Advanced search Help
Resource Type or Special Collection is LLIS Collection
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Forest Fire/Wildfire Protection [January 29, 2009]
From the Document: "Congress continues to face questions about forestry practices, funding levels, and the federal role in wildland fire protection. Recent fire seasons have been, by most standards, among the worst in the past half century. National attention began to focus on wildfires when a prescribed burn in May 2000 escaped control and burned 239 homes in Los Alamos, NM. President Clinton responded by requesting a doubling of wildfire management funds, and Congress enacted much of this proposal in the FY2001 Interior appropriations act (P.L. 106-291). President Bush responded to the severe 2002 fires by proposing a Healthy Forests Initiative to reduce fuel loads by expediting review processes. Many factors contribute to the threat of wildfire damages. Two major factors are the decline in forest and rangeland health and the expansion of residential areas into wildlands--the wildlandurban interface. Over the past century, aggressive wildfire suppression, as well as past grazing and logging practices, have altered many ecosystems, especially those where light, surface fires were frequent. Many areas now have unnaturally high fuel loads (e.g., dead trees and dense thickets) and an historically unnatural mix of plant species (e.g., exotic invaders). Fuel treatments have been proposed to reduce the wildfire threats."
Library of Congress. Congressional Research Service
Gorte, Ross W.
2009-01-29
-
China Naval Modernization: Implications for U.S. Navy Capabilities-Background and Issues for Congress [August 5, 2010]
"The question of how the United States should respond to China's military modernization effort, including its naval modernization effort, has emerged as a key issue in U.S. defense planning. Admiral Michael Mullen, the Chairman of the Joints Chiefs of Staff, stated in June 2010 that 'I have moved from being curious to being genuinely concerned' about China's military programs. The question of how the United States should respond to China's military modernization effort is of particular importance to the U.S. Navy, because many U.S. military programs for countering improved Chinese military forces would fall within the Navy's budget. Decisions that Congress and the executive branch make regarding U.S. Navy programs for countering improved Chinese maritime military capabilities could affect the likelihood or possible outcome of a potential U.S.-Chinese military conflict in the Pacific over Taiwan or some other issue. Some observers consider such a conflict to be very unlikely, in part because of significant U.S.-Chinese economic linkages and the tremendous damage that such a conflict could cause on both sides. In the absence of such a conflict, however, the U.S.-Chinese military balance in the Pacific could nevertheless influence day-to-day choices made by other Pacific countries, including choices on whether to align their policies more closely with China or the United States."
Library of Congress. Congressional Research Service
O'Rourke, Ronald
2010-08-05
-
Intelligence Issues for Congress [January 20, 2011]
"To address the challenges facing the U.S. intelligence community in the 21st century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis. In December 2004, the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458) was signed, providing for a Director of National Intelligence (DNI) with substantial authorities to manage the national intelligence effort. The legislation also established a separate Director of the Central Intelligence Agency. Making cooperation effective presents substantial leadership and managerial challenges. The needs of intelligence 'consumers'--ranging from the White House to Cabinet agencies to military commanders--must all be met, using the same systems and personnel. Intelligence collection systems are expensive and some critics suggest there have been elements of waste and unneeded duplication of effort while some intelligence 'targets' have been neglected. The DNI has substantial statutory authorities to address these issues, but the organizational relationships remain complex, especially for intelligence agencies that are part of the Defense Department. Members of Congress will be seeking to observe the extent to which effective coordination is accomplished."
Library of Congress. Congressional Research Service
Best, Richard A.
2011-01-20
-
Gangs in Central America [January 3, 2011]
"Congress has maintained an interest in the effects of gang violence in Central America, and on the expanding activities of transnational gangs with ties to that region operating in the United States. The violent Mara Salvatrucha (MS-13) and its main rival, the '18th Street' gang (also known as M-18) continue to threaten citizen security and challenge government authority in Central America. Gang-related violence has been particularly acute in Honduras, El Salvador, and Guatemala, which have among the highest homicide rates in the world. In recent years, governments in those countries appeared to move away, at least on a rhetorical level, from repressive anti-gang strategies. However, continuing gang-related violence prompted El Salvador to adopt tough new legislation on gangs in September 2010. Guatemala may follow suit. U.S. officials have expressed concerns about the expanding presence of the MS-13 and M-18 in cities across the United States, as well as reports that these gangs may be evolving into more sophisticated transnational criminal enterprises. Between February 2005 and October 2010, U.S. officials arrested some 3,332 alleged MS-13 members in cities across the United States, many of whom were subsequently deported. Evidence suggests, however, that previously deported members of both the MS-13 and the M-18 often reenter the United States illegally."
