You limited your search to:

 Collection: Congressional Research Service Reports
Community Development Block Grant Funds in Disaster Relief and Recovery

Community Development Block Grant Funds in Disaster Relief and Recovery

Date: October 19, 2005
Creator: Boyd, Eugene
Description: In the aftermath of previous, presidentially-declared disasters, Congress has used the Community Development Block Grant (CDBG) program to help states and local governments finance recovery efforts, whether from natural or man-made disasters. This report will provide a general overview of the CDBG program and its use in disaster relief.
Contributing Partner: UNT Libraries Government Documents Department
Community Development Block Grants: Legislative Proposals to Assist Communities Affected by Home Foreclosures

Community Development Block Grants: Legislative Proposals to Assist Communities Affected by Home Foreclosures

Date: July 15, 2008
Creator: Boyd, Eugene & Gonzales, Oscar R.
Description: In response to the rising number of home mortgage foreclosures, several bills have been introduced during the 110th Congress that would provide additional federal assistance to state and local governments with high concentrations of foreclosed homes, subprime mortgage loans, and delinquent home mortgages. At least one of these proposals, H.R. 3221, as passed by the Senate, includes provisions that would use the framework of the Community Development Block Grant (CDBG) program to channel an additional $4 billion in assistance to state and local governments. This provision faces an uncertain future; objections to it have been raised by the Bush Administration and others, contending that the assistance will result in the rescue of lenders and speculators.
Contributing Partner: UNT Libraries Government Documents Department
Community Development Financial Institutions (CDFI) Fund: Programs and Policy Issues

Community Development Financial Institutions (CDFI) Fund: Programs and Policy Issues

Date: October 3, 2012
Creator: Lowry, Sean
Description: This report begins by describing the Community Development Financial Institutions Fund's (Fund's) history, current appropriations, and each of its programs. The next section of the report analyzes four policy considerations of congressional interest, regarding the Fund and the effective use of federal resources to promote economic development. Lastly, this report examines the Fund's programs and management to see if they represent an effective and efficient government effort to promote economic development in low-income and distressed communities.
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Date: October 17, 2003
Creator: Wilson, Clay
Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Date: April 1, 2005
Creator: Wilson, Clay
Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure and Key Assets: Definition and Identification

Critical Infrastructure and Key Assets: Definition and Identification

Date: October 1, 2004
Creator: Moteff, John D & Parfomak, Paul W
Description: This report reviews the concept and definition of “critical infrastructure” as it has appeared in federal reports, legislation and regulation since the early 1980s. The report highlights the changes and expansion of that definition as the focus of public policy debates shifted from infrastructure adequacy to infrastructure protection. Finally the report summarizes current policy issues associated with critical infrastructure identification by federal agencies and the private sector. The report is intentionally limited to definitional issues and categorization of infrastructure.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: July 14, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: April 23, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: February 21, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: October 1, 2002
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department