Congressional Research Service Reports - 237 Matching Results

Search Results

Community Development Block Grants: Legislative Proposals to Assist Communities Affected by Home Foreclosures
In response to the rising number of home mortgage foreclosures, several bills have been introduced during the 110th Congress that would provide additional federal assistance to state and local governments with high concentrations of foreclosed homes, subprime mortgage loans, and delinquent home mortgages. At least one of these proposals, H.R. 3221, as passed by the Senate, includes provisions that would use the framework of the Community Development Block Grant (CDBG) program to channel an additional $4 billion in assistance to state and local governments. This provision faces an uncertain future; objections to it have been raised by the Bush Administration and others, contending that the assistance will result in the rescue of lenders and speculators.
Community Development Block Grants: Neighborhood Stabilization Program; Assistance to Communities Affected by Foreclosures
Report regarding the Housing and Economic Recovery Act of 2008, P.L. 110-289, which allocates federal financial aid to all state and local governments with high amounts of foreclosed homes, subprime mortgage loans, and delinquent home mortgages. The report focuses on the assistance that aids in aquiring, rehabilitating, and reselling foreclosed and abandoned homes.
Community Development Financial Institutions (CDFI) Fund: Programs and Policy Issues
This report begins by describing the Community Development Financial Institutions Fund's (Fund's) history, current appropriations, and each of its programs. The next section of the report analyzes four policy considerations of congressional interest, regarding the Fund and the effective use of federal resources to promote economic development. Lastly, this report examines the Fund's programs and management to see if they represent an effective and efficient government effort to promote economic development in low-income and distressed communities.
Community Development Financial Institutions (CDFI) Fund: Programs and Policy Issues
As communities face a variety of economic challenges, some are looking to local banks and financial institutions for solutions that address the specific development needs of low-income and distressed communities. Community development financial institutions (CDFIs) provide financial products and services, such as mortgage financing for homebuyers and not-for-profit developers; underwriting and risk capital for community facilities; technical assistance; and commercial loans and investments to small, start-up, or expanding businesses. This report begins by describing the CDFI Fund’s history, current appropriations, and each of its programs. A description of the fund’s process of certifying certain financial institutions to be eligible for the fund’s program awards follows. The next section provides an overview of each program’s purpose, use of award proceeds, eligibility criteria, and relevant issues for Congress.
Community Development Financial Institutions (CDFI) Fund: Programs and Policy Issues
This report begins by describing the Community Development Financial Institutions Fund's history, current appropriations, and each of its programs. The next section analyzes four policy considerations of congressional interest regarding the Fund and the effective use of federal resources to promote economic development. Lastly, this report examines the Fund's programs and management to see if they represent an effective and efficient government effort to promote economic development in low-income and distressed communities.
Community Development Financial Institutions (CDFI) Fund: Programs and Policy Issues
This report begins by describing the Community Development Financial Institutions Fund's (Fund's) history, current appropriations, and each of its programs. The next section of the report analyzes four policy considerations of congressional interest, regarding the Fund and the effective use of federal resources to promote economic development. Lastly, this report examines the Fund's programs and management to see if they represent an effective and efficient government effort to promote economic development in low-income and distressed communities.
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Critical Infrastructure and Key Assets: Definition and Identification
This report reviews the concept and definition of “critical infrastructure” as it has appeared in federal reports, legislation and regulation since the early 1980s. The report highlights the changes and expansion of that definition as the focus of public policy debates shifted from infrastructure adequacy to infrastructure protection. Finally the report summarizes current policy issues associated with critical infrastructure identification by federal agencies and the private sector. The report is intentionally limited to definitional issues and categorization of infrastructure.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
Critical Infrastructure Resilience: The Evolution of Policy and Programs and Issues for Congress
This report discusses the concept of resilience in the context of critical infrastructure and homeland security. It also identifies and discusses issues related to the evolution of policy and programs at the Department of Homeland Security (DHS) that are meant to, or could, promote the resiliency of the nation's critical infrastructure. The purpose of the report is to aid Congress in its oversight of critical infrastructure programs and activities at DHS.