Library of Congress. Congressional Research Service
Seelke, Clare Ribando
2011-01-03
-
Americans with Disabilities Act and Emergency Preparedness and Response [December 29, 2010]
From the Summary: "The Americans with Disabilities Act (ADA) provides broad nondiscrimination protection for individuals with disabilities in employment, public services, and public accommodations and services operated by private entities. Although the ADA does not include provisions specifically discussing its application to disasters, its nondiscrimination provisions are applicable to emergency preparedness and responses to disasters. In order to further the ADA's goals, President Bush issued an Executive Order on July 22, 2004, relating to emergency preparedness for individuals with disabilities and establishing the Interagency Coordinating Council on Emergency Preparedness and Individuals with Disabilities. The Department of Homeland Security (DHS) issued its Nationwide Plan Review Phase 2 Report, which includes a discussion of people with disabilities and emergency planning and readiness. The National Council on Disability has also issued recommendations on emergency preparation and disaster relief relating to individuals with disabilities. The Post-Katrina Emergency Management Reform Act of 2006 added the position of disability coordinator to FEMA."
Library of Congress. Congressional Research Service
Jones, Nancy Lee
2010-12-29
-
Border Security: The Role of the U.S. Border Patrol [August 11, 2010]
"The United States Border Patrol (USBP) has a long and storied history as our nation's first line of defense against unauthorized migration. Today, the USBP's primary mission is to detect and prevent the entry of terrorists, weapons of mass destruction, and illegal aliens into the country, and to interdict drug smugglers and other criminals along the border. The Homeland Security Act of 2002 dissolved the Immigration and Naturalization Service and placed the USBP within the Department of Homeland Security (DHS). Within DHS, the USBP forms a part of the Bureau of Customs and Border Protection under the Directorate of Border and Transportation Security. During the last decade, the USBP has seen its budget and manpower more than triple. This expansion was the direct result of congressional concerns about illegal immigration and the agency's adoption of 'Prevention Through Deterrence' as its chief operational strategy in 1994. The strategy called for placing USBP resources and manpower directly at the areas of greatest illegal immigration in order to detect, deter, and apprehend aliens attempting to cross the border between official points of entry. Post 9/11, the USBP refocused its strategy on preventing the entry of terrorists and weapons of mass destruction, as laid out in its recently released National Strategy. In addition to a workforce of over 20,000 agents, the USBP deploys vehicles, aircraft, watercraft, and many different technologies to defend the border. In the course of discharging its duties, the USBP patrols 8,000 miles of American international borders with Mexico and Canada and the coastal waters around Florida and Puerto Rico. However, there are significant geographic, political, and immigration-related differences between the northern border with Canada and the Southwest border with Mexico."
Library of Congress. Congressional Research Service
Haddal, Chad C.
2010-08-11
-
China Naval Modernization: Implications for U.S. Navy Capabilities--Background and Issues for Congress [August 26, 2010]
"The Department of Defense (DOD) and other observers believe that the near-term focus of China's military modernization effort has been to develop military options for addressing the situation with Taiwan. Consistent with this goal, observers believe that China wants its military to be capable of acting as a so-called anti-access force--a force that can deter U.S. intervention in a conflict involving Taiwan, or failing that, delay the arrival or reduce the effectiveness of intervening U.S. naval and air forces. DOD and other observers believe that China's military modernization effort, including its naval modernization effort, is increasingly oriented toward pursuing additional goals, such as asserting or defending China's claims in maritime territorial disputes, protecting China's sea lines of communications, displacing U.S. influence in the Pacific, and asserting China's status as a major world power. Placing an increased emphasis on U.S. Navy programs for countering improved Chinese maritime military capabilities in coming years could lead to one more of the following: developing and procuring highly capable ships, aircraft, and weapons for defeating Chinese anti-access systems; assigning a larger percentage of the Navy to the Pacific Fleet; homeporting more of the Pacific Fleet's ships at forward locations such as Hawaii, Guam, and Japan; increasing training and exercises in operations relating to countering Chinese maritime anti-access forces, such as antisubmarine warfare (ASW) operations; and increasing activities for monitoring and understanding developments in China's navy, as well as activities for measuring and better understanding operating conditions in the Western Pacific."
