Advanced search Help
Resource Type or Special Collection is LLIS Collection
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
FEMA Reorganization Legislation in the 109th Congress [July 12, 2006]
"Members of Congress have introduced legislation in both the House and Senate to alter federal emergency management organizational structures and responsibilities, amend authorities that guide federal action, impose emergency management leadership qualification requirements, and make other changes. The proposals are based upon investigations conducted on the role of the Federal Emergency Management Agency (FEMA) and other entities in the response to Hurricane Katrina in the fall of 2005. Some observers reduce the matter to one basic question: 'Should FEMA remain within the Department of Homeland Security (DHS), or should the agency regain the independent status it had before the creation of DHS?' The issue, however, is more complex than just one of organizational placement. Other questions include the following: What should be the reach or limit of the entity's authority? What degree of discretion should Congress extend to the President and executive branch officials to act in emergency situations? What functions or responsibilities should be transferred to the new entity? Which should be retained by other DHS entities? How can inter-agency coordination be ensured? To what extent should the White House be involved in emergency management on a continuing basis as well as during an emergency? How might Congress balance recognition of state sovereignty and primacy in the emergency management field while authorizing prompt federal response? If details such as personnel qualifications, training requirements, performance metrics, and inter-agency coordination mechanisms are set in statute, will federal agencies have the flexibility to adapt procedures and personnel to dynamic crises?"
Library of Congress. Congressional Research Service
Bea, Keith; Hogue, Henry B.
2006-07-12
-
Data Mining and Homeland Security: An Overview [Updated October 3, 2006]
"Data mining has become one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists themselves, such as through travel and immigration records. As with other aspects of data mining, while technological capabilities are important, there are other implementation and oversight issues that can influence the success of a project's outcome. One issue is data quality, which refers to the accuracy and completeness of the data being analyzed. A second issue is the interoperability of the data mining software and databases being used by different agencies. A third issue is mission creep--the use of data for purposes other than for which the data were originally collected. A fourth issue is privacy. Questions that may be considered include the degree to which government agencies should use and mix commercial data with government data, whether data sources are being used for purposes other than those for which they were originally designed, and possible application of the Privacy Act to these initiatives. It is anticipated that congressional oversight of data mining projects will grow as data mining efforts continue to evolve. This report will be updated as events warrant."
Library of Congress. Congressional Research Service
Seifert, Jeffrey W.
2006-10-03
-
Federal Counter-Terrorism Training: Issues for Congressional Oversight [Updated August 31, 2006]
From the Summary: "Federal counter-terrorism training programs are varied and are provided by numerous federal agencies and departments. Some of these departments and agencies include the Departments of Defense (DOD), Energy (DOE), Homeland Security (DHS), Health and Human Services (HHS), Justice (DOJ), Transportation (DOT), and the Environmental Protection Agency (EPA). Each department and agency provides specific counter-terrorism training targeted to given categories of recipients. Training recipients include federal, state, and local government personnel, emergency responders, and private and public critical infrastructure personnel. The programs train individuals to prepare for, respond to, and recover from terrorist attacks. Most of these federal departments and agencies provide training in conjunction with private and public educational institutions, federal laboratories, and federal research and development centers. [...] This report is an overview of the major training activities and facilities of the federal departments and agencies that provide counter-terrorism training."
Library of Congress. Congressional Research Service
Reese, Shawn
2006-08-31
-
Homeland Security Grants: Evolution of Program Guidance and Grant Allocation Methods [Updated August 7, 2006]
"On May 31, 2006, the U.S. Department of Homeland Security (DHS) announced FY2006 allocations of federal homeland security assistance to states and urban areas. That assistance is made available through the following three programs: the State Homeland Security Grant Program (SHSGP), […] the Law Enforcement Terrorism Prevention Program (LETPP), […] the Urban Area Security Initiative (UASI). […] This CRS report explains the evolving administrative guidance that governs the three homeland security assistance programs, discusses the changing DHS requirements for grant applications and subsequent reporting by recipients, describes the DHS grant allocation methods, and identified pertinent oversight questions that may be of interest to Congress." This document includes tables of "Asset Types Used in Asset-Based Risk Calculations," and "DHS's Risk Calculation Geographic Attributes," which are utilized in allocating grants. The authors also provide a chart of the "National Asset Database Totals by Critical Infrastructure and Key Resource Sectors."
