Search Results

Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and, regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities; allocating resources; information sharing; and, regulation. This report provides an historical background and tracks the evolution of such an overall policy and its implementation.
Critical Infrastructures: Background, Policy, and Implementation
The nation's health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, functions, and systems across which these goods and services move are called critical infrastructures. This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and, regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences
No Description Available.
Critical Infrastructure and Key Assets: Definition and Identification
This report reviews the concept and definition of “critical infrastructure” as it has appeared in federal reports, legislation and regulation since the early 1980s. The report highlights the changes and expansion of that definition as the focus of public policy debates shifted from infrastructure adequacy to infrastructure protection. Finally the report summarizes current policy issues associated with critical infrastructure identification by federal agencies and the private sector. The report is intentionally limited to definitional issues and categorization of infrastructure.
Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Guarding America: Security Guards and U.S. Critical Infrastructure Protection
No Description Available.
Liquefied Natural Gas (LNG) Infrastructure Security: Issues for Congress
This report provides an overview of industry and federal activities related to LNG security. The report describes U.S. LNG infrastructure, the industry's safety record and security risks, and the industry's security initiatives since September 11, 2001. It summarizes recent changes in federal LNG and maritime security law and related changes in the security roles of federal agencies. The report discusses several policy concerns related to federal LNG security efforts: 1) public costs of marine security, 2) uncertainty regarding LNG terrorism risks, and 3) security implications of promoting U.S.-flagged LNG tankers and U.S. crews.
Vulnerability of Concentrated Critical Infrastructure: Background and Policy Options
This report provides an overview of geographic concentration and related vulnerability among critical infrastructures in the United States. The report illustrates the nature of such geographic concentration and how it may expose infrastructures to catastrophic failure due to geographic hazards. It identifies several long-term forces which have contributed to infrastructure concentration. The report concludes with options to address geographic vulnerability in the context of current federal infrastructure policy.
Vulnerability of Concentrated Critical Infrastructure: Background and Policy Options
No Description Available.
Vulnerability of Concentrated Critical Infrastructure: Background and Policy Options
Report detailing the vulnerability considerations for the critical infrastructure of the United States, including hazards, natural disasters, market influences, federal policies, and more.
Marine Security of Hazardouse Chemical Cargo
Report on the security of hazardous chemical marine transportation, including cargo, accidents, health effects, ports, and more.
How to Find Information in a Library
This report "includes background information (encyclopedias, almanacs, and business, statistical, and biographical directories), current information (books and magazines), sources such as organizations and foundations and sources for government, politics, and legislation. It lists a number of Internet search engines, which can be used at many public libraries." (from Summary)
How to Find Information in a Library and on the Internet
This guide to finding information in libraries and on the Internet has been prepared for constituents who want to learn more about topics that interest them. It includes background directories, current information, reference books, and websites for government, politics, legislation, and other sources. It lists a number of Internet search engines, which can be used at many public libraries. It also suggests guides on how to search, including one for kids.
How to Find Information in a Library and on the Internet
This report includes background directories, current information, reference books, and websites for government, politics, legislation, and other sources. It lists a number of Internet search engines, which can be used at many public libraries and also suggests guides on how to search, including one for kids.
How to Find Information in a Library and on the Internet
No Description Available.
Aging Infrastructure: Dam Safety
To help inform discussions on the federal role in dam safety, this report provides background information on the nation’s dam safety activities and funding mechanisms.
Presidential Libraries: The Federal System and Related Legislation
Through the National Archives and Records Administration, the federal government currently manages and maintains 12 presidential libraries. Inaugurated with the Presidential Libraries Act of 1955, these entities are privately constructed on behalf of former Presidents and, upon completion, are deeded to the federal government. This report provides a brief overview of the federal presidential libraries system and tracks the progress of related legislation.
Presidential Libraries: The Federal System and Related Legislation [Updated November 26, 2008]
This report provides a brief overview of the federal presidential libraries system and tracks the progress of related legislation.
Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview
This report assesses the impact of September 11, 2001 attack on public and private information infrastructures in the context of critical infrastructure protection,continuity of operation (COP) and homeland security.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructures industries which regularly use industrial control systems. This report will specifically discuss the potential for access to industrial control systems through the internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Anthrax-Contaminated Facilities: Preparations and a Standard for Remediation
This report provides background information on the 2001 anthrax incidents and federal preparedness plans, but it focuses primarily on preparations for future remediations and considerations for setting a remediation standard.
The Capitol Visitor Center: An Overview
This report presents the cost of the center, the most extensive addition to the Capitol since the Civil War, and the largest in the structure’s more than 200-year history, is now estimated to be at least $555 million. The project is being financed with appropriated funds, and a total of $65 million from private donations and revenue generated by the sale of commemorative coins.
Homeland Security Act of 2002: Critical Infrastructure Information Act
This report discusses about Critical Infrastructure Information Act of 2002, Protection of Voluntarily shared critical infrastructure information, Congressional Disclosure and other provisions.
Drinking Water State Revolving Fund (DWSRF): Program Overview and Issues
The Safe Drinking Water Act (SDWA) Amendments of 1996 authorized a drinking water state revolving loan fund (DWSRF) program to help public water systems finance infrastructure projects needed to comply with federal drinking water regulations and to protect public health. The Environmental Protection Agency's (EPA's) latest (2003) survey of capital improvement needs for public water systems found that water systems need to invest $276.8 billion on infrastructure improvements over 20 years to ensure the provision of safe water. Key issues include the gap between estimated needs and funding, SDWA compliance costs, and the need for cities to update and maintain water infrastructure, apart from SDWA compliance.
Drinking Water State Revolving Fund: Program Overview and Issues
This report discusses the Safe Drinking Water Act (SDWA) Amendments of 1996, which authorized a drinking water state revolving loan fund (DWSRF) program to help public water systems finance infrastructure projects needed to comply with federal drinking water regulations and to protect public health.
Safeguarding the Nation's Drinking Water: EPA and Congressional Actions
No Description Available.
Safeguarding the Nation's Drinking Water: EPA and Congressional Actions
No Description Available.
Safeguarding the Nation's Drinking Water: EPA and Congressional Actions
No Description Available.
The Davis-Bacon Act: Institutional Evolution and Public Policy
This report examines policy issues the Davis-Bacon Act has sparked through the years and which remain a part of the Davis-Bacon debate of the 1990s. These include such questions as: wage rate determination procedures, reporting requirements under the Copeland Act, an appropriate threshold for activation of the statute, interagency relationships with respect to Davis-Bacon enforcement and compliance activity, administrative or judicial appeals procedures, the use of "helpers" and other low-skilled workers on covered projects, and the right of a President to suspend the statute as well as the conditions under which such a suspension may occur. That the fundamental premise of the Act remains in contention after 60 years may be, itself, part of the public policy debate.
Back to Top of Screen