Library of Congress. Congressional Research Service
O'Rourke, Ronald
2010-08-26
-
Deepwater Horizon Oil Spill: Coastal Wetland and Wildlife Impacts and Response [August 5, 2010]
"Impacts of oil spills on wetland ecosystems depend on multiple factors, including the type of oil, exposure of the oil to weathering factors before it reaches the shore, the season in which the spill occurs, etc. Estimating wildlife impacts is particularly difficult in this case because the spill occurred far offshore, and the initial wildlife mortality came far out in the Gulf, where animals sank without reaching the shore. With the arrival of oil closer to the shore, more animals could be counted. Moreover, because the Gulf wetlands host many species of birds during seasonal migrations, impacts of the spill could be felt in areas well away from the Gulf. Mitigation and cleanup of damage to wetlands is far from an exact science and involves many tradeoffs: there is no single, best solution. This report describes a range of options from mechanical recovery and use of dispersants to doing nothing. Among other issues is a seemingly simple question: who decides what to do? But the answer is complex. The organizational structure for deciding how to respond to oil spills is specified in the National Contingency Plan (NCP), which was created administratively and has been broadened by the Clean Water Act, the Superfund law, and the Oil Pollution Act. Under the NCP structure, the Coast Guard is the lead federal agency for overseeing response and cleanup. Oil has reached more than 10% of Gulf shoreline, but until oil from the well stopped flowing, very little cleanup of wetlands was occurring, because of both the ongoing risk of greater harm from cleanup and the potential for re-oiling. As cleanup proceeds, a number of questions arise. To cite only two, what factors will determine cleanup strategies, and how are needs to improve scientific understanding of the spill's impacts being considered?"
Library of Congress. Congressional Research Service
Copeland, Claudia; Corn, M. Lynne (Mary Lynne), 1946-
2010-08-05
-
Smart Grid and Cybersecurity-Regulatory Policy and Issues [June 15, 2011]
"Electricity is vital to the commerce and daily functioning of United States. The modernization of the grid to accommodate today's uses is leading to the incorporation of information processing capabilities for power system controls and operations monitoring. The 'Smart Grid' is the name given to the evolving electric power network as new information technology systems and capabilities are incorporated. While these new components may add to the ability to control power flows and enhance the efficiency of grid operations, they also potentially increase the susceptibility of the grid to cyber (i.e., computer-related) attack since they are built around microprocessor devices whose basic functions are controlled by software programming. The potential for a major disruption or widespread damage to the nation's power system from a large scale cyberattack has increased focus on the cybersecurity of the Smart Grid. […] The electricity grid is connected to (and largely dependent on) the natural gas pipeline, water supply, and telecommunications systems. Technologies being developed for use by the Smart Grid could also be used by these industries. Consideration could be given to applying similar control system device and system safeguards to these other critical utility systems."
Library of Congress. Congressional Research Service
Campbell, Richard J.
2011-06-15
-
Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions [April 23, 2012]
"For more than a decade, various experts have expressed concerns about information-system security-often referred to as cybersecurity-in the United States and abroad. The frequency, impact, and sophistication of attacks on those systems has added urgency to the concerns. Consensus has also been growing that the current legislative framework for cybersecurity might need to be revised to address needs for improved cybersecurity, especially given the continuing evolution of the technology and threat environments. This report, with contributions from several CRS [Congressional Research Service] staff (see Acknowledgments), discusses that framework and proposals to amend more than 30 acts of Congress that are part of or relevant to it."
Library of Congress. Congressional Research Service
Fischer, Eric A.
2012-04-23
-
Transportation Security: Issues for the 112th Congress
"The nation's air, land, and marine transportation systems are designed for accessibility and efficiency, two characteristics that make them highly vulnerable to terrorist attack. While hardening the transportation sector from terrorist attack is difficult, measures can be taken to deter terrorists. The dilemma facing Congress is how best to construct and finance a system of deterrence, protection, and response that effectively reduces the possibility and consequences of another terrorist attack without unduly interfering with travel, commerce, and civil liberties. […] Existing law mandates the scanning of all U.S.-bound maritime containers with non-intrusive inspection equipment at overseas ports of loading by July 2012. This deadline is unlikely to be met, as foreign countries object to the costs of this screening and are dubious of the benefits. If Congress considers maritime security, it may examine the usefulness of this mandate, as well as the threat posed by the many small craft that populate commercial port areas and progress toward establishing harbor interagency operational centers."
