponsored by the U.S. Department of Energy, National Nuclear Security Administration's Nevada Site Office (NNSA/NSO) and administered by the Desert Research Institute (DRI) of the Nevada System of Higher Education. Integration of a near real-time communications system, a public web site, training workshops for involved stakeholders, and educational programs all help to alleviate public perception of risk of health effects from past activities conducted at the NTS

  14. The Mesoscale Science of the Matter-Radiation Interactions in Extremes (MaRIE) project

    Energy Technology Data Exchange (ETDEWEB)

    Kippen, Karen Elizabeth [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Montoya, Donald Raymond [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-08-17

    The National Nuclear Security Administration (NNSA) requires the ability to understand and test how material structures, defects, and interfaces determine performance in extreme environments such as in nuclear weapons. To do this, MaRIE will be an x-ray source that is laser-like and brilliant with very fl exible and fast pulses to see at weapons-relevant time scales, and with high enough energy to study critical materials. The Department of Energy (DOE) has determined there is a mission need for MaRIE to deliver this capability. MaRIE can use some of the existing infrastructure of the Los Alamos Neutron Science Center (LANSCE) and its accelerator capability. MaRIE will be built as a strategic partnership of DOE national laboratories and university collaborators.

  15. 78 FR 9987 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-02-12

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security...

  16. 78 FR 22361 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-04-15

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security...

  17. Improving Mental Health Reporting Practices in Between Personnel Security Investigations

    Science.gov (United States)

    2017-06-01

    derogatory information, unfavorable administrative actions, and adverse actions to the appropriate personnel security, human resources , and...national security clearance? What type of clearances do people typically have (e.g., Secret, Top Secret, TS/SCI, SAP , etc.)? (2) Does [the

  18. 78 FR 5122 - NASA Security and Protective Services Enforcement

    Science.gov (United States)

    2013-01-24

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION 14 CFR Parts 1203a, 1203b, and 1204 [Docket No NASA-2012-0007] RIN 2700-AD89 NASA Security and Protective Services Enforcement AGENCY: National Aeronautics... nonsubstantive changes to NASA regulations to clarify the procedures for establishing controlled/ secure areas...

  19. 49 CFR 176.4 - Port security and safety regulations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Port security and safety regulations. 176.4... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS REGULATIONS CARRIAGE BY VESSEL General § 176.4 Port security and safety regulations. (a) Each carrier, master, agent, and charterer of a...

  20. Corrective Action Plan for Corrective Action Unit 139: Waste Disposal Sites, Nevada Test Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2007-07-01

    Corrective Action Unit (CAU) 139, Waste Disposal Sites, is listed in the Federal Facility Agreement and Consent Order (FFACO) of 1996 (FFACO, 1996). CAU 139 consists of seven Corrective Action Sites (CASs) located in Areas 3, 4, 6, and 9 of the Nevada Test Site (NTS), which is located approximately 65 miles (mi) northwest of Las Vegas, Nevada (Figure 1). CAU 139 consists of the following CASs: CAS 03-35-01, Burn Pit; CAS 04-08-02, Waste Disposal Site; CAS 04-99-01, Contaminated Surface Debris; CAS 06-19-02, Waste Disposal Site/Burn Pit; CAS 06-19-03, Waste Disposal Trenches; CAS 09-23-01, Area 9 Gravel Gertie; and CAS 09-34-01, Underground Detection Station. Details of the site history and site characterization results for CAU 139 are provided in the approved Corrective Action Investigation Plan (CAIP) (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2006) and in the approved Corrective Action Decision Document (CADD) (NNSA/NSO, 2007). The purpose of this Corrective Action Plan (CAP) is to present the detailed scope of work required to implement the recommended corrective actions as specified in Section 4.0 of the approved CADD (NNSA/NSO, 2007). The approved closure activities for CAU 139 include removal of soil and debris contaminated with plutonium (Pu)-239, excavation of geophysical anomalies, removal of surface debris, construction of an engineered soil cover, and implementation of use restrictions (URs). Table 1 presents a summary of CAS-specific closure activities and contaminants of concern (COCs). Specific details of the corrective actions to be performed at each CAS are presented in Section 2.0 of this report.

