Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Date: October 17, 2003
Creator: Wilson, Clay
Item Type: Report
Partner: UNT Libraries Government Documents Department

Year 2000 Problem: Potential Impacts on National Infrastructures

Description: The year 2000 (Y2K) computer problem poses a potential threat to the continued proper functioning of many national infrastructures. These include telecommunications, utilities, financial services, health care, transportation, government services, and military preparedness. Other sectors -- such as water, agriculture, food processing and distribution, emergency services, and small and medium sized businesses -- have also been identified as having potentially significant Y2K problems but, due to space constraints, are not discussed here. While public and private sector entities report progress toward resolving their Y2K problems, much uncertainty remains regarding which systems are most vulnerable to failures. The overall impact resulting from the Y2K problem to some degree still depends on remediation progress made in 1999.
Date: December 4, 1998
Creator: Nunno, Richard M.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Critical Infrastructure and Key Assets: Definition and Identification

Description: This report reviews the concept and definition of “critical infrastructure” as it has appeared in federal reports, legislation and regulation since the early 1980s. The report highlights the changes and expansion of that definition as the focus of public policy debates shifted from infrastructure adequacy to infrastructure protection. Finally the report summarizes current policy issues associated with critical infrastructure identification by federal agencies and the private sector. The report is intentionally limited to definitional issues and categorization of infrastructure.
Date: October 1, 2004
Creator: Moteff, John D. & Parfomak, Paul W.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: What Makes an Infrastructure Critical?

Description: A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Date: January 29, 2003
Creator: Moteff, John D.; Copeland, Claudia & Fischer, John W.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: What Makes an Infrastructure Critical?

Description: A fluid definition of what constitutes a critical infrastructure could complicate policymaking and actions. At the very least, a growing list of infrastructures in need of protection will require the federal government to prioritize its efforts. Essentially the federal government will have to try to minimize the impact on the nation’s critical infrastructure of any future terrorist attack, taking into account what those impacts might be and the likelihood of their occurring.
Date: August 30, 2002
Creator: Moteff, John D.; Copeland, Claudia & Fischer, John W.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: July 14, 2003
Creator: Shea, Dana A
Item Type: Report
Partner: UNT Libraries Government Documents Department