145 Matching Results

Search Results

Advanced search parameters have been applied.

US assistance in physical protection at the Kharkov Institute of Physics and Technology and the Sevastopol Institute of Nuclear Energy and Industry, Ukraine

Description: The U.S. DOE is providing nuclear material safeguards assistance in both material control & accountability and physical protection to several nuclear facilities in Ukraine. This paper describes the types of physical protection upgrades that are presently being implemented at the Kharkov Institute of Physics and Technology and at the Sevastopol Institute of Nuclear Energy and Industry. These upgrades include: hardening of storage areas, improvements in access control, intrusion detection, CCTV assessment, alarm monitoring and voice communication systems. Methods used to implement these upgrades and problems encountered are discussed. 4 refs., 2 figs.
Date: September 1, 1997
Creator: Zinneman, T.; Miranda, J.; Novick, A.; Roche, C. & Kuzmyez, G.
Partner: UNT Libraries Government Documents Department

Process of system design and analysis

Description: The design of an effective physical protection system includes the determination of the physical protection system objectives, the initial design of a physical protection system, the evaluation of the design, and, probably, a redesign or refinement of the system. To develop the objectives, the designer must begin by gathering information about facility operations and conditions, such as a comprehensive description of the facility, operating states, and the physical protection requirements. The designer then needs to define the threat. This involves considering factors about potential adversaries: Class of adversary, adversary`s capabilities, and range of adversary`s tactics. Next, the designer should identify targets. Determination of whether or not nuclear materials are attractive targets is based mainly on the ease or difficulty of acquisition and desirability of the materiaL The designer now knows the objectives of the physical protection system, that is, ``What to protect against whom.`` The next step is to design the system by determining how best to combine such elements as fences, vaults, sensors, procedures, communication devices, and protective force personnel to meet the objectives of the system. Once a physical protection system is designed, it must be analyzed and evaluated to ensure it meets the physical protection objectives. Evaluation must allow for features working together to assure protection rather than regarding each feature separately. Due to the complexity of protection systems, an evaluation usually requires modeling techniques. If any vulnerabilities are found, the initial system must be redesigned to correct the vulnerabilities and a reevaluation conducted.
Date: September 1, 1995
Creator: Gardner, B.
Partner: UNT Libraries Government Documents Department

Cost and performance analysis of physical security systems

Description: CPA - Cost and Performance Analysis - is a prototype integration of existing PC-based cost and performance analysis tools: ACEIT (Automated Cost Estimating Integrated Tools) and ASSESS (Analytic System and Software for Evaluating Safeguards and Security). ACE is an existing DOD PC-based tool that supports cost analysis over the full life cycle of a system; that is, the cost to procure, operate, maintain and retire the system and all of its components. ASSESS is an existing DOE PC-based tool for analysis of performance of physical protection systems. Through CPA, the cost and performance data are collected into Excel workbooks, making the data readily available to analysts and decision makers in both tabular and graphical formats and at both the system and subsystem levels. The structure of the cost spreadsheets incorporates an activity-based approach to cost estimation. Activity-based costing (ABC) is an accounting philosophy used by industry to trace direct and indirect costs to the products or services of a business unit. By tracing costs through security sensors and procedures and then mapping the contributions of the various sensors and procedures to system effectiveness, the CPA architecture can provide security managers with information critical for both operational and strategic decisions. The architecture, features and applications of the CPA prototype are presented. 5 refs., 3 figs.
Date: June 1, 1997
Creator: Hicks, M.J.; Yates, D. & Jago, W.H.
Partner: UNT Libraries Government Documents Department

Surface micromachined counter-meshing gears discrimination device

Description: This paper discusses the design, fabrication and testing of a surface micromachined Counter-Meshing Gears (CMG) discrimination device which functions as a mechanically coded lock, A 24 bit code is input to unlock the device. Once unlocked, the device provides a path for an energy or information signal to pass through the device. The device is designed to immediately lock up if any portion of the 24 bit code is incorrect. The motivation for the development of this device is based on occurrences referred to as High Consequence Events, A High Consequence Event is an event where an inadvertent operation of a system could result in the catastrophic loss of life, property, or damage to the environment.
Date: January 1, 1998
Creator: Polosky, M.A.; Garcia, E.J. & Allen, J.J.
Partner: UNT Libraries Government Documents Department

Door assembly diagram: DWG {number_sign}S12789

Description: This report consists of one engineering drawing of a door assembly suitable for a vault. Notes on the drawing give instructions for lubrication, installation of a combination lock, adjustment of the locking pin, and bonding and item to the combination lock.
Date: December 31, 1976
Creator: Hill, T.
Partner: UNT Libraries Government Documents Department

