You limited your search to:

 Collection: Congressional Research Service Reports
Community Development Financial Institutions (CDFI) Fund: Programs and Policy Issues

Community Development Financial Institutions (CDFI) Fund: Programs and Policy Issues

Date: October 3, 2012
Creator: Lowry, Sean
Description: This report begins by describing the Community Development Financial Institutions Fund's (Fund's) history, current appropriations, and each of its programs. The next section of the report analyzes four policy considerations of congressional interest, regarding the Fund and the effective use of federal resources to promote economic development. Lastly, this report examines the Fund's programs and management to see if they represent an effective and efficient government effort to promote economic development in low-income and distressed communities.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: July 15, 2004
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: July 12, 2005
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
San Diego Wastewater Treatment: Current Issues

San Diego Wastewater Treatment: Current Issues

Date: July 18, 1995
Creator: Copeland, Claudia
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Date: April 1, 2005
Creator: Wilson, Clay
Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: February 4, 2002
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: July 18, 2002
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: December 17, 2002
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: May 6, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: February 10, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: August 7, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: April 9, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: September 25, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: February 17, 2005
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background and Early Implementation of PDD-63

Critical Infrastructures: Background and Early Implementation of PDD-63

Date: September 12, 2000
Creator: Moteff, John D
Description: The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background and Early Implementation of PDD-63

Critical Infrastructures: Background and Early Implementation of PDD-63

Date: June 19, 2001
Creator: Moteff, John D
Description: The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: December 14, 2001
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Date: October 17, 2003
Creator: Wilson, Clay
Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Contributing Partner: UNT Libraries Government Documents Department
An Overview of the U.S. Public Health System in the Context of Bioterrorism

An Overview of the U.S. Public Health System in the Context of Bioterrorism

Date: May 21, 2003
Creator: Harvey, Holly
Description: None
Contributing Partner: UNT Libraries Government Documents Department
An Overview of the U.S. Public Health System in the Context of Emergency Preparedness

An Overview of the U.S. Public Health System in the Context of Emergency Preparedness

Date: March 17, 2005
Creator: Lister, Sarah A
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: June 10, 2015
Creator: Moteff, John D.
Description: This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights two primary issues confronting Congress going forward, both in the context of cybersecurity: information sharing and regulation.
Contributing Partner: UNT Libraries Government Documents Department
Surface Transportation Reauthorization: Environmental Issues and Legislative Provisions in SAFETEA-LU (H.R. 3)

Surface Transportation Reauthorization: Environmental Issues and Legislative Provisions in SAFETEA-LU (H.R. 3)

Date: September 1, 2005
Creator: Luther, Linda G
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Terminal Operators and Their Role in U.S. Port and Maritime Security

Terminal Operators and Their Role in U.S. Port and Maritime Security

Date: April 20, 2006
Creator: Frittelli, John F & Lake, Jennifer E
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Marine Security of Hazardouse Chemical Cargo

Marine Security of Hazardouse Chemical Cargo

Date: August 26, 2005
Creator: Parfomak, Paul W & Frittelli, John F
Description: None
Contributing Partner: UNT Libraries Government Documents Department