Library of Congress. Congressional Research Service
Reese, Shawn
2006-08-07
-
Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress [Updated January 29, 2008]
"Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks. Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a 'botnet,' to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic, political, and military organizations may increase in the future. Cybercriminals have reportedly made alliances with drug traffickers in Afghanistan, the Middle East, and elsewhere where profitable illegal activities are used to support terrorist groups. In addition, designs for cybercrime botnets are becoming more sophisticated, and future botnet architectures may be more resistant to computer security countermeasures."
Library of Congress. Congressional Research Service
Wilson, Clay
2008-01-29
-
Terrorist Capabilities for Cyberattack: Overview and Policy Issues [Updated January 22, 2007]
"Terrorist's use of the internet and other telecommunications devices is growing both in terms of reliance for supporting organizational activities and for gaining expertise to achieve operational goals. Tighter physical and border security may also encourage terrorists and extremists to try to use other types of weapons to attack the United States. Persistent Internet and computer security vulnerabilities, which have been widely publicized, may gradually encourage terrorists to continue to enhance their computer skills, or develop alliances with criminal organizations and consider attempting a cyberattack against the U.S. critical infrastructure. […] The United States and international community have taken steps to coordinate laws to prevent cybercrime, but if trends continue computer attacks will become more numerous, faster, and more sophisticated. In addition, a recent report by the Government Accountability Office states that, in the future, U.S. government agencies may not be able to respond effectively to such attacks. This report examines possible terrorists' objectives and computer vulnerabilities that might lead to an attempted cyberattack against the critical infrastructure of the U.S. homeland, and also discusses the emerging computer and other technical skills of terrorists and extremists. Policy issues include exploring ways to improve technology for cybersecurity, or whether U.S. counterterrorism efforts should be linked more closely to international efforts to prevent cybercrime."
Library of Congress. Congressional Research Service
Wilson, Clay; Rollins, John
2007-01-22
-
Department of Homeland Security Grants to State and Local Governments: FY2003 to FY2006 [December 22, 2006]
"This report analyzes federal grants to state and local governments that are administered by the Department of Homeland Security (DHS). These grants, which are allocated primarily at the discretion of DHS, are intended to enhance homeland security. This report summarizes seven DHS grant programs - the State Homeland Security Grant Program (SHSGP), the Urban Area Security Initiative (UASI), the Law Enforcement Terrorism Prevention Program (LETPP), the Emergency Management Performance Grant Program (EMPG), the Metropolitan Medical Response System (MMRS), the Citizen Corps Program (CCP), and the Critical Infrastructure Protection Program (CIP - funded only in FY2003). These seven DHS programs were chosen for analysis because the allocations were made to state and local governments, not to private individuals or entities. These seven programs accounted for $1.85 billion in FY2006. The report also provides a state-by-state analysis of state and local spending on public safety more generally. The homeland security grants described in this report are likely included in the public safety categories of spending as reported by the states and tabulated by the U.S. Census Bureau. The federal grants identified in this report are a relatively small portion of overall public safety spending, ranging from 0.48% in Virginia to a maximum of 5.6% in North Dakota."
Library of Congress. Congressional Research Service
Reese, Shawn; Maguire, Steven
2006-12-22
-
Agroterrorism: Threats and Preparedness [Updated March 12, 2007]
"The potential for terrorist attacks against agricultural targets (agroterrorism) is increasingly recognized as a national security threat, especially after the events of September 11, 2001. Agroterrorism is a subset of bioterrorism, and is defined as the deliberate introduction of an animal or plant disease with the goal of generating fear, causing economic losses, and/or undermining social stability. Increasing the level of agroterrorism preparedness remains a concern, as do interagency coordination and adequate border inspections. The 110th Congress may consider bills or oversight hearings to address funding and the level of preparedness or coordination to respond to an agroterrorist attack."
Library of Congress. Congressional Research Service
Monke, James
2007-03-12
-
Cleanup After Hurricane Katrina: Environmental Considerations [Updated May 3, 2006]
"Local, state, and federal responders face numerous cleanup challenges associated with Hurricane Katrina. In Mississippi, Alabama, and parts of Louisiana, much of the focus has been on restoring infrastructure and managing debris and waste. In New Orleans, where most damage was due to floodwaters, the immediate tasks were 'unwatering' and evaluation of potential risks from contaminated water, sediment, and air. As floodwaters receded, debris management and infrastructure repair began. Monitoring and analysis of air, water, and residual sediment and soil continues to inform decisions about whether neighborhoods are safe for returning residents. Local authorities, with assistance from federal agencies, have worked to determine how and where disaster-related wastes would be gathered, separated, and disposed. This report provides an overview of the immediate and intermediate cleanup tasks and the federal role supporting these tasks. State, county, and local municipalities have jurisdiction with regard to cleanup after any natural catastrophe. However, because the President issued a major disaster declaration, at the governors' requests, under the Robert T. Stafford Disaster Relief and Emergency Assistance Act in response to Hurricane Katrina, federal agencies have been broadly authorized to provide assistance."