  1. Corrective Action Plan for Corrective Action Unit 139: Waste Disposal Sites, Nevada Test Site, Nevada

    International Nuclear Information System (INIS)

    NSTec Environmental Restoration

    2007-01-01

    Corrective Action Unit (CAU) 139, Waste Disposal Sites, is listed in the Federal Facility Agreement and Consent Order (FFACO) of 1996 (FFACO, 1996). CAU 139 consists of seven Corrective Action Sites (CASs) located in Areas 3, 4, 6, and 9 of the Nevada Test Site (NTS), which is located approximately 65 miles (mi) northwest of Las Vegas, Nevada (Figure 1). CAU 139 consists of the following CASs: CAS 03-35-01, Burn Pit; CAS 04-08-02, Waste Disposal Site; CAS 04-99-01, Contaminated Surface Debris; CAS 06-19-02, Waste Disposal Site/Burn Pit; CAS 06-19-03, Waste Disposal Trenches; CAS 09-23-01, Area 9 Gravel Gertie; and CAS 09-34-01, Underground Detection Station. Details of the site history and site characterization results for CAU 139 are provided in the approved Corrective Action Investigation Plan (CAIP) (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2006) and in the approved Corrective Action Decision Document (CADD) (NNSA/NSO, 2007). The purpose of this Corrective Action Plan (CAP) is to present the detailed scope of work required to implement the recommended corrective actions as specified in Section 4.0 of the approved CADD (NNSA/NSO, 2007). The approved closure activities for CAU 139 include removal of soil and debris contaminated with plutonium (Pu)-239, excavation of geophysical anomalies, removal of surface debris, construction of an engineered soil cover, and implementation of use restrictions (URs). Table 1 presents a summary of CAS-specific closure activities and contaminants of concern (COCs). Specific details of the corrective actions to be performed at each CAS are presented in Section 2.0 of this report

  2. Cooperation on Improved Isotopic Identification and Analysis Software for Portable, Electrically Cooled High-Resolution Gamma Spectrometry Systems Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Dreyer, Jonathan G. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wang, Tzu-Fang [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Vo, Duc T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Funk, Pierre F. [Inst. for Radiological Protection and Nuclear Safety (IRSN), Fontenay-aux-Roses (France); Weber, Anne-Laure [Inst. for Radiological Protection and Nuclear Safety (IRSN), Fontenay-aux-Roses (France)

    2017-07-20

    Under a 2006 agreement between the Department of Energy (DOE) of the United States of America and the Institut de Radioprotection et de Sûreté Nucléaire (IRSN) of France, the National Nuclear Security Administration (NNSA) within DOE and IRSN initiated a collaboration to improve isotopic identification and analysis of nuclear material [i.e., plutonium (Pu) and uranium (U)]. The specific aim of the collaborative project was to develop new versions of two types of isotopic identification and analysis software: (1) the fixed-energy response-function analysis for multiple energies (FRAM) codes and (2) multi-group analysis (MGA) codes. The project is entitled Action Sheet 4 – Cooperation on Improved Isotopic Identification and Analysis Software for Portable, Electrically Cooled, High-Resolution Gamma Spectrometry Systems (Action Sheet 4). FRAM and MGA/U235HI are software codes used to analyze isotopic ratios of U and Pu. FRAM is an application that uses parameter sets for the analysis of U or Pu. MGA and U235HI are two separate applications that analyze Pu or U, respectively. They have traditionally been used by safeguards practitioners to analyze gamma spectra acquired with high-resolution gamma spectrometry (HRGS) systems that are cooled by liquid nitrogen. However, it was discovered that these analysis programs were not as accurate when used on spectra acquired with a newer generation of more portable, electrically cooled HRGS (ECHRGS) systems. In response to this need, DOE/NNSA and IRSN collaborated to update the FRAM and U235HI codes to improve their performance with newer ECHRGS systems. Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL) performed this work for DOE/NNSA.

