You limited your search to:

 Decade: 2000-2009
 Collection: Congressional Research Service Reports
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs3788/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs3784/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs3786/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs3783/
Terrorism and Security Issues Facing the Water Infrastructure Sector
No Description digital.library.unt.edu/ark:/67531/metacrs3622/
Terrorism and Security Issues Facing the Water Infrastructure Sector
No Description digital.library.unt.edu/ark:/67531/metacrs3621/
Terrorism and Security Issues Facing the Water Infrastructure Sector
No Description digital.library.unt.edu/ark:/67531/metacrs3623/
Maritime Security: Overview of Issues
No Description digital.library.unt.edu/ark:/67531/metacrs3177/
Protecting New Orleans: From Hurricane Barriers to Floodwalls
No Description digital.library.unt.edu/ark:/67531/metacrs8479/
Protecting New Orleans: From Hurricane Barriers to Floodwalls
No Description digital.library.unt.edu/ark:/67531/metacrs8255/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs10113/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs10114/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs10063/
Western Water Resource Issues
For more than a century, the federal government has constructed water resource projects for a variety of purposes, including flood control, navigation, power generation, and irrigation. Growing population and changing values have increased demands on water supplies and river systems, resulting in water use and management conflicts throughout the country, particularly in the West, where the population is expected to increase 30% in the next 20-25 years. Debate over western water resources revolves around the issue of how best to plan for and manage the use of this renewable, yet sometimes scarce and increasingly sought after, resource. The 109th Congress is considering a number of bills on western water issues, including title transfer, water recycling, and rural water supply legislation, as well as Indian water rights settlement legislation. digital.library.unt.edu/ark:/67531/metacrs10517/
Anthrax-Contaminated Facilities: Preparations and a Standard for Remediation
This report provides background information on the 2001 anthrax incidents and federal preparedness plans, but it focuses primarily on preparations for future remediations and considerations for setting a remediation standard. digital.library.unt.edu/ark:/67531/metacrs8247/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs5045/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs5047/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs5048/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs5046/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs8535/
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet. digital.library.unt.edu/ark:/67531/metacrs5031/
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet. digital.library.unt.edu/ark:/67531/metacrs5037/
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet. digital.library.unt.edu/ark:/67531/metacrs5038/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs5638/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs5639/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs6264/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs2042/
Maritime and Port Security: A Comparison of Major Provisions of S. 1214 and H.R. 3983
No Description digital.library.unt.edu/ark:/67531/metacrs3587/
Maritime and Port Security: A Comparison of Major Provisions of S. 1214 and H.R. 3983
No Description digital.library.unt.edu/ark:/67531/metacrs3588/
Maritime and Port Security: A Comparison of Major Provisions of S. 1214 and H.R. 3983
No Description digital.library.unt.edu/ark:/67531/metacrs3589/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs9945/
Federal Disaster and Emergency Assistance for Water Infrastructure Facilities and Supplies
No Description digital.library.unt.edu/ark:/67531/metacrs7645/
The Americans with Disabilities Act: Legislation Concerning Notification Prior to Initiating Legal Action
The Americans with Disabilities Act (ADA) provides broad nondiscrimination protection in employment, public services, and public accommodation and services operated by private entities. Since the 106th Congress, legislation has been introduced to require plaintiffs to provide notice to the defendant prior to filing a complaint regarding public accommodations. In the 109th Congress, H.R. 2804 was introduced by Representative Foley to amend title III of the ADA to require notification. digital.library.unt.edu/ark:/67531/metacrs7520/
Ports in Louisiana: New Orleans, South Louisiana, and Baton Rouge
No Description digital.library.unt.edu/ark:/67531/metacrs7987/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs3607/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs3608/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs3609/
Western Water Resource Issues
No Description digital.library.unt.edu/ark:/67531/metacrs3606/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs3180/
Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview
No Description digital.library.unt.edu/ark:/67531/metacrs3175/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs3178/
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description digital.library.unt.edu/ark:/67531/metacrs3179/
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet. digital.library.unt.edu/ark:/67531/metacrs3173/
The Role of Public Works Infrastructure in Economic Stimulus
Interest in using federal government spending to stimulate U.S. economic recovery has intensified recently in response to indicators showing significant deterioration of the economy. Some policymakers favor using traditional monetary and fiscal policies. Others, however, favor making accelerated investments in the nation's public infrastructure in order to create jobs while also meeting infrastructure needs. This report is an overview of policy issues associated with the approach of using infrastructure as a mechanism for economic stimulus. digital.library.unt.edu/ark:/67531/metadc83914/
Critical Infrastructure: The National Asset Database
The purpose of this report is to discuss the National Asset Database: what is in it, how it is populated, what the Database apparently is, what it is not, and how it is intended to be used. The report also discusses some of the issues on which Congress could focus its oversight, including appropriation bill language. digital.library.unt.edu/ark:/67531/metacrs9556/
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another). digital.library.unt.edu/ark:/67531/metacrs1253/
Community Development Block Grants: Legislative Proposals to Assist Communities Affected by Home Foreclosures
In response to the rising number of home mortgage foreclosures, several bills have been introduced during the 110th Congress that would provide additional federal assistance to state and local governments with high concentrations of foreclosed homes, subprime mortgage loans, and delinquent home mortgages. At least one of these proposals, H.R. 3221, as passed by the Senate, includes provisions that would use the framework of the Community Development Block Grant (CDBG) program to channel an additional $4 billion in assistance to state and local governments. This provision faces an uncertain future; objections to it have been raised by the Bush Administration and others, contending that the assistance will result in the rescue of lenders and speculators. digital.library.unt.edu/ark:/67531/metacrs10773/
Drinking Water State Revolving Fund (DWSRF): Program Overview and Issues
The Safe Drinking Water Act (SDWA) Amendments of 1996 authorized a drinking water state revolving loan fund (DWSRF) program to help public water systems finance infrastructure projects needed to comply with federal drinking water regulations and to protect public health. The Environmental Protection Agency's (EPA's) latest (2003) survey of capital improvement needs for public water systems found that water systems need to invest $276.8 billion on infrastructure improvements over 20 years to ensure the provision of safe water. Key issues include the gap between estimated needs and funding, SDWA compliance costs, and the need for cities to update and maintain water infrastructure, apart from SDWA compliance. digital.library.unt.edu/ark:/67531/metacrs10626/
An Overview of the Administration's Strengthening America's Communities Initiative
No Description digital.library.unt.edu/ark:/67531/metacrs8669/
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism. digital.library.unt.edu/ark:/67531/metacrs5513/