Congressional Research Service Reports - 39 Matching Results

Search Results

21st Century Community Learning Centers: Evaluation and Implementation Issues

Description: The 21st CCLC program was originally authorized as Part I of Title X, of the Elementary and Secondary Education Act (ESEA), as amended. This program was reauthorized as part of the reauthorization of the ESEA by the No Child Left Behind Act of 2001, P.L. 107-110, and was signed into law on January 8, 2002. This report discusses implementation of the reauthorized 21st CCLC program, and the recent evaluation of the program and its implications.
Date: December 16, 2003
Creator: McCallion, Gail
Partner: UNT Libraries Government Documents Department

Airport Improvement Program

Description: This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Date: February 7, 2003
Creator: Kirk, Robert S.
Partner: UNT Libraries Government Documents Department

Airport Improvement Program

Description: This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Date: March 4, 2003
Creator: Kirk, Robert S.
Partner: UNT Libraries Government Documents Department

Airport Improvement Program

Description: This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Date: May 5, 2003
Creator: Kirk, Robert S.
Partner: UNT Libraries Government Documents Department

Airport Improvement Program

Description: This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Date: June 2, 2003
Creator: Kirk, Robert S.
Partner: UNT Libraries Government Documents Department

Airport Improvement Program

Description: This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Date: June 13, 2003
Creator: Kirk, Robert S.
Partner: UNT Libraries Government Documents Department

Airport Improvement Program

Description: This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds,AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Date: July 14, 2003
Creator: Kirk, Robert S.
Partner: UNT Libraries Government Documents Department

Airport Improvement Program

Description: This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Date: August 29, 2003
Creator: Kirk, Robert S.
Partner: UNT Libraries Government Documents Department

Airport Improvement Program

Description: This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Date: September 26, 2003
Creator: Kirk, Robert S.
Partner: UNT Libraries Government Documents Department

Airport Improvement Program

Description: This issue brief discusses the Airport Improvement Program and its complement, the Passenger Facility Charge (PFC). After a brief history of federal support for airport construction and improvement, the report describes AIP funding, its source of revenues, funding distribution, the types of projects the program funds, AIP and PFC policy issues, and the allowable use of AIP funds for airport security purposes.
Date: October 14, 2003
Creator: Kirk, Robert S.
Partner: UNT Libraries Government Documents Department

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Date: October 17, 2003
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: February 21, 2003
Creator: Shea, Dana A
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: April 23, 2003
Creator: Shea, Dana A
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: July 14, 2003
Creator: Shea, Dana A
Partner: UNT Libraries Government Documents Department

Critical Infrastructure Information Disclosure and Homeland Security

Description: This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
Date: January 29, 2003
Creator: Moteff, John D. & Stevens, Gina Marie
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: April 9, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: February 10, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: May 6, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: August 7, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: September 25, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: What Makes an Infrastructure Critical?

Description: A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Date: January 29, 2003
Creator: Moteff, John D.; Copeland, Claudia & Fischer, John W.
Partner: UNT Libraries Government Documents Department