Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: April 9, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: September 25, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: February 17, 2005
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: December 14, 2001
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: July 15, 2004
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: July 12, 2005
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: February 4, 2002
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: July 18, 2002
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background and Early Implementation of PDD-63

Description: The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Date: September 12, 2000
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background and Early Implementation of PDD-63

Description: The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Date: June 19, 2001
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

The Davis-Bacon Act: Institutional Evolution and Public Policy

Description: This report examines policy issues the Davis-Bacon Act has sparked through the years and which remain a part of the Davis-Bacon debate of the 1990s. These include such questions as: wage rate determination procedures, reporting requirements under the Copeland Act, an appropriate threshold for activation of the statute, interagency relationships with respect to Davis-Bacon enforcement and compliance activity, administrative or judicial appeals procedures, the use of "helpers" and other low-skilled workers on covered projects, and the right of a President to suspend the statute as well as the conditions under which such a suspension may occur. That the fundamental premise of the Act remains in contention after 60 years may be, itself, part of the public policy debate.
Date: November 30, 2007
Creator: Whittaker, William G.
Partner: UNT Libraries Government Documents Department

Drinking Water State Revolving Fund (DWSRF): Program Overview and Issues

Description: The Safe Drinking Water Act (SDWA) Amendments of 1996 authorized a drinking water state revolving loan fund (DWSRF) program to help public water systems finance infrastructure projects needed to comply with federal drinking water regulations and to protect public health. The Environmental Protection Agency's (EPA's) latest (2003) survey of capital improvement needs for public water systems found that water systems need to invest $276.8 billion on infrastructure improvements over 20 years to ensure the provision of safe water. Key issues include the gap between estimated needs and funding, SDWA compliance costs, and the need for cities to update and maintain water infrastructure, apart from SDWA compliance.
Date: October 24, 2008
Creator: Tiemann, Mary
Partner: UNT Libraries Government Documents Department

Foreign Science and Engineering Presence in U.S. Institutions and the Labor Force

Description: The increased presence of foreign students in graduate science and engineering programs and in the scientific workforce has been and continues to be of concern to some in the scientific community. Enrollment of U.S. citizens in graduate science and engineering programs has not kept pace with that of foreign students in those programs. In addition to the number of foreign students in graduate science and engineering programs, a significant number of university faculty in the scientific disciplines are foreign, and foreign doctorates are employed in large numbers by industry. This report examines these issues and discusses their policy implications.
Date: September 14, 2006
Creator: Matthews, Christine M.
Partner: UNT Libraries Government Documents Department

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Date: October 17, 2003
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Date: April 1, 2005
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department

The Army Corps of Engineers' Nationwide Permits Program: Issues and Regulatory Developments

Description: Permits issued by the U.S. Army Corps of Engineers authorize various types of development projects in wetlands and other waters of the United States. The Corps' regulatory process involves two types of permits: general permits for actions for private landowners that will likely have a minor effect on wetlands, and individual permits for more significant actions. Interest groups have a number of specific criticisms of the permits. For some time, there has been a stalemate in Congress over legislation related to this issue.
Date: August 21, 2008
Creator: Copeland, Claudia
Partner: UNT Libraries Government Documents Department