Critical Infrastructure Security: CRS Experts
This report contains a table which provides access to names and contact information for CRS experts on policy concerns relating to critical infrastructure security. Policy areas identified include: mission; security services; and specific sectors: assessing vulnerabilities, planning and implementation.
Critical Infrastructure: The National Asset Database
The purpose of this report is to discuss the National Asset Database: what is in it, how it is populated, what the Database apparently is, what it is not, and how it is intended to be used. The report also discusses some of the issues on which Congress could focus its oversight, including appropriation bill language.
Critical Infrastructures: A Primer
The nation’s health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures. Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together.
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Critical Infrastructures: Background, Policy, and Implementation
This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and, regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights two primary issues confronting Congress going forward, both in the context of cybersecurity: information sharing and regulation.
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Cybersecurity: Critical Infrastructure Authoritative Reports and Resources
This report serves as a starting point for congressional staff assigned to cover cybersecurity issues as they relate to critical infrastructure. Much is written about protecting U.S. critical infrastructure, and this report directs the reader to authoritative sources that address many of the most prominent issues.
The Davis-Bacon Act: Institutional Evolution and Public Policy
This report examines policy issues the Davis-Bacon Act has sparked through the years and which remain a part of the Davis-Bacon debate of the 1990s. These include such questions as: wage rate determination procedures, reporting requirements under the Copeland Act, an appropriate threshold for activation of the statute, interagency relationships with respect to Davis-Bacon enforcement and compliance activity, administrative or judicial appeals procedures, the use of "helpers" and other low-skilled workers on covered projects, and the right of a President to suspend the statute as well as the conditions under which such a suspension may occur. That the fundamental premise of the Act remains in contention after 60 years may be, itself, part of the public policy debate.
DOT's Federal Pipeline Safety Program: Background and Key Issues for Congress
This report reviews the history of federal programs for pipeline safety, significant safety issues, and recent developments focusing on key issues for Congress.
DOT's Federal Pipeline Safety Program: Background and Key Issues for Congress
This report reviews the history of federal programs for pipeline safety, significant safety issues, and recent developments focusing on key issues for Congress.
Drinking Water State Revolving Fund (DWSRF): Program Overview and Issues
The Safe Drinking Water Act (SDWA) Amendments of 1996 authorized a drinking water state revolving loan fund (DWSRF) program to help public water systems finance infrastructure projects needed to comply with federal drinking water regulations and to protect public health. The Environmental Protection Agency's (EPA's) latest (2003) survey of capital improvement needs for public water systems found that water systems need to invest $276.8 billion on infrastructure improvements over 20 years to ensure the provision of safe water. Key issues include the gap between estimated needs and funding, SDWA compliance costs, and the need for cities to update and maintain water infrastructure, apart from SDWA compliance.
Drinking Water State Revolving Fund: Program Overview and Issues
This report discusses the Safe Drinking Water Act (SDWA) Amendments of 1996, which authorized a drinking water state revolving loan fund (DWSRF) program to help public water systems finance infrastructure projects needed to comply with federal drinking water regulations and to protect public health.
Earthquake Risk and U.S. Highway Infrastructure: Frequently Asked Questions
This report addresses frequently asked questions about the risk from earthquakes to highway systems, including bridges, tunnels, pavements, and other highway components. Particular attention is given to highway bridges, which often are the most vulnerable highway structures. The report also discusses federal and nonfederal actions to reduce seismic risk to the U.S. highway system.
Earthquake Risk and U.S. Highway Infrastructure: Frequently Asked Questions
This report addresses a number of frequently asked questions about earthquake risk and highway system components, especially bridges. Earthquakes and related events, such as soil liquefaction, landslides, tsunamis, flooding, and fires, pose risks to highway infrastructure. Concerns about the U.S. highway system's seismic vulnerability stem from interest in protecting public safety, facilitating response and recovery efforts, and minimizing economic loss and social disruption.