Search Results

Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds,AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
An Overview of the U.S. Public Health System in the Context of Bioterrorism
No Description Available.
How to Find Information in a Library and on the Internet
No Description Available.
Libraries and the USA PATRIOT Act
This report discusses how and when the USA PATRIOT ACT P.L. 107-56 applies to libraries and bookstores under Section 215 of the Foreign Surveillance Intelligence Act. A reply to House Judiciary Committee from The Justice Department notes that the use of Section 215 has been sparse or nonexistent.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Port and Maritime Security: Background and Issues for Congress
No Description Available.
Homeland Security Act of 2002: Critical Infrastructure Information Act
This report discusses about Critical Infrastructure Information Act of 2002, Protection of Voluntarily shared critical infrastructure information, Congressional Disclosure and other provisions.
Homeland Security: Banking and Financial Infrastructure Continuity
This report outlines the existing recovery modes to mitigate disasters in financial markets that events have tested in recent experience, and recovery arrangements.
Maritime Security: Overview of Issues
No Description Available.
Maritime Security: Overview of Issues
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Western Water Resource Issues
For more than a century, the federal government has constructed water resource projects for a variety of purposes, including flood control, navigation, power generation, and irrigation. While most municipal and industrial water supplies have been built by non-federal entities, most of the large, federal water supply projects in the West, including Hoover and Grand Coulee dams, were constructed by the Bureau of Reclamation (Department of the Interior) to provide water for irrigation.
Western Water Resource Issues
For more than a century, the federal government has constructed water resource projects for a variety of purposes, including flood control, navigation, power generation, and irrigation. While most municipal and industrial water supplies have been built by non-federal entities, most of the large, federal water supply projects in the West, including Hoover and Grand Coulee dams, were constructed by the Bureau of Reclamation (Department of the Interior) to provide water for irrigation.
Safeguarding the Nation's Drinking Water: EPA and Congressional Actions
No Description Available.
Terrorism and Security Issues Facing the Water Infrastructure Sector
No Description Available.
Terrorism and Security Issues Facing the Water Infrastructure Sector
No Description Available.
Intermodal Connectors: A Method For Improving Transportation Efficiency?
As Congress considers reauthorization of the nation’s surface transportation legislation, the Transportation Equity Act for the 21st Century (TEA-21, P.L. 105- 178), which expires in September 2003, one issue policymakers are examining is the flow of commerce to and from U.S. cargo hubs. Recent Department of Transportation (DOT) studies have found persistent traffic bottlenecks and inadequate access to freight transfer facilities. The pavement of access roads, in many cases are in poor condition and the roads have deficient geometrics (limited turning radii at intersections, low clearances, inadequate shoulder width, etc.) for the heavy truck traffic they serve.
21st Century Community Learning Centers: Evaluation and Implementation Issues
The 21st CCLC program was originally authorized as Part I of Title X, of the Elementary and Secondary Education Act (ESEA), as amended. This program was reauthorized as part of the reauthorization of the ESEA by the No Child Left Behind Act of 2001, P.L. 107-110, and was signed into law on January 8, 2002. This report discusses implementation of the reauthorized 21st CCLC program, and the recent evaluation of the program and its implications.
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, the impact of the Wendell H. Ford Aviation Investment and Reform Act for the 21st Century (FAIR21, P.L. 106-181), funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Back to Top of Screen