Library of Congress. Congressional Research Service
Copeland, Claudia; Schierow, Linda-Jo; Esworthy, Robert
2006-05-03
-
Cybersecurity: Authoritative Reports and Resources [April 26, 2012]
"Cybersecurity is a sprawling topic that includes national, international, government, and private industry dimensions. More than 40 bills and resolutions with provisions related to cybersecurity have been introduced in the first session of the 112th Congress, including several proposing revisions to current laws. In the 111th Congress, the total was more than 60. Several of those bills received committee or floor action, but none have become law. In fact, no comprehensive cybersecurity legislation has been enacted since 2002. This report provides links to cybersecurity hearings and legislation under consideration in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports."
Library of Congress. Congressional Research Service
Tehan, Rita
2012-04-26
-
Obama Administration's Cybersecurity Proposal: Criminal Provisions [July 29, 2011]
"Responding to ongoing concerns over the state of U.S. cybersecurity, the Obama Administration released a report containing a proposal for significant cybersecurity legislation on May 12, 2011. The Administration's proposal contains seven sections and addresses many different subject areas. This report examines the first section of the Administration's proposal, dealing with criminal law. That section would supplement the Computer Fraud and Abuse Act (CFAA) by adding a mandatory three-year minimum penalty for damaging certain critical infrastructure computers, increase the penalties for most violations of the CFAA, modify the conspiracy and forfeiture provisions of the CFAA, and make felony violation of the CFAA a racketeering predicate offense. This report also compares the Administration's proposal to bills pending before the House of Representatives and the Senate. Although Congress is considering many bills addressing cybersecurity, there are relatively few which would modify computer crime laws such as the CFAA. The bills which do address computer crime differ in significant ways from the Administration's proposal, though they would accomplish some of the same goals."
Library of Congress. Congressional Research Service
Stevens, Gina Marie; Miller, Jonathan
2011-07-29
-
Improvised Explosive Devices in Iraq: Effects and Countermeasures [November 23, 2005]
"Improvised explosive devices (IEDs) are responsible for many of the more than 2,000 deaths and numerous casualties suffered by U.S. and coalition forces since the invasion of Iraq. The bombs have been hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with IEDs are becoming more numerous and deadly. The threat has expanded to include vehicle-borne IEDs, where insurgents drive cars laden with explosives directly into a targeted group of service members. DOD efforts to counter IEDs have proven only marginally effective, and U.S. forces continue to be exposed to the threat at military checkpoints, or whenever riding in vehicles in Iraq. DOD reportedly expects that mines and IEDs will continue to be weapons of choice for insurgents for the near term in Iraq, and is also concerned that they might eventually become more widely used by other insurgents and terrorists worldwide. This report will be updated as events warrant."
Library of Congress. Congressional Research Service
Wilson, Clay
2005-11-23
-
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws [December 27, 2010]
From the Summary: "The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act, P.L. 110-326, 122 Stat. 3560 (2008) (H.R. 5938 (110th Cong.))."
Library of Congress. Congressional Research Service
Doyle, Charles
2010-12-27
-
Deepwater Horizon Oil Spill: The Fate of the Oil [December 16, 2010]
"The April 20, 2010, explosion of the Deepwater Horizon offshore drilling rig led to the largest oil spill in U.S. waters. Federal government officials estimated that the deepwater well ultimately released (over 84 days) over 200 million gallons (or 4.9 million barrels) of crude oil. Although decreasing amounts of oil were observed on the ocean surface following the well's containment on July 15, 2010, oil spill response officials and researchers have found oil in other places. A pressing question that has been raised by many stakeholders is where did the oil go? [...] Direct observation and measurement of the fate of the vast majority of the estimated 200 million gallons of oil presents a considerable challenge. In some cases, the estimates used to calculate these percentages contain considerable uncertainty. Even assuming that approximately half of the oil has been removed from the Gulf ecosystem through direct recovery, burning, skimming, or evaporation, the fate of the remaining ('other') oil is unknown. A complete and definitive answer to the question of the remaining oil is unknown at this juncture. It is debatable whether the fate of the remaining oil will ever be established conclusively, because multiple challenges hinder this objective: the complexity of the Gulf system; resources required to collect data; and varied interpretations over the results and observations. Moreover, as time progresses, determining the fate of the oil will likely become more difficult. Regardless, the question of oil fate will likely be answered through an incremental process. [...] If policymakers have the perception that the oil has degraded with minimal impacts to the environment, attention to the oil spill's consequences and associated impacts may wane. On the other hand, a perception that a substantial volume of oil remains and poses a threat to the environment could result in continuing pressure on Gulf industries and livelihoods."