Library of Congress. Congressional Research Service
Peterman, David Randall; Elias, Bartholomew; Frittelli, John
2011-02-01
-
Weather-Related Power Outages and Electric System Resiliency [August 28, 2012]
"High winds, especially when combined with precipitation from seasonal storms, can cause damage to electricity utility systems, resulting in service interruptions to large numbers of electricity customers. While most such power outages are caused by damage from trees and tree limbs falling on local electricity distribution lines and poles, major power outages tend to be caused by damage to electricity transmission lines, which carry bulk power long distances. Depending on the severity of the storm and resulting impairment, power outages can last a few hours or extend to periods of several days, and have real economic effects. Power outages can impact businesses (primarily through lost orders and damage to perishable goods and inventories), and manufacturers (mainly through downtime and lost production, or equipment damage). Data from various studies lead to cost estimates from storm-related outages to the U.S. economy at between $20 billion and $55 billion annually. Data also suggest the trend of outages from weather-related events is increasing."
Library of Congress. Congressional Research Service
Campbell, Richard J.
2012-08-28
-
Homeland Security: Coast Guard Operations - Background and Issues for Congress [Updated October 25, 2006]
"The Coast Guard is the lead federal agency for maritime homeland security. For FY2007, the Coast Guard is requesting a total of about $4.5 billion for missions defined in The Homeland Security Act of 2002 (P.L. 107-296) as the Coast Guard's homeland security missions. The Coast Guard's homeland security operations pose several potential issues for Congress. This report will be updated as events warrant."
Library of Congress. Congressional Research Service
O'Rourke, Ronald
2006-10-25
-
Homeland Security: Coast Guard Operations - Background and Issues for Congress [Updated September 12, 2006]
"The Coast Guard is the lead federal agency for maritime homeland security. For FY2007, the Coast Guard is requesting a total of about $4.5 billion for missions defined in The Homeland Security Act of 2002 (P.L. 107-296) as the Coast Guard's homeland security missions. This equates to about 54% of the Coast Guard's total requested FY2007budget. The Coast Guard's homeland security operations pose several potential issues for Congress, including adequacy of Coast Guard resources for performing both homeland security and non-homeland security missions, and Coast Guard coordination with other agencies involved in maritime homeland security. This report will be updated as events warrant."
Library of Congress. Congressional Research Service
O'Rourke, Ronald
2006-09-12
-
Homeland Security: Coast Guard Operations - Background and Issues for Congress [Updated August 14, 2006]
"The Coast Guard is the lead federal agency for maritime homeland security. For FY2007, the Coast Guard is requesting a total of about $4.5 billion for missions defined in The Homeland Security Act of 2002 (P.L. 107-296) as the Coast Guard's homeland security missions. This equates to about 54% of the Coast Guard's total requested FY2007budget. The Coast Guard's homeland security operations pose several potential issues for Congress, including adequacy of Coast Guard resources for performing both homeland security and non-homeland security missions, and Coast Guard coordination with other agencies involved in maritime homeland security. This report will be updated as events warrant."
Library of Congress. Congressional Research Service
O'Rourke, Ronald
2006-08-14
-
Interior Immigration Enforcement: Programs Targeting Criminal Aliens [December 20, 2012]
"Congress has a long-standing interest in seeing that immigration enforcement agencies identify and deport criminal aliens. The expeditious removal of such aliens has been a statutory priority since 1986, and the Department of Homeland Security (DHS) and its predecessor agency have operated programs targeting criminal aliens for removal since 1988. These programs have grown substantially since FY2005. Despite the interest in criminal aliens, inconsistencies in data quality, data collection, and definitions make it impossible to precisely enumerate the criminal alien population, defined in this report as all noncitizens ever convicted of a crime. CRS [Congressional Research Service] estimates the number of noncitizens incarcerated in federal and state prisons and local jails--a subset of all criminal aliens--at 173,000 in 2009 (the most recent year for which complete data are available), with state prisons and local jails each accounting for somewhat more incarcerations than federal prisons. The overall proportion of noncitizens in federal and state prisons and local jails corresponds closely to the proportion of noncitizens in the total U.S. population. DHS operates four programs designed in whole or in part to target criminal aliens: the Criminal Alien Program (CAP), Secure Communities, the §287(g) program, and the National Fugitive Operations Program (NFOP). The CAP, Secure Communities, and certain §287(g) programs are jail enforcement programs that screen individuals for immigration-related violations as they are being booked into jail and while they are incarcerated; the NFOP and some §287(g) programs are task force programs that target at-large criminal aliens. This report describes how these programs work and identifies their common features and key differences among them."
Library of Congress. Congressional Research Service
Kandel, William; Rosenblum, Marc R.
