The Exon-Florio National Security Test for Foreign Investment

The Exon-Florio National Security Test for Foreign Investment

Date: February 23, 2006
Creator: Jackson, James K
Description: The proposed acquisition of major operations in six major U.S. ports by Dubai Ports World and of Unocal by the China National Offshore Oil Corporation sparked intense concerns among some Members of Congress and the public and has reignited the debate over what role foreign acquisitions play in U.S. national security. The United States actively promotes internationally the national treatment of foreign firms. Several Members of Congress have introduced various measures during the 2nd Session of the 109th Congress that can be grouped into four major areas: those that deal specifically with the proposed Dubai Ports World acquisition; those that focus more generally on foreign ownership of U.S. ports; those that would amend the CFIUS process; and those that would amend the Exon-Florio process.
Contributing Partner: UNT Libraries Government Documents Department
The Exon-Florio National Security Test for Foreign Investment

The Exon-Florio National Security Test for Foreign Investment

Date: March 21, 2006
Creator: Jackson, James K
Description: The proposed acquisition of major operations in six major U.S. ports by Dubai Ports World and of Unocal by the China National Offshore Oil Corporation sparked intense concerns among some Members of Congress and the public and has reignited the debate over what role foreign acquisitions play in U.S. national security. The United States actively promotes internationally the national treatment of foreign firms. Several Members of Congress have introduced various measures during the 2nd Session of the 109th Congress that can be grouped into four major areas: those that deal specifically with the proposed Dubai Ports World acquisition; those that focus more generally on foreign ownership of U.S. ports; those that would amend the CFIUS process; and those that would amend the Exon-Florio process.
Contributing Partner: UNT Libraries Government Documents Department
The Exon-Florio National Security Test for Foreign Investment

The Exon-Florio National Security Test for Foreign Investment

Date: April 3, 2006
Creator: Jackson, James K
Description: The proposed acquisition of major operations in six major U.S. ports by Dubai Ports World and of Unocal by the China National Offshore Oil Corporation sparked intense concerns among some Members of Congress and the public and has reignited the debate over what role foreign acquisitions play in U.S. national security. The United States actively promotes internationally the national treatment of foreign firms. Several Members of Congress have introduced various measures during the 2nd Session of the 109th Congress that can be grouped into four major areas: those that deal specifically with the proposed Dubai Ports World acquisition; those that focus more generally on foreign ownership of U.S. ports; those that would amend the CFIUS process; and those that would amend the Exon-Florio process.
Contributing Partner: UNT Libraries Government Documents Department
The Exon-Florio National Security Test for Foreign Investment

The Exon-Florio National Security Test for Foreign Investment

Date: May 17, 2006
Creator: Jackson, James K
Description: The proposed acquisition of major operations in six major U.S. ports by Dubai Ports World and of Unocal by the China National Offshore Oil Corporation sparked intense concerns among some Members of Congress and the public and has reignited the debate over what role foreign acquisitions play in U.S. national security. The United States actively promotes internationally the national treatment of foreign firms. Several Members of Congress have introduced various measures during the 2nd Session of the 109th Congress that can be grouped into four major areas: those that deal specifically with the proposed Dubai Ports World acquisition; those that focus more generally on foreign ownership of U.S. ports; those that would amend the CFIUS process; and those that would amend the Exon-Florio process.
Contributing Partner: UNT Libraries Government Documents Department
Homeland Security: Defending U.S. Airspace

Homeland Security: Defending U.S. Airspace

Date: February 11, 2005
Creator: Bolkcom, Christopher
Description: The September 11th attacks drew attention to U.S. air defense, and the 9/11 Commission Report recommended that Congress regularly assess the ability of Northern Command to defend the United States against military threats. Protecting U.S. airspace may require improvements in detecting aircraft and cruise missiles, making quick operational decisions, and intercepting them. A number of options exist in each of these areas. A variety of issues must be weighed including expediency, cost, and minimizing conflicts with civilian aviation.
Contributing Partner: UNT Libraries Government Documents Department
Homeland Security: Defending U.S. Airspace

Homeland Security: Defending U.S. Airspace

Date: June 6, 2006
Creator: Bolkcom, Christopher
Description: The September 11th attacks drew attention to U.S. air defense, and the 9/11 Commission Report recommended that Congress regularly assess the ability of Northern Command to defend the United States against military threats. Protecting U.S. airspace may require improvements in detecting aircraft and cruise missiles, making quick operational decisions, and intercepting them. A number of options exist in each of these areas. A variety of issues must be weighed including expediency, cost, and minimizing conflicts with civilian aviation.
Contributing Partner: UNT Libraries Government Documents Department
Nuclear Weapons and U.S. National Security: A Need for New Weapons Programs?

