You limited your search to:

 Collection: Congressional Research Service Reports
Nuclear Weapons: Comprehensive Test Ban Treaty
No Description digital.library.unt.edu/ark:/67531/metacrs3638/
Nuclear Weapons: Comprehensive Test Ban Treaty
No Description digital.library.unt.edu/ark:/67531/metacrs5652/
Nuclear Weapons: Comprehensive Test Ban Treaty
No Description digital.library.unt.edu/ark:/67531/metacrs5653/
Nuclear Weapons: Comprehensive Test Ban Treaty
No Description digital.library.unt.edu/ark:/67531/metacrs5654/
Iraq: Weapons of Mass Destruction (WMD) Capable Missiles and Unmanned Aerial Vehicles (UAVs)
No Description digital.library.unt.edu/ark:/67531/metacrs5703/
Iraq: Weapons of Mass Destruction (WMD) Capable Missiles and Unmanned Aerial Vehicles (UAVs)
No Description digital.library.unt.edu/ark:/67531/metacrs5704/
Potential Navy Force Structure and Shipbuilding Plans: Background and Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6687/
Potential Navy Force Structure and Shipbuilding Plans: Background and Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6688/
Nuclear Weapons: Comprehensive Test Ban Treaty
No Description digital.library.unt.edu/ark:/67531/metacrs6648/
Homeland Security: Coast Guard Operations - Background and Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs2797/
Homeland Security: Coast Guard Operations - Background and Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs2798/
Homeland Security: Coast Guard Operations - Background and Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs2799/
Homeland Security: Coast Guard Operations - Background and Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs2800/
Homeland Security: Coast Guard Operations - Background and Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs4628/
Homeland Security: Coast Guard Operations - Background and Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs4630/
Homeland Security: Coast Guard Operations - Background and Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs4631/
Homeland Security: Coast Guard Operations - Background and Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5897/
Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs
No Description digital.library.unt.edu/ark:/67531/metacrs4632/
Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs
No Description digital.library.unt.edu/ark:/67531/metacrs6228/
Homeland Security: Coast Guard Operations - Background and Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs2796/
The National Counterterrorism Center: Implementation Challenges and Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6227/
Iraq-U.S. Confrontation
No Description digital.library.unt.edu/ark:/67531/metacrs1768/
Iraq-U.S. Confrontation
No Description digital.library.unt.edu/ark:/67531/metacrs1769/
Iraq: Former and Recent Military Confrontations with the United States
No Description digital.library.unt.edu/ark:/67531/metacrs3024/
Iraq-U.S. Confrontation
No Description digital.library.unt.edu/ark:/67531/metacrs3025/
Iraq-U.S. Confrontation
No Description digital.library.unt.edu/ark:/67531/metacrs3026/
Iraq-U.S. Confrontation
No Description digital.library.unt.edu/ark:/67531/metacrs3027/
Iraq-U.S. Confrontation
No Description digital.library.unt.edu/ark:/67531/metacrs3028/
Network Centric Warfare: Background and Oversight Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6067/
The Multi-State Anti-Terrorism Information Exchange (MATRIX) Pilot Project
No Description digital.library.unt.edu/ark:/67531/metacrs6066/
"Don't Ask, Don't Tell": The Law and Military Policy on Same-Sex Behavior
This report describes the "Don't Ask, Don't Tell" military policy, which holds that the presence in the armed forces of persons who demonstrate a propensity or intent to engage in same-sex acts would create an unacceptable risk to the high standards of morale, good order and discipline, and unit cohesion which are the essence of military capability. This report also describes recent efforts by certain Members of Congress to amending this policy. digital.library.unt.edu/ark:/67531/metadc689509/
Coast Guard Deepwater Acquisition Programs: Background, Oversight Issues, and Options for Congress
This report provides background information and oversight issues for Congress on the Coast Guard's Deepwater acquisition programs for replacing and modernizing the service's aging fleet of deepwater-capable ships and aircraft. digital.library.unt.edu/ark:/67531/metadc689502/
The Marines' Expeditionary Fighting Vehicle (EFV): Background and Issues for Congress
This report discusses the Expeditionary Fighting Vehicle (EFV), which is an armored amphibious vehicle program that originated two decades ago to replace the 1970s-era Amphibious Assault Vehicle (AAV). The EFV has experienced a variety of developmental difficulties, which this report explores. This report also discusses potential related issues for Congress. digital.library.unt.edu/ark:/67531/metadc689304/
Military Construction, Veterans Affairs, and Related Agencies: FY2010 Appropriations
This report discusses the President's Fiscal Year (FY) 2010 budget request for the Military Construction, Veterans Affairs, and Related Agencies appropriations bill, which provides funding for the planning, design, construction, alteration, and improvement of facilities used by active and reserve military components worldwide. digital.library.unt.edu/ark:/67531/metadc689444/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs3171/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs3172/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs3174/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5034/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5032/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5035/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5033/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5036/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs6265/
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another). digital.library.unt.edu/ark:/67531/metacrs1253/
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another). digital.library.unt.edu/ark:/67531/metacrs1827/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs1828/
Lawfulness of Interrogation Techniques under the Geneva Conventions
No Description digital.library.unt.edu/ark:/67531/metacrs5978/
Regional Security Consultative Organizations in East Asia and Their Implications for the United States
No Description digital.library.unt.edu/ark:/67531/metacrs134/
Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs
No Description digital.library.unt.edu/ark:/67531/metacrs6828/
Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs
No Description digital.library.unt.edu/ark:/67531/metacrs6827/