2012-12-20
-
Chemical Facility Security: Issues and Options for the 113th Congress [January 31, 2013]
"The Department of Homeland Security (DHS) has statutory authority to regulate chemical facilities for security purposes. The 112th Congress extended this authority through March 27, 2013. The Obama Administration has requested extension of this authority until October 4, 2013. Congressional policymakers have debated the scope and details of reauthorization and continue to consider establishing an authority with longer duration. Some Members of Congress support an extension, either short- or long-term, of the existing authority. Other Members call for revision and more extensive codification of chemical facility security regulatory provisions. Questions regarding the current law's effectiveness in reducing chemical facility risk and the sufficiency of federal chemical facility security efforts exacerbate the tension between continuing current policies and changing the statutory authority. […] The 113th Congress might take various approaches to this issue. Congress might allow the statutory authority to expire but continue providing appropriations to administer the regulations. Congress might permanently or temporarily extend the statutory authority to observe the impact of the current regulations and, if necessary, address any perceived weaknesses at a later date. Congress might codify the existing regulations in statute and reduce the discretion available to the Secretary of Homeland Security to change the current regulatory framework. Alternatively, Congress might substantively change the current regulation's implementation, scope, or impact by amending the existing statute or creating a new one. Finally, Congress might choose to terminate the program by allowing its authority to lapse and removing funding for the program. This would leave regulation of chemical facility security to state and local governments."
Library of Congress. Congressional Research Service
Shea, Dana A.
2013-01-31
-
Afghanistan: Post-Taliban Governance, Security, and U.S. Policy [March 24, 2011]
"Stated U.S. policy is to ensure that Afghanistan will not again become a base for terrorist attacks against the United States. Following three policy reviews on Afghanistan, the latest in December 2010, the Obama Administration asserts that it is pursuing a well-resourced and integrated military-civilian strategy intended to pave the way for a gradual transition to Afghan leadership beginning in July 2011 and to be completed by the end of 2014. Amid widespread doubts that Afghan governance and security institutions will be strong enough to protect themselves by that time, U.S. officials say that the U.S. intent is for a long term relationship with Afghanistan that might include U.S. military involvement long after 2014. A total of 51,000 additional U.S. forces were authorized by the two reviews, which has brought U.S. troop numbers to their current level of about 100,000, with partner forces adding about 41,000. In March 2011 testimony, the top U.S. and NATO commander in Afghanistan, General David Petraeus, stated that insurgent momentum has been blunted and even reversed in some key areas but he reiterated Administration comments that gains remain 'fragile and reversible.' U.N. assessments and some outside experts are more pessimistic than U.S. official views, asserting that the insurgents have expanded their presence in northern Afghanistan and will reassert themselves as international forces draw down. Still, a transition is set to begin in late June 2011 beginning with seven areas announced by President Hamid Karzai, and accompanied by a drawdown of U.S. forces that is expected to be small, and progress gradually. In an attempt to facilitate a more rapid transition, the top U.S. and NATO commander, General Petraeus has instituted some local security programs and has stepped up the use of air strikes and special forces operations to compel Taliban commanders to consider a negotiated settlement. However, there are major concerns among Afghanistan's minorities and among its women that reconciliation, if it were to occur, might produce compromises that erode the freedoms enjoyed since 2001."
Library of Congress. Congressional Research Service
Katzman, Kenneth
2011-03-24
-
Japan 2011 Earthquake: U.S. Department of Defense (DOD) Response [March 17, 2011]
From the Document: "With almost 40,000 U.S. troops stationed in Japan, the March 11, 2011, earthquake and tsunami is unique in that U.S. forces and associated resources were located in close proximity to deal with the crisis. All services--Army, Navy, Marine Corps, and Air Force--are present in Japan in various capacities. In addition, U.S. forces train regularly with their Japanese Self Defense Force (SDF) counterparts, including many humanitarian assistance and disaster relief exercises. With 100,000 SDF troops called up to respond to the disaster, U.S. forces were able to coordinate their efforts almost immediately to provide support for the Japanese responders. Within five days of the earthquake, the SDF had deployed 76,000 personnel (45,000 ground, 31,000 air and maritime); 194 rotary aircrafts and 322 fixed-wings; and 58 ships. As of March 16, the SDF had rescued 19,300 people, in addition to supporting activities at the troubled nuclear reactors."