Library of Congress. Congressional Research Service
Ramseur, Jonathan L.
2010-12-16
-
Would an Influenza Pandemic Qualify as a Major Disaster Under the Stafford Act? [October 20, 2008]
"This report provides a legal analysis of the eligibility of an influenza pandemic (flu pandemic) to be declared by the President as a major disaster under the Robert T. Stafford Disaster Relief and Emergency Assistance Act. In 1997, the discovery of a virulent H5N1 strain of avian influenza (bird flu) raised the possibility of a flu pandemic occurring in the United States. In such an event, the Stafford Act could provide authority for federal assistance. Although it is widely agreed that emergency assistance under the Stafford Act could be provided by the President in the event of a flu pandemic, questions remain as to whether major disaster assistance would be available. An analysis of the Stafford Act suggests that this issue was not addressed by Congress when it drafted the current definition of a major disaster, and that neither inclusion nor exclusion of flu pandemics from major disaster assistance is explicitly required by the current statutory language."
Library of Congress. Congressional Research Service
Liu, Edward C.
2008-10-20
-
Mental Health All-Hazards Disaster Planning Guidance
"Better planning can help make available appropriate interventions to those in need, and help promote resiliency and recovery. It also provides an opportunity for a more efficient mental health response. It is possible, with sound, integrated planning, to fill the new, complex roles of identifying disease outbreaks, integrating health and mental health response, and conducting epidemiological surveillance--all of which are necessary in the new age of bioterrorism threats. To that end, the Center for Mental Health Services (CMHS), within the Substance Abuse and Mental Health Services Administration (SAMHSA), collaborated with the National Association for State Mental Health Program Directors (NASMHPD) to assess the status of disaster mental health plans in the country, and provide guidance to States regarding important components in the planning process as well as potential content and organization of viable plans. This document is the result of that process. Along with the comprehensive matrix for planners found in Appendix A, this document is intended to help guide State and local mental health agencies create or revise plans for response to human or natural disasters and emergencies. It is a companion document to the Guide for All-Hazard Emergency Operations Planning, which was published by the Federal Emergency Management Agency (FEMA) in 1996. While this 'Mental Health All-Hazards Disaster Planning Guidance' is full of helpful information and applicable resources for State and local mental health entities, it is strictly a guide and does not establish any requirements."
Center for Mental Health Services (U.S.)
Flynn, Brian W., Ed.D.
2003
-
Deepwater Horizon Oil Spill: Selected Issues for Congress [July 30, 2010]
"On April 20, 2010, an explosion and fire occurred on the Deepwater Horizon drilling rig in the Gulf of Mexico. This resulted in 11 worker fatalities, a massive oil release, and a national response effort in the Gulf of Mexico region by the federal and state governments as well as BP. Based on estimates from the Flow Rate Technical Group, which is led by the U.S. Geological Survey, the 2010 Gulf spill has become the largest oil spill in U.S. waters. The oil spill has damaged natural resources and has had regional economic impacts. In addition, questions have been raised as to whether offshore regulation of oil exploration has kept pace with the increasingly complex technologies needed to explore and develop deeper waters. Crude oil has been washing into marshes and estuaries and onto beaches in Louisiana, Mississippi, and Alabama. Oil has killed wildlife, and efforts are underway to save oil-coated birds. The most immediate economic impact of the oil spill has been on the Gulf fishing industry: commercial and recreational fishing have faced extensive prohibitions within the federal waters of the Gulf exclusive economic zone. The fishing industry, including seafood processing and related wholesale and retail businesses, supports over 200,000 jobs with related economic activity of $5.5 billion. Other immediate economic impacts include a decline in tourism. On the other hand, jobs related to cleanup activities could mitigate some of the losses in the fishing and tourism industry."