A hardware review of electrical contact aging and performance in electromechanical stronglinks

Description: Contacts from the functional switch assembly have been examined for a series of MC2969 stronglinks varying from 9 to 14 years of age. Wear tracks are apparent on the contacts as a result of oxide removal by wiping action as the switch is exercised. Typical contaminants observed on the contacts include C, O, S, Cl, F and Si, all of which vary with position on the contacts. All of the contacts show segregation of Ag into the near-surface region. Measurement of the local contact resistance on the ends of the contacts provide resistance values that are reasonable for this material, but with variation among contacts as a result of changes in the local surface chemistry.
Date: September 1, 1997
Creator: Pebbles, D.E.; Ohlhausen, J.A.; Varga, K.S. & Bryan, R.M.
Partner: UNT Libraries Government Documents Department

Cost and performance analysis of physical protection systems -- A case study

Description: Design and analysis of physical protection systems requires (1) identification of mission critical assets; (2) identification of potential threats that might undermine mission capability; (3) identification of the consequences of loss of mission-critical assets (e.g., time and cost to recover required capability and impact on operational readiness); and (4) analysis of the effectiveness of physical protection elements. CPA -- Cost and Performance Analysis -- addresses the fourth of these four issues. CPA is a methodology that joins Activity Based Cost estimation with performance-based analysis of physical protection systems. CPA offers system managers an approach that supports both tactical decision making and strategic planning. Current exploratory applications of the CPA methodology address analysis of alternative conceptual designs. Hypothetical data is used to illustrate this process.
Date: August 1, 1998
Creator: Hicks, M.J.; Snell, M.S.; Sandoval, J.S. & Potter, C.S.
Partner: UNT Libraries Government Documents Department

Cost and performance analysis of conceptual designs of physical protection systems

Description: CPA -- Cost and Performance Analysis -- is a methodology that joins Activity Based Cost (ABC) estimation with performance based analysis of physical protection systems. CPA offers system managers an approach that supports both tactical decision making and strategic planning. Current exploratory applications of the CPA methodology are addressing analysis of alternative conceptual designs. To support these activities, the original architecture for CPA, is being expanded to incorporate results from a suite of performance and consequence analysis tools such as JTS (Joint Tactical Simulation), ERAD (Explosive Release Atmospheric Dispersion) and blast effect models. The process flow for applying CPA to the development and analysis conceptual designs is illustrated graphically.
Date: June 1, 1998
Creator: Hicks, M.J.; Snell, M.S.; Sandoval, J.S. & Potter, C.S.
Partner: UNT Libraries Government Documents Department

Overview of criminal justice projects at Sandia National Laboratories

Description: The criminal justice projects at SNL include three projects for the National Institute of Justice (smart gun, restraining foam, aqueous foam, corrections perimeter), a Southwest Border study, and one involving corrections agencies. It is concluded that the national technologies developed to protect nuclear and other high value assets have enormous potential for application to crime and personal safety; the difficulty lies in simplifying the technology transfer and making the new systems affordable.
Date: July 1, 1995
Creator: Spencer, D.D.
Partner: UNT Libraries Government Documents Department

Lookout device for high voltage circuit breaker

Description: An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.
Date: December 31, 1991
Creator: Kozlowski, L.J. & Shirey, L.A.
Partner: UNT Libraries Government Documents Department

Circuit breaker lockout device

Description: An improved lockout assembly for locking a circuit breaker in a selected off or on position is provided. The lockout assembly includes a lock block and a lock pin. The lock block has a hollow interior which fits over the free end of a switch handle of the circuit breaker. The lock block includes at least one hole that is placed in registration with a hole in the free end of the switch handle. A lock tab on the lock block serves to align and register the respective holes on the lock block and switch handle. A lock pin is inserted through the registered holes and serves to connect the lock block to the switch handle. Once the lock block and the switch handle are connected, the position of the switch handle is prevented from being changed by the lock tab bumping up against a stationary housing portion of the circuit breaker. When the lock pin is installed, an apertured-end portion of the lock pin is in registration with another hole on the lock block. Then a special scissors conforming to O.S.H.A. regulations can be installed, with one or more padlocks, on the lockout assembly to prevent removal of the lock pin from the lockout assembly, thereby preventing removal of the lockout assembly from the circuit breaker.
Date: December 1991
Creator: Kozlowski, L. J. & Shirey, L. A.
Partner: UNT Libraries Government Documents Department

The Design Process of Physical Security as Applied to a U.S. Border Port of Entry