Library of Congress. Congressional Research Service
Chanlett-Avery, Emma; Feickert, Andrew
2011-03-17
-
Earthquakes: Risk, Detection, Warning, and Research [August, 24, 2011]
"The United States faces the possibility of large economic losses from earthquake-damaged buildings and infrastructure. The Federal Emergency Management Agency has estimated that earthquakes cost the United States, on average, over $5 billion per year. California, Oregon, and Washington account for nearly $4.1 billion (77%) of the U.S. total estimated average annualized loss. California alone accounts for most of the estimated annualized earthquake losses for the nation. A single large earthquake, however, can cause far more damage than the average annual estimate. The 1994 Northridge (CA) earthquake caused as much as $26 billion (in 2005 dollars) in damage and was one of the costliest natural disasters to strike the United States. One study of the damage caused by a hypothetical magnitude 7.8 earthquake along the San Andreas Fault in southern California projected as many as 1,800 fatalities and more than $200 billion in economic losses. An issue for the 112th Congress is whether existing federally supported programs aimed at reducing U.S. vulnerability to earthquakes are an adequate response to the earthquake hazard. Under the National Earthquake Hazards Reduction Program (NEHRP), four federal agencies have responsibility for long-term earthquake risk reduction: the U.S. Geological Survey (USGS), the National Science Foundation (NSF), the Federal Emergency Management Agency (FEMA), and the National Institute of Standards and Technology (NIST). They variously assess U.S. earthquake hazards, deliver notifications of seismic events, develop measures to reduce earthquake hazards, and conduct research to help reduce overall U.S. vulnerability to earthquakes. Congressional oversight of the NEHRP program might revisit how well the four agencies coordinate their activities to address the earthquake hazard. Better coordination was a concern that led to changes to the program in legislation enacted in 2004 (P.L. 108-360)."
Library of Congress. Congressional Research Service
Folger, Peter (Peter Franklin)
2011-08-24
-
American Jihadist Terrorism: Combating a Complex Threat [November 15, 2011]
"This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. 'Homegrown' and 'domestic' are terms that describe terrorist activity or plots perpetrated within the United States or abroad by American citizens, legal permanent residents, or visitors radicalized largely within the United States. The term 'jihadist' describes radicalized individuals using Islam as an ideological and/or religious justification for their belief in the establishment of a global caliphate, or jurisdiction governed by a Muslim civil and religious leader known as a caliph. The term 'violent jihadist' characterizes jihadists who have made the jump to illegally supporting, plotting, or directly engaging in violent terrorist activity. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. It also outlines actions underway to build trust and partnership between community groups and government agencies and the tensions that may occur between law enforcement and engagement activities. One appendix provides details about each of the post-9/11 homegrown jihadist terrorist plots and attacks. A second appendix describes engagement and partnership activities by federal agencies with Muslim-American communities. Finally, the report offers policy considerations for Congress. There is an 'executive summary' at the beginning that summarizes the report's findings, observations, and policy considerations for Congress."
Library of Congress. Congressional Research Service
Bjelopera, Jerome P.
2011-11-15
-
Social Media and Disasters: Current Uses, Future Options, and Policy Considerations [September 6, 2011]
"The development of new technologies that have emerged since the mid-1990s has led to Internet-based applications known as 'social media' that enable people to interact and share information through media that were non-existent or widely unavailable 15 years ago. Examples of social media include blogs, chat rooms, discussion forums, wikis, YouTube Channels, LinkedIn, Facebook, and Twitter. Social media can be accessed by computer, tablets, smart and cellular phones, and mobile phone text messaging (SMS). In the last five years social media have played an increasing role in emergencies and disasters. Social media sites rank as the fourth most popular source to access emergency information. They have been used by individuals and communities to warn others of unsafe areas or situations, inform friends and family that someone is safe, and raise funds for disaster relief. Facebook supports numerous emergency-related organizations, including Information Systems for Crisis Response and Management (ISCRAM), The Humanitarian Free and Open Source Software (FOSS) Project, as well as numerous universities with disaster-related programs. The use of social media for emergencies and disasters may be conceptualized as two broad categories. First, social media can be used somewhat passively to disseminate information and receive user feedback via incoming messages, wall posts, and polls. To date, this is how most emergency management organizations, including the Federal Emergency Management Agency (FEMA), use social media. A second approach involves the systematic use of social media as an emergency management tool."
Library of Congress. Congressional Research Service
Lindsay, Bruce R.
2011-09-06
-
Cybersecurity: Selected Legal Issues [April 20, 2012]
"The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional interest. Critical infrastructure commonly refers to those entities that are so vital that their incapacitation or destruction would have a debilitating impact on national security, economic security, or the public health and safety. This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information among private sector and government entities. This report also discusses the degree to which federal law may preempt state law. It has been argued that, in order to ensure the continuity of critical infrastructure and the larger economy, a regulatory framework for selected critical infrastructure should be created to require a minimum level of security from cyber threats. On the other hand, others have argued that such regulatory schemes would not improve cybersecurity while increasing the costs to businesses, expose businesses to additional liability if they fail to meet the imposed cybersecurity standards, and increase the risk that proprietary or confidential business information may be inappropriately disclosed."
