You limited your search to:

 Decade: 2000-2009
 Collection: Congressional Research Service Reports
21st Century Community Learning Centers: Evaluation and Implementation Issues
The 21st CCLC program was originally authorized as Part I of Title X, of the Elementary and Secondary Education Act (ESEA), as amended. This program was reauthorized as part of the reauthorization of the ESEA by the No Child Left Behind Act of 2001, P.L. 107-110, and was signed into law on January 8, 2002. This report discusses implementation of the reauthorized 21st CCLC program, and the recent evaluation of the program and its implications. digital.library.unt.edu/ark:/67531/metacrs9290/
Aging Infrastructure: Dam Safety
To help inform discussions on the federal role in dam safety, this report provides background information on the nation’s dam safety activities and funding mechanisms. digital.library.unt.edu/ark:/67531/metacrs7622/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, the impact of the Wendell H. Ford Aviation Investment and Reform Act for the 21st Century (FAIR21, P.L. 106-181), funding distribution, the types of projects the program funds, and AIP and PFC policy issues. digital.library.unt.edu/ark:/67531/metacrs1419/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, the impact of the Wendell H. Ford Aviation Investment and Reform Act for the 21st Century (FAIR21, P.L. 106-181), funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs2158/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs2159/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs2160/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds,AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs3785/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs3782/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs3781/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs3787/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs3780/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs3788/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs3784/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs3786/
Airport Improvement Program
This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes. digital.library.unt.edu/ark:/67531/metacrs3783/
The Americans with Disabilities Act: Legislation Concerning Notification Prior to Initiating Legal Action
The Americans with Disabilities Act (ADA) provides broad nondiscrimination protection in employment, public services, and public accommodation and services operated by private entities. Since the 106th Congress, legislation has been introduced to require plaintiffs to provide notice to the defendant prior to filing a complaint regarding public accommodations. In the 109th Congress, H.R. 2804 was introduced by Representative Foley to amend title III of the ADA to require notification. digital.library.unt.edu/ark:/67531/metacrs7520/
Anthrax-Contaminated Facilities: Preparations and a Standard for Remediation
This report provides background information on the 2001 anthrax incidents and federal preparedness plans, but it focuses primarily on preparations for future remediations and considerations for setting a remediation standard. digital.library.unt.edu/ark:/67531/metacrs8247/
The Army Corps of Engineers' Nationwide Permits Program: Issues and Regulatory Developments
Permits issued by the U.S. Army Corps of Engineers authorize various types of development projects in wetlands and other waters of the United States. The Corps' regulatory process involves two types of permits: general permits for actions for private landowners that will likely have a minor effect on wetlands, and individual permits for more significant actions. Interest groups have a number of specific criticisms of the permits. For some time, there has been a stalemate in Congress over legislation related to this issue. digital.library.unt.edu/ark:/67531/metadc26114/
The Capitol Visitor Center: An Overview
This report presents the cost of the center, the most extensive addition to the Capitol since the Civil War, and the largest in the structure’s more than 200-year history, is now estimated to be at least $555 million. The project is being financed with appropriated funds, and a total of $65 million from private donations and revenue generated by the sale of commemorative coins. digital.library.unt.edu/ark:/67531/metacrs9322/
The Committee on Foreign Investment in the United States (CFIUS)
The Committee on Foreign Investment in the United States (CFIUS) is an interagency committee that serves the President in overseeing the national security implications of foreign investment in the economy. Since it was established by an Executive Order of President Ford in 1975, the committee has operated in relative obscurity.1 According to a Treasury Department memorandum, the Committee originally was established in order to placate Congress, which had grown concerned over the rapid increase in Organization of the Petroleum Exporting Countries (OPEC) investments in American portfolio assets (Treasury securities, corporate stocks and bonds), and to respond to concerns of some that much of the OPEC investments were being driven by political, rather than by economic, motives. digital.library.unt.edu/ark:/67531/metacrs9277/
The Committee on Foreign Investment in the United States (CFIUS)