  3. Facility Closure Report for T-Tunnel (U12T), Area 12, Nevada Test Site, Nevada

    International Nuclear Information System (INIS)

    2008-01-01

    This Facility Closure Report (FCR) has been prepared to document the actions taken to permanently close the remaining accessible areas of U12t-Tunnel (T-Tunnel) in Area 12 of the Nevada Test Site (NTS). The closure of T-Tunnel was a prerequisite to transfer facility ownership from the Defense Threat Reduction Agency (DTRA) to the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Closure of the facility was accomplished with the cooperation and concurrence of both NNSA/NSO and the Nevada Division of Environmental Protection (NDEP). The purpose of this FCR is to document that the closure of T-Tunnel complied with the closure requirements specified in the Facility Closure Plan for N- and T-Tunnels Area 12, Nevada Test Site (Appendix D) and that the facility is ready for transfer to NNSA/NSO. The Facility Closure Plan (FCP) is provided in Appendix D. T-Tunnel is located approximately 42 miles north of Mercury in Area 12 of the NTS (Figure 1). Between 1970 and 1987, T-Tunnel was used for six Nuclear Weapons Effects Tests (NWETs). The tunnel was excavated horizontally into the volcanic tuffs of Rainier Mesa. The T-Tunnel complex consists of a main access drift with two NWET containment structures, a Gas Seal Plug (GSP), and a Gas Seal Door (GSD) (Figure 2). The T-Tunnel complex was mothballed in 1993 to preserve the tunnel for resumption of testing, should it happen in the future, to stop the discharge of tunnel effluent, and to prevent unauthorized access. This was accomplished by sealing the main drift GSD

  4. 20 CFR 220.37 - When a child's disability determination is governed by the regulations of the Social Security...

    Science.gov (United States)

    2010-04-01

    ...) Inclusion as a disabled child in the employee's annuity rate under the social security overall minimum. (2... governed by the regulations of the Social Security Administration. 220.37 Section 220.37 Employees... Disability Determinations Governed by the Regulations of the Social Security Administration § 220.37 When a...

  5. 21 CFR 203.34 - Policies and procedures; administrative systems.

    Science.gov (United States)

    2010-04-01

    ... distribution security and audit system, including conducting random and for-cause audits of sales... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Policies and procedures; administrative systems...; administrative systems. Each manufacturer or authorized distributor of record that distributes drug samples shall...

  6. 78 FR 59706 - Secure Supply Chain Pilot Program; Correction

    Science.gov (United States)

    2013-09-27

    ...] Secure Supply Chain Pilot Program; Correction AGENCY: Food and Drug Administration, HHS. ACTION: Notice... Federal Register of August 20, 2013 (78 FR 51192). The document announced the start of the Secure Supply Chain Pilot Program (SSCPP). The document was published with an incorrect email address for the SSCPP...

  7. 13 CFR 102.33 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Security of systems of records....33 Security of systems of records. (a) Each Program/Support Office Head or designee shall establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent...

  8. Interagency Security Classification Appeals Panel (ISCAP) Decisions

    Data.gov (United States)

    National Archives and Records Administration — This online collection includes documents decided upon by the Interagency Security Classification Appeals Panel (ISCAP) starting in Fiscal Year 2012. The documents...

  9. 20 CFR 405.301 - Hearing before an administrative law judge-general.

    Science.gov (United States)

    2010-04-01

    ... law judge. (c) You may examine the evidence used in making the decision or determination under review... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Hearing before an administrative law judge-general. 405.301 Section 405.301 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW...

  10. Information System Security: Air Force Web Site Administration, Policies, and Practices

    National Research Council Canada - National Science Library

    2002-01-01

    .... Subsequent reports will cover Web site administration within the Army and DoD. The Naval Audit Service plans to issue a separate report based on the audit of Web site administration within the Navy and the Marine Corps...