Library of Congress. Congressional Research Service
Ruane, Kathleen Ann; Stevens, Gina Marie; Liu, Edward C.
2012-04-20
-
Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement [July 19, 2011]
"Savvy criminals constantly develop new techniques to target U.S. persons, businesses, and interests. Individual criminals as well as broad criminal networks exploit geographic borders, criminal turf, cyberspace, and law enforcement jurisdiction to dodge law enforcement countermeasures. Further, the interplay of these realities can potentially encumber policing measures. In light of these interwoven realities, policy makers may question how to best design policies to help law enforcement combat ever-evolving criminal threats. Criminals routinely take advantage of geographic borders. They thrive on their ability to illicitly cross borders, subvert border security regimens, and provide illegal products or services. Many crimes--particularly those of a cyber nature--have become increasingly transnational. While criminals may operate across geographic borders and jurisdictional boundaries, law enforcement may not be able to do so with the same ease. Moreover, obstacles such as disparities between the legal regimens of nations (what is considered a crime in one country may not be in another) and differences in willingness to extradite suspected criminals can hamper prosecutions. The law enforcement community has, however, expanded its working relationships with both domestic and international agencies. […] Congress may question how it can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime. For instance, Congress may consider whether federal law enforcement has the existing authorities, technology, and resources--both monetary and manpower--to counter 21st century criminals. Congress may also examine whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information."
Library of Congress. Congressional Research Service
Finklea, Kristin M.
2011-07-19
-
Air Cargo Security [Updated July 30, 2007]
"The air cargo system is a complex, multi-faceted network that handles a vast amount of freight, packages, and mail carried aboard passenger and all-cargo aircraft. The air cargo system is vulnerable to several security threats including potential plots to place explosives aboard aircraft; illegal shipments of hazardous materials; criminal activities such as smuggling and theft; and potential hijackings and sabotage by persons with access to aircraft. Several procedural and technology initiative to enhance air cargo security and deter terrorist and criminal threats have been put in place or are under consideration. Procedural initiatives include industry-wide consolidation of the 'known shipper' program; increased cargo inspections; increased physical security of air cargo facilities; increased oversight of air cargo operations; security training for cargo workers; and stricter controls over access to cargo aircraft and air cargo operations areas. Technology being considered to improve air cargo security includes tamper-resistant and tamper-evident packaging and containers; explosive detection systems (EDS) and other cargo screening technologies; blast-resistant cargo containers and aircraft hardening; and biometric systems for worker identification and access control. […] In practice, the Transportation Security Administration (TSA) has relied heavily on 'known shipper' protocols to prevent shipments of cargo from unknown sources on passenger aircraft. ATSA also mandated that a security plan for all-cargo operations was to be put in place as soon as possible, but aviation security initiatives in the aftermath of the 9/11 attacks have primarily focused on passenger operations and full implementation of the air cargo strategic plan has not been fully completed."
Library of Congress. Congressional Research Service
Elias, Bartholomew
2007-07-30
-
Avian Influenza in Poultry and Wild Birds [Updated March 29, 2007]
"Avian influenza is a viral disease that primarily infects birds, both domestic and wild. Certain strains of bird flu break the avian barrier and have been known to infect other animals and humans. Avian flu viruses are common among wild bird populations, which act as a reservoir for the disease. While rarely fatal in wild birds, avian flu is highly contagious and often fatal in domestic poultry, prompting strict biosecurity measures on farms. International trade restrictions imposed by countries to counter avian flu can have large economic effects. The H5N1 strain of highly pathogenic avian influenza (HPAI) has spread throughout Asia since 2003, infecting mostly poultry, some wild birds, and a limited number of humans through close domestic poultry-to-human contact. The virus has spread beyond Asia, reaching Europe in 2005 and the Middle East and Africa in 2006. Over 250 million poultry have died or been destroyed internationally. Human mortality among the more than 275 people infected exceeds 55%. Fears that the virus could mutate to allow efficient human-to-human transmission and cause a human pandemic have prompted a massive political and public health response. Since wild birds can carry the highly pathogenic H5N1 virus, federal, state, and other agencies have increased surveillance of wild and migratory birds. Surveillance is particularly high in Alaska, where Asian and American flyways overlap."
