Congressional Research Service Reports - Browse

ABOUT BROWSE FEED
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Anthrax-Contaminated Facilities: Preparations and a Standard for Remediation
This report provides background information on the 2001 anthrax incidents and federal preparedness plans, but it focuses primarily on preparations for future remediations and considerations for setting a remediation standard.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Rural Water Supply and Sewer Systems: Background Information
This report discusses the Safe Drinking Water Act and the Clean Water Act, which impose requirements regarding drinking water quality and wastewater treatment in rural areas. Approximately 27% of the U.S. population lives in areas defined by the Census Bureau as rural. Many rural communities need to complete water and waste disposal projects to improve the public health and environmental conditions of their citizens.
Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview
No Description Available.
Critical Infrastructure: The National Asset Database
The purpose of this report is to discuss the National Asset Database: what is in it, how it is populated, what the Database apparently is, what it is not, and how it is intended to be used. The report also discusses some of the issues on which Congress could focus its oversight, including appropriation bill language.
Presidential Libraries: The Federal System and Related Legislation
This report provides a brief overview of the federal presidential libraries system and tracks the progress of related legislation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and, regulation.
Highway Bridges: Conditions and the Federal/State Role
This report examines the federal and state roles in the maintenance, inspection, reconstruction, and replacement of the nation's highway bridge infrastructure, as well as the emergency response and reconstruction role of the Department of Transportation (DOT). The report first describes what is known about the condition of the nation's bridges and whether the problem of structural deficiency is improving or worsening. It then briefly describes the programmatic and budgetary context, including federal efforts to reduce the number of deficient bridges, and examines highway bridge spending. The report discusses issues Congress is facing face in light of the I-35W bridge collapse and the emergence of questions about the appropriateness and effectiveness of related federal infrastructure policies, programs, and spending. Finally, the report describes a number of legislative initiatives that have been proposed.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Community Development Block Grants: Neighborhood Stabilization Program; Assistance to Communities Affected by Foreclosures
Report regarding the Housing and Economic Recovery Act of 2008, P.L. 110-289, which allocates federal financial aid to all state and local governments with high amounts of foreclosed homes, subprime mortgage loans, and delinquent home mortgages. The report focuses on the assistance that aids in aquiring, rehabilitating, and reselling foreclosed and abandoned homes.
The Evolving Broadband Infrastructure: Expansion, Applications, and Regulation
This report discusses issues for policymakers regarding how to craft a comprehensive broadband strategy that not only addresses broadband availability and adoption problems, but also addresses the long term impacts of next-generation networks on consumer use of the Internet and a regulatory framework that must keep pace with evolving telecommunications technology.
An Overview of the Administration's Strengthening America's Communities Initiative
This report discusses administration’s proposed base program called strengthening America’s communities initiative intended to award funds in support of job creation and economic development.
An Overview of the Administration's Strengthening America's Communities Initiative
This report discusses administration’s proposed base program called strengthening America’s communities initiative intended to award funds in support of job creation and economic development.
Hurricane-Damaged Drinking Water and Wastewater Facilities: Impacts, Needs, and Response
This report describes information that has been gathered about impacts of the August 29 hurricane (Hurricane Katrina) on drinking water and wastewater treatment facilities, and on ongoing efforts to assess damages and needs to repair and reconstruct damaged systems.
Water Resources Development Act (WRDA): Army Corps of Engineers Authorization Issues in the 109th Congress
The Corps is a federal agency in the Department of Defense with military and civilian responsibilities. At the direction of Congress, the Corps plans, builds, operates, and maintains a wide range of water resources facilities in U.S. states and territories.
Drinking Water State Revolving Fund: Program Overview and Issues
This report discusses the Safe Drinking Water Act (SDWA) Amendments of 1996, which authorized a drinking water state revolving loan fund (DWSRF) program to help public water systems finance infrastructure projects needed to comply with federal drinking water regulations and to protect public health.
Hurricane-Damaged Drinking Water and Wastewater Facilities: Impacts, Needs, and Response
This report describes information that has been gathered about impacts of Hurricanes Katrina and Rita on drinking water and wastewater treatment facilities and on ongoing efforts to assess damages and needs to repair and reconstruct damaged systems.
Hurricane Katrina: Shipping Disruptions
This report discusses hurricane Katrina, the extent of the damage, how soon normal port operations can resume, and which shippers in particular will have the hardest time adapting should the disruption continue for an extended period.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Surface Transportation Reauthorization: Environmental Issues and Legislative Provisions in SAFETEA-LU (H.R. 3)
No Description Available.
Terminal Operators and Their Role in U.S. Port and Maritime Security
No Description Available.
Marine Security of Hazardouse Chemical Cargo
No Description Available.
An Overview of the U.S. Public Health System in the Context of Bioterrorism
No Description Available.
An Overview of the U.S. Public Health System in the Context of Emergency Preparedness
No Description Available.
The Davis-Bacon Act: Institutional Evolution and Public Policy
This report examines policy issues the Davis-Bacon Act has sparked through the years and which remain a part of the Davis-Bacon debate of the 1990s. These include such questions as: wage rate determination procedures, reporting requirements under the Copeland Act, an appropriate threshold for activation of the statute, interagency relationships with respect to Davis-Bacon enforcement and compliance activity, administrative or judicial appeals procedures, the use of "helpers" and other low-skilled workers on covered projects, and the right of a President to suspend the statute as well as the conditions under which such a suspension may occur. That the fundamental premise of the Act remains in contention after 60 years may be, itself, part of the public policy debate.
Drinking Water State Revolving Fund (DWSRF): Program Overview and Issues
The Safe Drinking Water Act (SDWA) Amendments of 1996 authorized a drinking water state revolving loan fund (DWSRF) program to help public water systems finance infrastructure projects needed to comply with federal drinking water regulations and to protect public health. The Environmental Protection Agency's (EPA's) latest (2003) survey of capital improvement needs for public water systems found that water systems need to invest $276.8 billion on infrastructure improvements over 20 years to ensure the provision of safe water. Key issues include the gap between estimated needs and funding, SDWA compliance costs, and the need for cities to update and maintain water infrastructure, apart from SDWA compliance.
Foreign Science and Engineering Presence in U.S. Institutions and the Labor Force
The increased presence of foreign students in graduate science and engineering programs and in the scientific workforce has been and continues to be of concern to some in the scientific community. Enrollment of U.S. citizens in graduate science and engineering programs has not kept pace with that of foreign students in those programs. In addition to the number of foreign students in graduate science and engineering programs, a significant number of university faculty in the scientific disciplines are foreign, and foreign doctorates are employed in large numbers by industry. This report examines these issues and discusses their policy implications.
Hurricane-Damaged Drinking Water and Wastewater Facilities: Impacts, Needs, and Response
No Description Available.
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
The Army Corps of Engineers' Nationwide Permits Program: Issues and Regulatory Developments
Permits issued by the U.S. Army Corps of Engineers authorize various types of development projects in wetlands and other waters of the United States. The Corps' regulatory process involves two types of permits: general permits for actions for private landowners that will likely have a minor effect on wetlands, and individual permits for more significant actions. Interest groups have a number of specific criticisms of the permits. For some time, there has been a stalemate in Congress over legislation related to this issue.