The Committee on Foreign Investment in the United States (CFIUS) is an interagency committee that serves the President in overseeing the national security implications of foreign investment in the economy. Since it was established by an Executive Order of President Ford in 1975, the committee has operated in relative obscurity.1 According to a Treasury Department memorandum, the Committee originally was established in order to placate Congress, which had grown concerned over the rapid increase in Organization of the Petroleum Exporting Countries (OPEC) investments in American portfolio assets (Treasury securities, corporate stocks and bonds), and to respond to concerns of some that much of the OPEC investments were being driven by political, rather than by economic, motives. digital.library.unt.edu/ark:/67531/metacrs9278/
Community Development Block Grant Funds in Disaster Relief and Recovery
In the aftermath of previous, presidentially-declared disasters, Congress has used the Community Development Block Grant (CDBG) program to help states and local governments finance recovery efforts, whether from natural or man-made disasters. This report will provide a general overview of the CDBG program and its use in disaster relief. digital.library.unt.edu/ark:/67531/metacrs7760/
Community Development Block Grants: Legislative Proposals to Assist Communities Affected by Home Foreclosures
In response to the rising number of home mortgage foreclosures, several bills have been introduced during the 110th Congress that would provide additional federal assistance to state and local governments with high concentrations of foreclosed homes, subprime mortgage loans, and delinquent home mortgages. At least one of these proposals, H.R. 3221, as passed by the Senate, includes provisions that would use the framework of the Community Development Block Grant (CDBG) program to channel an additional $4 billion in assistance to state and local governments. This provision faces an uncertain future; objections to it have been raised by the Bush Administration and others, contending that the assistance will result in the rescue of lenders and speculators. digital.library.unt.edu/ark:/67531/metacrs10773/
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism. digital.library.unt.edu/ark:/67531/metacrs5513/
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists. digital.library.unt.edu/ark:/67531/metacrs6315/
Critical Infrastructure and Key Assets: Definition and Identification
This report reviews the concept and definition of “critical infrastructure” as it has appeared in federal reports, legislation and regulation since the early 1980s. The report highlights the changes and expansion of that definition as the focus of public policy debates shifted from infrastructure adequacy to infrastructure protection. Finally the report summarizes current policy issues associated with critical infrastructure identification by federal agencies and the private sector. The report is intentionally limited to definitional issues and categorization of infrastructure. digital.library.unt.edu/ark:/67531/metacrs5954/
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet. digital.library.unt.edu/ark:/67531/metacrs5031/
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet. digital.library.unt.edu/ark:/67531/metacrs5037/
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet. digital.library.unt.edu/ark:/67531/metacrs5038/
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet. digital.library.unt.edu/ark:/67531/metacrs3173/
Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA. digital.library.unt.edu/ark:/67531/metacrs2244/
Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA. digital.library.unt.edu/ark:/67531/metacrs3914/
Critical Infrastructure: The National Asset Database
The purpose of this report is to discuss the National Asset Database: what is in it, how it is populated, what the Database apparently is, what it is not, and how it is intended to be used. The report also discusses some of the issues on which Congress could focus its oversight, including appropriation bill language. digital.library.unt.edu/ark:/67531/metacrs9556/
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another). digital.library.unt.edu/ark:/67531/metacrs1253/
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another). digital.library.unt.edu/ark:/67531/metacrs1827/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5035/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5032/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5034/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5036/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs5033/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs1828/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs6265/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs6843/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs6664/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs3172/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs3171/
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks. digital.library.unt.edu/ark:/67531/metacrs3174/
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and, regulation. digital.library.unt.edu/ark:/67531/metadc462469/
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring. digital.library.unt.edu/ark:/67531/metacrs5039/
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring. digital.library.unt.edu/ark:/67531/metacrs3176/
FIRST PREV 1 2 3 4 NEXT LAST