Library of Congress. Congressional Research Service
Corn, M. Lynne (Mary Lynne), 1946-; Monke, James
2007-03-29
-
FEMA Reorganization Legislation in the 109th Congress [July 12, 2006]
"Members of Congress have introduced legislation in both the House and Senate to alter federal emergency management organizational structures and responsibilities, amend authorities that guide federal action, impose emergency management leadership qualification requirements, and make other changes. The proposals are based upon investigations conducted on the role of the Federal Emergency Management Agency (FEMA) and other entities in the response to Hurricane Katrina in the fall of 2005. Some observers reduce the matter to one basic question: 'Should FEMA remain within the Department of Homeland Security (DHS), or should the agency regain the independent status it had before the creation of DHS?' The issue, however, is more complex than just one of organizational placement. Other questions include the following: What should be the reach or limit of the entity's authority? What degree of discretion should Congress extend to the President and executive branch officials to act in emergency situations? What functions or responsibilities should be transferred to the new entity? Which should be retained by other DHS entities? How can inter-agency coordination be ensured? To what extent should the White House be involved in emergency management on a continuing basis as well as during an emergency? How might Congress balance recognition of state sovereignty and primacy in the emergency management field while authorizing prompt federal response? If details such as personnel qualifications, training requirements, performance metrics, and inter-agency coordination mechanisms are set in statute, will federal agencies have the flexibility to adapt procedures and personnel to dynamic crises?"
Library of Congress. Congressional Research Service
Bea, Keith; Hogue, Henry B.
2006-07-12
-
Data Mining and Homeland Security: An Overview [Updated October 3, 2006]
"Data mining has become one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists themselves, such as through travel and immigration records. As with other aspects of data mining, while technological capabilities are important, there are other implementation and oversight issues that can influence the success of a project's outcome. One issue is data quality, which refers to the accuracy and completeness of the data being analyzed. A second issue is the interoperability of the data mining software and databases being used by different agencies. A third issue is mission creep--the use of data for purposes other than for which the data were originally collected. A fourth issue is privacy. Questions that may be considered include the degree to which government agencies should use and mix commercial data with government data, whether data sources are being used for purposes other than those for which they were originally designed, and possible application of the Privacy Act to these initiatives. It is anticipated that congressional oversight of data mining projects will grow as data mining efforts continue to evolve. This report will be updated as events warrant."
Library of Congress. Congressional Research Service
Seifert, Jeffrey W.
2006-10-03
-
Federal Counter-Terrorism Training: Issues for Congressional Oversight [Updated August 31, 2006]
From the Summary: "Federal counter-terrorism training programs are varied and are provided by numerous federal agencies and departments. Some of these departments and agencies include the Departments of Defense (DOD), Energy (DOE), Homeland Security (DHS), Health and Human Services (HHS), Justice (DOJ), Transportation (DOT), and the Environmental Protection Agency (EPA). Each department and agency provides specific counter-terrorism training targeted to given categories of recipients. Training recipients include federal, state, and local government personnel, emergency responders, and private and public critical infrastructure personnel. The programs train individuals to prepare for, respond to, and recover from terrorist attacks. Most of these federal departments and agencies provide training in conjunction with private and public educational institutions, federal laboratories, and federal research and development centers. [...] This report is an overview of the major training activities and facilities of the federal departments and agencies that provide counter-terrorism training."
Library of Congress. Congressional Research Service
Reese, Shawn
2006-08-31
-
Homeland Security Grants: Evolution of Program Guidance and Grant Allocation Methods [Updated August 7, 2006]
"On May 31, 2006, the U.S. Department of Homeland Security (DHS) announced FY2006 allocations of federal homeland security assistance to states and urban areas. That assistance is made available through the following three programs: the State Homeland Security Grant Program (SHSGP), […] the Law Enforcement Terrorism Prevention Program (LETPP), […] the Urban Area Security Initiative (UASI). […] This CRS report explains the evolving administrative guidance that governs the three homeland security assistance programs, discusses the changing DHS requirements for grant applications and subsequent reporting by recipients, describes the DHS grant allocation methods, and identified pertinent oversight questions that may be of interest to Congress." This document includes tables of "Asset Types Used in Asset-Based Risk Calculations," and "DHS's Risk Calculation Geographic Attributes," which are utilized in allocating grants. The authors also provide a chart of the "National Asset Database Totals by Critical Infrastructure and Key Resource Sectors."
Library of Congress. Congressional Research Service
Reese, Shawn
2006-08-07