Description: This paper details the application of a standard physical security system design process to a US Border Port of Entry (PoE) for vehicle entry/exit. The physical security design methodology is described as well as the physical security similarities to facilities currently at a US Border PoE for vehicles. The physical security design process description includes the various elements that make up the methodologies well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry/exit of illegal contraband and personnel are described. The potential to enhance the functions of drug/contraband detection in the Pre-Primary Inspection area through the application of emerging technologies are also addressed.
Date: February 22, 1999
Creator: Wagner, G.G.
Partner: UNT Libraries Government Documents Department

Perimeter security for Minnesota correctional facilities

Description: For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.
Date: December 31, 1996
Creator: Crist, D. & Spencer, D.D.
Partner: UNT Libraries Government Documents Department

Development of security engineering curricula at US universities

Description: The Southwest Surety Institute was formed in June 1996 by Arizona State University (ASU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL) to provide educational programs in Security Engineering, and to conduct research and development in security technologies. This is the first science-based program of its kind in the US, focused on educating Security Engineers to help government and industry address their security needs. Each member brings a unique educational capability to the Institute. NM Tech has a formidable explosives testing and evaluation facility. ASU is developing a Masters program in Security Engineering at their School of Technology located on a new campus in Mesa, Arizona. NMSU provides a Security Technology minor, merging programs in Criminal Justice and Engineering Technology. The Sandia National Laboratories security system design and evaluation process forms the basis for the Security Engineering curricula. In an effort to leverage the special capabilities of each university, distance education will be used to share courses among Institute members and eventually with other sites across the country.
Date: August 1, 1998
Creator: Garcia, M.L.
Partner: UNT Libraries Government Documents Department

Discrete-event simulation for the design and evaluation of physical protection systems

Description: This paper explores the use of discrete-event simulation for the design and control of physical protection systems for fixed-site facilities housing items of significant value. It begins by discussing several modeling and simulation activities currently performed in designing and analyzing these protection systems and then discusses capabilities that design/analysis tools should have. The remainder of the article then discusses in detail how some of these new capabilities have been implemented in software to achieve a prototype design and analysis tool. The simulation software technology provides a communications mechanism between a running simulation and one or more external programs. In the prototype security analysis tool, these capabilities are used to facilitate human-in-the-loop interaction and to support a real-time connection to a virtual reality (VR) model of the facility being analyzed. This simulation tool can be used for both training (in real-time mode) and facility analysis and design (in fast mode).
Date: August 1, 1998
Creator: Jordan, S.E.; Snell, M.K.; Madsen, M.M.; Smith, J.S. & Peters, B.A.
Partner: UNT Libraries Government Documents Department

Report on the suitability of Class 6, U.S. government security repositories for the storage of small quantities of high explosives

Description: The Explosives Review Committee initiated a study into the safety aspects of the common practice of storing small amounts (< 10 grams per drawer) of high explosives in safes. Although storage of HE in older asbestos lined safes was permitted, the newer style Class 6 Security safes are an unacceptable repository for even very small amounts of HE without the use of a blast mitigating insert. The authors have developed a drawer liner in the form of a laminated Lexan, foam, plywood box that will withstand the blast and contain the fragments from up to 10 grams of high explosives. This liner will fit into the drawer of any existing safe. The liner will provide blast and fragment protection, and the safe will provide security protection. This report describes the testing of modern safes and the performance of the liner insert.
Date: March 1, 1998
Creator: Harry, H. H. & Murk, D.
Partner: UNT Libraries Government Documents Department

Demonstration of safeguards technology at the Russian Institute of Experimental Physics (VNIIEF), Arzamas-16

Description: As part of the US-Russian Lab-to-Lab program for strengthening nuclear material protection, control, and accounting (MPC&A), a testbed facility has been established in a laboratory of the VNIIEF to demonstrate safeguards technology to nuclear facility operators. The design of the testbed MPC&A system provides the functions of nondestructive measurements for plutonium and highly enriched uranium, item control, personnel access control, radiation portal monitoring, search equipment, and computerized on-line accounting. The system controls, monitors, and accounts for nuclear material and people as the material moves through three MBAs. It also assists with physical inventory taking. A total of 39 instruments and control systems are being demonstrated in the present version of the testbed. Of these, about half are of Russian design and fabrication, including the software for the item monitoring and the accounting systems. These two computer systems are on an ethernet network and connected in a client-server local area architecture. The item monitoring system is integrated with the accounting system, providing alarm and status information to a central dispatcher terminal. The operation of the MPC&A testbed has been demonstrated under routine and alarm conditions in collaboration with safeguards staff from the six participating US national labs. Workshops and training for Russian nuclear facility operators are in progress. As needs for additional MPC&A technology at specific plants are identified, these are incorporated into the testbed and used to certify the hardware and software for implementation at the plant.
Date: September 1, 1995
Creator: Yuferev, V.; Skripka, G. & Augustson, R.H.
Partner: UNT Libraries Government Documents Department

