Calendar Year 2020

With the end of the cold war, the Miamisburg Environmental Management Project (MEMP),
formerly known as the Mound Plant, was transferred by the Department of Energy
(Department), from Defense Programs to Environmental Management. The emphasis at MEMP
is now accelerated cleanup and transition of facilities and property to the local community.
Congress requires the Department to request adequate funding to keep the project on schedule
for closure by 2006 or earlier. Under these provisions, any savings resulting from the
accelerated closure of the MEMP can be retained and used for cleanup activities at other
Department closure sites.
Office of Security and Emergency Operations (SO) officials determined that SO’s program to
counter the threat to Department of Energy (DOE) security forces from chemical and biological
attacks should include the use of “standardized” equipment. Therefore, SO officials initiated an
evaluation of chemical protective gear for the purpose of selecting and procuring a “standard”
respirator for use by protective force personnel at all sites. The centralized procurement of a
“standard” respirator was intended to: (1) provide a respirator that has proper form, fit, and function
that is compatible with weapons and gear, including night vision goggles, used to interdict terrorists;
(2) create economies of scale purchasing;
(3) allow standardized training at the National Nuclear Security Institute (NNSI), and
(4) allow ease of movement of protective force personnel from one site to another in the event of
exigent circumstances.
Information Technology (IT) plays an integral role in the programs and operations of the
Department of Energy. In Fiscal Year 2001, the Department budgeted $1.4 billion for the
acquisition and maintenance of IT related resources, a portion of which supports the Advanced
Strategic Computing Initiative. These resources, and the programs they support, are vulnerable
to malicious software, viruses, trojans, worms (collectively referred to as viruses), and cyber
security attacks. To effectively protect its IT resources, the Department must ensure that its
virus protection and detection capabilities as well as its cyber security incident reporting
practices are "state of the art."u