  11. Healthcare security staffing for smaller facilities: where science meets art.

    Science.gov (United States)

    Warren, Bryan

    2013-01-01

    Obtaining effective security resourcing and staffing for smaller healthcare facilities presents many difficulties, according to the author In this article, he provides guidance to security practitioners on taking existing data and translating it into a language that administration will understand and appreciate.

  12. A different paradigm for security planning

    International Nuclear Information System (INIS)

    Hagengruber, R.

    2002-01-01

    Full text: Security costs at nuclear facilities have been relatively high for many years. Since the 1970s, these expenditures in the United States have grown much faster than inflation. After the tragedy of September 11, the rate of increase appears to be exponential. Within the National Nuclear Security Administration, the cost of security now is about 10 % of the entire budget. Research and Development (R and D) has played a role in modern security, but the rate of advancement of security technology has not been sufficient to moderate the increasing costs and performance demands. Part of this problem is associated with both an inadequate investment level and the lack of a visionary roadmap for security technology. The other element of the problem is the lack of a strategic framework or architecture that would allow security technology to be effectively placed in an overall context of functionality. A new concept for an architecture for security will be presented. Within this architecture, a different approach to design, use of technology, and evaluation of effectiveness will be offered. Promising areas of technology and design will be illustrated by specific examples and suggestions for advanced R and D will be made. (author)

  13. 78 FR 76738 - Updated Statements of Legal Authority for the Export Administration Regulations

    Science.gov (United States)

    2013-12-19

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Parts 730, 732, 734, 736, 738, 740... Administration Regulations AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule. SUMMARY: This... INFORMATION CONTACT: William Arvin, Regulatory Policy Division, Bureau of Industry and Security, Telephone...

  14. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    The Administration is claiming success in reversing the deterioration in security that had become acute by the end of 2006, attributing the gains to a troop surge strategy announced by President Bush on January 10, 2007...

  15. 46 CFR 308.507 - Security for payment of premiums.

    Science.gov (United States)

    2010-10-01

    ....507 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance Ii-Open Policy War Risk Cargo Insurance § 308.507 Security for payment of... collateral deposit fund or a surety bond, to secure the payment of the premiums, in an amount which shall at...

  16. 20 CFR 418.3005 - Purpose and administration of the program.

    Science.gov (United States)

    2010-04-01

    ... and Human Services has responsibility for administration of the Medicare program, including the new.... 418.3005 Section 418.3005 Employees' Benefits SOCIAL SECURITY ADMINISTRATION MEDICARE SUBSIDIES... drug coverage for individuals who meet certain income and resources requirements under the law as...

  17. 20 CFR 404.952 - Consolidated hearing before an administrative law judge.

    Science.gov (United States)

    2010-04-01

    ... before us. (2) If the administrative law judge decides to hold the hearing on both claims, he or she... law judge. 404.952 Section 404.952 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... Determinations and Decisions Administrative Law Judge Hearing Procedures § 404.952 Consolidated hearing before an...

  18. Best Practices for the Security of Radioactive Materials

    Energy Technology Data Exchange (ETDEWEB)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices

  19. Best Practices for the Security of Radioactive Materials

    International Nuclear Information System (INIS)

    Coulter, D.T.; Musolino, S.

    2009-01-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass

  20. Nuclear relations with administrations of industry services

    International Nuclear Information System (INIS)

    Bernardez Garcia, A.

    2011-01-01

    The object of the article is to try to answer to the following question that can arise to the holder of a nuclear power station: What Administration of Industry must I myself direct to be able to support my complementary facilities of Industrial Security inside the in force legality?. The raised discussion arise between if the competent administration for the legal steps, is the Central Administration across his delegates and sub delegates of government, or is of the Territorial Services of Industry of Autonomous communities. (Author)