209-E Upgrades

Description: Pacific Northwest Laboratory has initiated a review of the Safeguards and Security systems at the Critical Mass Laboratory with regards to determining appropriate upgrading actions that assure that an effective and efficient Safeguards and Security posture consistent with DOE-RL policies, procedures, and priorities is effected. As a result of this review, PNL has concluded that specific upgrades are required at CML that provide a demonstrated enhancement to the overall security posture of the facility and are based upon prudent expenditures of government funds. It was further concluded that additional recommended upgrades provide minimal improvement to the overall security system at a significant outlay of funds.
Date: February 4, 1985
Creator: Merrill, B. J. & DeMyer, J. J.
Partner: UNT Libraries Government Documents Department

Cost and performance analysis of physical security systems

Description: Analysis of cost and performance of physical security systems can be a complex, multi-dimensional problem. There are a number of point tools that address various aspects of cost and performance analysis. Increased interest in cost tradeoffs of physical security alternatives has motivated development of an architecture called Cost and Performance Analysis (CPA), which takes a top-down approach to aligning cost and performance metrics. CPA incorporates results generated by existing physical security system performance analysis tools, and utilizes an existing cost analysis tool. The objective of this architecture is to offer comprehensive visualization of complex data to security analysts and decision-makers.
Date: April 1, 1998
Creator: Hicks, M.J.; Yates, D.; Jago, W.H. & Phillips, A.W.
Partner: UNT Libraries Government Documents Department

U.S. Department of Energy Office of Inspector General report on audit of selected aspects of the unclassified computer security program at a DOE headquarters computing facility

Description: The purpose of this audit was to evaluate the effectiveness of the unclassified computer security program at the Germantown Headquarters Administrative Computer Center (Center). The Department of Energy (DOE) relies on the application systems at the Germantown Headquarters Administrative Computer Center to support its financial, payroll and personnel, security, and procurement functions. The review was limited to an evaluation of the administrative, technical, and physical safeguards governing utilization of the unclassified computer system which hosts many of the Department`s major application systems. The audit identified weaknesses in the Center`s computer security program that increased the risk of unauthorized disclosure or loss of sensitive data. Specifically, the authors found that (1) access to sensitive data was not limited to individuals who had a need for the information, and (2) accurate and complete information was not maintained on the inventory of tapes at the Center. Furthermore, the risk of unauthorized disclosure and loss of sensitive data was increased because other controls, such as physical security, had not been adequately implemented at the Center. Management generally agreed with the audit conclusions and recommendations, and initiated a number of actions to improve computer security at the Center.
Date: July 31, 1995
Partner: UNT Libraries Government Documents Department

Preventing unauthorized use of firearms by implementing use control technologies

Description: A goal among many law enforcement and security professionals, and the National Institute of Justice, is to decrease the risk that an officer or security guard may encounter. One risk that officers confront is unpredictable persons who sometimes try to gain control of the officer`s firearm. The addition of user-recognizing-and-authorizing technologies to a firearm could eliminate the capability of an unauthorized user from firing an officer`s firearm. Sandia National Laboratories has been active in the research and development of nuclear security systems that include access and use control technologies. Sandia is being sponsored by the National Institute of Justice to perform a research and development project to determine the feasibility of a user authorized firearm, or {open_quotes}smart gun.{close_quotes} The focus group for the research is law enforcement officers because of the number of firearm take aways that have occurred in the past and the severe use requirements placed on their firearms. A comprehensive look at the problem of weapon take aways in the United States was conducted using information available from the Federal Bureau of Investigation and other law enforcement sources. An investigation into the end user requirements for smart gun technologies has been completed. During the remainder of the project, the user requirements are being transformed into engineering requirements. which will then be used to evaluate numerous technologies that could be used in a smart gun. Demonstration models will be made of the most promising technologies. Other potential applications are remote enabling and disabling of firearms, transportation of prisoners by corrections officers, military use in operations other than war, and use by private citizens.
Date: July 1, 1995
Creator: Weiss, D.R.
Partner: UNT Libraries Government Documents Department

Advanced exterior sensor project : final report, September 2004.

Description: This report (1) summarizes the overall design of the Advanced Exterior Sensor (AES) system to include detailed descriptions of system components, (2) describes the work accomplished throughout FY04 to evaluate the current health of the original prototype and to return it to operation, (3) describes the status of the AES and the AES project as of September 2004, and (4) details activities planned to complete modernization of the system to include development and testing of the second-generation AES prototype.
Date: December 1, 2004
Creator: Ashby, M. Rodema
Partner: UNT Libraries Government Documents Department