Nuclear Weapons and U.S. National Security: A Need for New Weapons Programs?

Date: September 15, 2003
Creator: Woolf, Amy F
Description: None
Contributing Partner: UNT Libraries Government Documents Department
The Exon-Florio National Security Test for Foreign Investment

The Exon-Florio National Security Test for Foreign Investment

Date: July 15, 2005
Creator: Jackson, James K
Description: The proposed acquisition of major operations in six major U.S. ports by Dubai Ports World and of Unocal by the China National Offshore Oil Corporation sparked intense concerns among some Members of Congress and the public and has reignited the debate over what role foreign acquisitions play in U.S. national security. The United States actively promotes internationally the national treatment of foreign firms. Several Members of Congress have introduced various measures during the 2nd Session of the 109th Congress that can be grouped into four major areas: those that deal specifically with the proposed Dubai Ports World acquisition; those that focus more generally on foreign ownership of U.S. ports; those that would amend the CFIUS process; and those that would amend the Exon-Florio process.
Contributing Partner: UNT Libraries Government Documents Department
Post-911 National Threat Notification Efforts: Issues, Actions, and Options for Congress

Post-911 National Threat Notification Efforts: Issues, Actions, and Options for Congress

Date: April 29, 2005
Creator: Rollins, John & Cunningham, L.J.
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Border Security: Inspections Practices, Policies, and Issues

Border Security: Inspections Practices, Policies, and Issues

Date: May 26, 2004
Creator: Wasem, Ruth Ellen; Lake, Jennifer E; Seghetti, Lisa M; Monke, James & Viña, Stephen R
Description: Some argue that this reorganization of border inspections has been long needed and is resulting in a more streamlined and efficient set of procedures at the border with a clear, single, chain of command. Others warn that the different types of inspections are quite complex in their own right and that the reorganization is exacerbating the conflicting priorities at the border, ultimately resulting in many more people and goods being sent to secondary inspections. This report, which will not be updated, discusses a range of legal, administrative, and policy issues that are emerging with the implementation of the unified border inspections.
Contributing Partner: UNT Libraries Government Documents Department
Border Security: Inspections Practices, Policies, and Issues

Border Security: Inspections Practices, Policies, and Issues

Date: October 13, 2004
Creator: Wasem, Ruth Ellen; Lake, Jennifer E; Seghetti, Lisa M; Monke, James & Viña, Stephen R
Description: Some argue that this reorganization of border inspections has been long needed and is resulting in a more streamlined and efficient set of procedures at the border with a clear, single, chain of command. Others warn that the different types of inspections are quite complex in their own right and that the reorganization is exacerbating the conflicting priorities at the border, ultimately resulting in many more people and goods being sent to secondary inspections. This report, discusses a range of legal, administrative, and policy issues that are emerging with the implementation of the unified border inspections.
Contributing Partner: UNT Libraries Government Documents Department
Homeland Security: Establishment and Implementation of Northern Command

Homeland Security: Establishment and Implementation of Northern Command

Date: October 1, 2002
Creator: Bolkcom, Christopher; DeSerisy, Lloyd & Kapp, Lawrence
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: July 15, 2004
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: July 12, 2005
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
China's Rising Power: Alternative U.S. National Security Strategies - Findings of a Seminar

China's Rising Power: Alternative U.S. National Security Strategies - Findings of a Seminar

Date: June 6, 1996
Creator: Sutter, Robert G & Mitchener, Peter
Description: None
Contributing Partner: UNT Libraries Government Documents Department
The Multi-State Anti-Terrorism Information Exchange (MATRIX) Pilot Project

The Multi-State Anti-Terrorism Information Exchange (MATRIX) Pilot Project

Date: August 18, 2004
Creator: Krouse, William J
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: February 4, 2002
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: July 18, 2002
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: December 17, 2002
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: May 6, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: February 10, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: August 7, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: April 9, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructures: Background, Policy, and Implementation

Critical Infrastructures: Background, Policy, and Implementation

Date: September 25, 2003
Creator: Moteff, John D
Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 NEXT LAST