This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
For more than a century, the federal government has constructed water resource projects for a variety of purposes, including flood control, navigation, power generation, and irrigation. While most municipal and industrial water supplies have been built by non-federal entities, most of the large, federal water supply projects in the West, including Hoover and Grand Coulee dams, were constructed by the Bureau of Reclamation (Department of the Interior) to provide water for irrigation.
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
This report assesses the impact of September 11, 2001 attack on public and private information infrastructures in the context of critical infrastructure protection,continuity of operation (COP) and homeland security.
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
This report discusses how and when the USA PATRIOT ACT P.L. 107-56 applies to libraries and bookstores under Section 215 of the Foreign Surveillance Intelligence Act. A reply to House Judiciary Committee from The Justice Department notes that the use of Section 215 has been sparse or nonexistent.
This report discusses about Critical Infrastructure Information Act of 2002, Protection of Voluntarily shared critical infrastructure information, Congressional Disclosure and other provisions.
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
As Congress considers reauthorization of the nation’s surface transportation legislation, the Transportation Equity Act for the 21st Century (TEA-21, P.L. 105- 178), which expires in September 2003, one issue policymakers are examining is the flow of commerce to and from U.S. cargo hubs. Recent Department of Transportation (DOT) studies have found persistent traffic bottlenecks and inadequate access to freight transfer facilities. The pavement of access roads, in many cases are in poor condition and the roads have deficient geometrics (limited turning radii at intersections, low clearances, inadequate shoulder width, etc.) for the heavy truck traffic they serve.
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds,AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
For more than a century, the federal government has constructed water resource projects for a variety of purposes, including flood control, navigation, power generation, and irrigation. While most municipal and industrial water supplies have been built by non-federal entities, most of the large, federal water supply projects in the West, including Hoover and Grand Coulee dams, were constructed by the Bureau of Reclamation (Department of the Interior) to provide water for irrigation.
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
This report outlines the existing recovery modes to mitigate disasters in financial markets that events have tested in recent experience, and recovery arrangements.
For more than a century, the federal government has constructed water resource projects for a variety of purposes, including flood control, navigation, power generation, and irrigation. While most municipal and industrial water supplies have been built by non-federal entities, most of the large, federal water supply projects in the West, including Hoover and Grand Coulee dams, were constructed by the Bureau of Reclamation (Department of the Interior) to provide water for irrigation.
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
This dialog allows you to filter your current search.
Each of the Collections listed note their name and the number of records that will be limited down to if you choose that option.
This dialog allows you to filter your current search.
Each of the Serial/Series Titles listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Serial/Series Titles? Start typing and we'll update the list to show only those items that match your needs.
Try limiting with other filters first or use this comprehensive list of titles as an alternative starting point.
This dialog allows you to filter your current search.
Each of the World Regions listed note their name and the number of records that will be limited down to if you choose that option.
This dialog allows you to filter your current search.
Each of the Countries listed note their name and the number of records that will be limited down to if you choose that option.
This dialog allows you to filter your current search.
Each of the U.S. States listed note their name and the number of records that will be limited down to if you choose that option.
This dialog allows you to filter your current search.
Each of the Counties listed note their name and the number of records that will be limited down to if you choose that option.
This dialog allows you to filter your current search.
Each of the Decades listed note their name and the number of records that will be limited down to if you choose that option.
This dialog allows you to filter your current search.
Each of the Years listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Years? Start typing and we'll update the list to show only those items that match your needs.
This dialog allows you to filter your current search.
Each of the Months listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
This dialog allows you to filter your current search.
Each of the Days listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Days? Start typing and we'll update the list to show only those items that match your needs.