Congressional Research Service Reports - 241 Matching Results

Search Results

Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
Terrorist Nuclear Attacks on Seaports: Threat and Response
No Description Available.
The Evolving Broadband Infrastructure: Expansion, Applications, and Regulation
This report discusses issues for policymakers regarding how to craft a comprehensive broadband strategy that not only addresses broadband availability and adoption problems, but also addresses the long term impacts of next-generation networks on consumer use of the Internet and a regulatory framework that must keep pace with evolving telecommunications technology.
Critical Infrastructure Resilience: The Evolution of Policy and Programs and Issues for Congress
This report discusses the concept of resilience in the context of critical infrastructure and homeland security. It also identifies and discusses issues related to the evolution of policy and programs at the Department of Homeland Security (DHS) that are meant to, or could, promote the resiliency of the nation's critical infrastructure. The purpose of the report is to aid Congress in its oversight of critical infrastructure programs and activities at DHS.
Critical Infrastructure Security: CRS Experts
This report contains a table which provides access to names and contact information for CRS experts on policy concerns relating to critical infrastructure security. Policy areas identified include: mission; security services; and specific sectors: assessing vulnerabilities, planning and implementation.
Critical Infrastructure: The National Asset Database
The purpose of this report is to discuss the National Asset Database: what is in it, how it is populated, what the Database apparently is, what it is not, and how it is intended to be used. The report also discusses some of the issues on which Congress could focus its oversight, including appropriation bill language.
Critical Infrastructures: A Primer
The nation’s health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures. Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together.
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Critical Infrastructures: Background and Early Implementation of PDD-63
The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Critical Infrastructures: Background, Policy, and Implementation
This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and, regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.
Critical Infrastructures: Background, Policy, and Implementation
This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights two primary issues confronting Congress going forward, both in the context of cybersecurity: information sharing and regulation.
Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences
No Description Available.
Critical Infrastructure and Key Assets: Definition and Identification
This report reviews the concept and definition of “critical infrastructure” as it has appeared in federal reports, legislation and regulation since the early 1980s. The report highlights the changes and expansion of that definition as the focus of public policy debates shifted from infrastructure adequacy to infrastructure protection. Finally the report summarizes current policy issues associated with critical infrastructure identification by federal agencies and the private sector. The report is intentionally limited to definitional issues and categorization of infrastructure.
Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Critical Infrastructures: What Makes an Infrastructure Critical?
A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Year 2000 Problem: Potential Impacts on National Infrastructures
The year 2000 (Y2K) computer problem poses a potential threat to the continued proper functioning of many national infrastructures. These include telecommunications, utilities, financial services, health care, transportation, government services, and military preparedness. Other sectors -- such as water, agriculture, food processing and distribution, emergency services, and small and medium sized businesses -- have also been identified as having potentially significant Y2K problems but, due to space constraints, are not discussed here. While public and private sector entities report progress toward resolving their Y2K problems, much uncertainty remains regarding which systems are most vulnerable to failures. The overall impact resulting from the Y2K problem to some degree still depends on remediation progress made in 1999.
DOT's Federal Pipeline Safety Program: Background and Key Issues for Congress
This report reviews the history of federal programs for pipeline safety, significant safety issues, and recent developments focusing on key issues for Congress.
Guarding America: Security Guards and U.S. Critical Infrastructure Protection
No Description Available.
Vulnerability of Concentrated Critical Infrastructure: Background and Policy Options
No Description Available.
Vulnerability of Concentrated Critical Infrastructure: Background and Policy Options
No Description Available.
DOT's Federal Pipeline Safety Program: Background and Key Issues for Congress
This report reviews the history of federal programs for pipeline safety, significant safety issues, and recent developments focusing on key issues for Congress.
Liquefied Natural Gas (LNG) Infrastructure Security: Issues for Congress
This report provides an overview of industry and federal activities related to LNG security. The report describes U.S. LNG infrastructure, the industry's safety record and security risks, and the industry's security initiatives since September 11, 2001. It summarizes recent changes in federal LNG and maritime security law and related changes in the security roles of federal agencies. The report discusses several policy concerns related to federal LNG security efforts: 1) public costs of marine security, 2) uncertainty regarding LNG terrorism risks, and 3) security implications of promoting U.S.-flagged LNG tankers and U.S. crews.
Marine Security of Hazardouse Chemical Cargo
No Description Available.
How to Find Information in a Library
No Description Available.
How to Find Information in a Library
No Description Available.