41 Matching Results

Search Results

Homeland Security: Defending U.S. Airspace

Description: This report discusses U.S. air defense, in the wake of 9/11. Protecting U.S. airspace may require improvements in detecting aircraft and cruise missiles, making quick operational decisions, and intercepting them. A number of options exist in each of these areas. A variety of issues must be weighed including expediency, cost, and minimizing conflicts with civilian aviation.
Date: June 6, 2006
Creator: Bolkcom, Christopher
Partner: UNT Libraries Government Documents Department

Homeland Security: Defending U.S. Airspace

Description: The September 11th attacks drew attention to U.S. air defense, and the 9/11 Commission Report recommended that Congress regularly assess the ability of Northern Command to defend the United States against military threats. Protecting U.S. airspace may require improvements in detecting aircraft and cruise missiles, making quick operational decisions, and intercepting them. This report discusses a number of options that exist in each of these areas. A variety of issues must be weighed including expediency, cost, and minimizing conflicts with civilian aviation.
Date: February 11, 2005
Creator: Bolkcom, Christopher
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: December 17, 2002
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

The Exon-Florio National Security Test for Foreign Investment

Description: The proposed acquisition of major operations in six major U.S. ports by Dubai Ports World and of Unocal by the China National Offshore Oil Corporation sparked intense concerns among some Members of Congress and the public and has reignited the debate over what role foreign acquisitions play in U.S. national security. The United States actively promotes internationally the national treatment of foreign firms. Several Members of Congress have introduced various measures during the 2nd Session of the 109th Congress that can be grouped into four major areas: those that deal specifically with the proposed Dubai Ports World acquisition; those that focus more generally on foreign ownership of U.S. ports; those that would amend the CFIUS process; and those that would amend the Exon-Florio process.
Date: July 15, 2005
Creator: Jackson, James K.
Partner: UNT Libraries Government Documents Department

The Exon-Florio National Security Test for Foreign Investment

Description: The proposed acquisition of major operations in six major U.S. ports by Dubai Ports World and of Unocal by the China National Offshore Oil Corporation sparked intense concerns among some Members of Congress and the public and has reignited the debate over what role foreign acquisitions play in U.S. national security. The United States actively promotes internationally the national treatment of foreign firms. Several Members of Congress have introduced various measures during the 2nd Session of the 109th Congress that can be grouped into four major areas: those that deal specifically with the proposed Dubai Ports World acquisition; those that focus more generally on foreign ownership of U.S. ports; those that would amend the CFIUS process; and those that would amend the Exon-Florio process.
Date: February 23, 2006
Creator: Jackson, James K.
Partner: UNT Libraries Government Documents Department

The Exon-Florio National Security Test for Foreign Investment

Description: The proposed acquisition of major operations in six major U.S. ports by Dubai Ports World and of Unocal by the China National Offshore Oil Corporation sparked intense concerns among some Members of Congress and the public and has reignited the debate over what role foreign acquisitions play in U.S. national security. The United States actively promotes internationally the national treatment of foreign firms. Several Members of Congress have introduced various measures during the 2nd Session of the 109th Congress that can be grouped into four major areas: those that deal specifically with the proposed Dubai Ports World acquisition; those that focus more generally on foreign ownership of U.S. ports; those that would amend the CFIUS process; and those that would amend the Exon-Florio process.
Date: March 21, 2006
Creator: Jackson, James K.
Partner: UNT Libraries Government Documents Department

The Exon-Florio National Security Test for Foreign Investment

Description: The proposed acquisition of major operations in six major U.S. ports by Dubai Ports World and of Unocal by the China National Offshore Oil Corporation sparked intense concerns among some Members of Congress and the public and has reignited the debate over what role foreign acquisitions play in U.S. national security. The United States actively promotes internationally the national treatment of foreign firms. Several Members of Congress have introduced various measures during the 2nd Session of the 109th Congress that can be grouped into four major areas: those that deal specifically with the proposed Dubai Ports World acquisition; those that focus more generally on foreign ownership of U.S. ports; those that would amend the CFIUS process; and those that would amend the Exon-Florio process.
Date: April 3, 2006
Creator: Jackson, James K.
Partner: UNT Libraries Government Documents Department

The Exon-Florio National Security Test for Foreign Investment

Description: The proposed acquisition of major operations in six major U.S. ports by Dubai Ports World and of Unocal by the China National Offshore Oil Corporation sparked intense concerns among some Members of Congress and the public and has reignited the debate over what role foreign acquisitions play in U.S. national security. The United States actively promotes internationally the national treatment of foreign firms. Several Members of Congress have introduced various measures during the 2nd Session of the 109th Congress that can be grouped into four major areas: those that deal specifically with the proposed Dubai Ports World acquisition; those that focus more generally on foreign ownership of U.S. ports; those that would amend the CFIUS process; and those that would amend the Exon-Florio process.
Date: May 17, 2006
Creator: Jackson, James K.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: May 6, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: February 10, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: August 7, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: April 9, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: September 25, 2003
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: February 17, 2005
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: December 14, 2001
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: July 15, 2004
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: July 12, 2005
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: February 4, 2002
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background, Policy, and Implementation

Description: The nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Date: July 18, 2002
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background and Early Implementation of PDD-63

Description: The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Date: September 12, 2000
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Critical Infrastructures: Background and Early Implementation of PDD-63

Description: The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).
Date: June 19, 2001
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Border Security: Inspections Practices, Policies, and Issues

Description: Some argue that this reorganization of border inspections has been long needed and is resulting in a more streamlined and efficient set of procedures at the border with a clear, single, chain of command. Others warn that the different types of inspections are quite complex in their own right and that the reorganization is exacerbating the conflicting priorities at the border, ultimately resulting in many more people and goods being sent to secondary inspections. This report, discusses a range of legal, administrative, and policy issues that are emerging with the implementation of the unified border inspections.
Date: October 13, 2004
Creator: Wasem, Ruth Ellen; Lake, Jennifer E.; Seghetti, Lisa M.; Monke, James & Viña, Stephen R.
Partner: UNT Libraries Government Documents Department

Border Security: Inspections Practices, Policies, and Issues

Description: Some argue that this reorganization of border inspections has been long needed and is resulting in a more streamlined and efficient set of procedures at the border with a clear, single, chain of command. Others warn that the different types of inspections are quite complex in their own right and that the reorganization is exacerbating the conflicting priorities at the border, ultimately resulting in many more people and goods being sent to secondary inspections. This report, which will not be updated, discusses a range of legal, administrative, and policy issues that are emerging with the implementation of the unified border inspections.
Date: May 26, 2004
Creator: Wasem, Ruth Ellen; Lake, Jennifer E.; Seghetti, Lisa M.; Monke, James & Viña, Stephen R.
Partner: UNT Libraries Government Documents Department