Library of Congress. Congressional Research Service
Ramseur, Jonathan L.; Hagerty, Curry L.
2010-07-30
-
Deepwater Horizon Oil Spill: Highlighted Actions and Issues [May 13, 2011]
"This report highlights actions taken and issues raised as a result of the April 20, 2010, explosion on the Deepwater Horizon offshore drilling rig, and the resulting oil spill in the Gulf of Mexico. Readers can access more extensive discussions in various CRS reports, identified at the end of this report. Members in the 112th Congress continue to express concerns regarding various oil spill-related policy matters. At least three committees in both the House and the Senate have held hearings on issues associated with the Deepwater Horizon oil spill. Members have introduced multiple proposals that would address various issues, including: 1) the regulatory regime for outer continental shelf (OCS) oil exploration and development activities; 2) the liability and compensation framework created by the 1990 Oil Pollution Act; 3) technological challenges involved with deepwater activities; 4) response activities (e.g., the use of chemical dispersants) and decision-making. However, some argue that, in response to the Deepwater Horizon incident, the Administration has adopted less than optimal policies toward offshore oil exploration and development. Expressing this viewpoint, some Members have offered proposals that seek to spur offshore oil exploration and development. In recent days, the House passed three such bills: H.R. 1230 (May 5, 2011), H.R. 1229 (May 11, 2011), and H.R. 1231 (May 12, 2011). Future congressional activity may be influenced by several factors, including conditions in the
Gulf region, independent inquiries, judicial actions, and the availability of data for further study."
Library of Congress. Congressional Research Service
Ramseur, Jonathan L.; Hagerty, Curry L.
2011-05-13
-
Political Transition in Tunisia [December 16, 2011]
"On January 14, 2011, Tunisian President Zine el Abidine Ben Ali fled the country after weeks of mounting anti-government protests. Tunisia's mass popular uprising, dubbed the 'Jasmine Revolution,' sparked anti-government movements in other countries across the region. Ben Ali's departure was greeted by widespread euphoria within Tunisia. Yet disputes over reform priorities, economic crisis, labor unrest, tensions between the privileged coastal region and relatively impoverished interior, and lingering insecurity are continuing challenges. The humanitarian and security impact of events in neighboring Libya present additional difficulties. National elections were held on October 23 to select a National Constituent Assembly. The Assembly has put in place a transitional government and is expected to draft a new constitution, ahead of new elections that have yet to be scheduled. Thousands of candidates competed for seats in the Assembly, but the outcome showed popular support to be primarily focused on a handful of political parties. Harakat al Nahda (alt: Ennahda/An-Nahda), a moderate Islamist party, won 41% of the seats, and has formed a governing coalition with two center-left secular parties, the Congress for the Republic (CPR) and the Democratic Forum of Labor and Liberties (FDTL/Ettakatol). Certain aspects of the Assembly's mandate, duration, and internal structure are still to be determined."
Library of Congress. Congressional Research Service
Arieff, Alexis
2011-12-16
-
Safe Drinking Water Act (SDWA): Selected Regulatory and Legislative Issues [July 27, 2010]
"Much progress has been made in assuring the quality of public water supplies since the Safe Drinking Water Act (SDWA) was first enacted in 1974. Public water systems must meet extensive regulations, and water utility management has become a much more complex and professional endeavor. The Environmental Protection Agency (EPA) has regulated some 91 drinking water contaminants, and more regulations are pending. In 2007, the number of community water systems reporting no violations of drinking water standards was 89.5%. Despite nationwide progress in providing safe drinking water, an array of issues and challenges remain. Recent issues have involved infrastructure funding needs, regulatory compliance issues, and concerns caused by detections of unregulated contaminants in drinking water, such as perchlorate and pharmaceuticals and personal care products (PPCPs). Another issue involves the adequacy of existing regulations (such as trichloroethylene (TCE)) and EPA's pace in reviewing and potentially revising older standards. Congress last reauthorized SDWA in 1996. Although funding authority for most SDWA programs expired in FY2003, Congress continues to appropriate funds annually for these programs. No broad reauthorization bills have been proposed, as EPA, states, and water systems continue efforts to implement current statutory programs and regulatory requirements. A long-standing and overarching SDWA issue concerns the cumulative cost and complexity of drinking water standards and the ability of water systems, especially small systems, to comply with standards."
Library of Congress. Congressional Research Service
Tiemann, Mary
2010-07-27
-
Safeguarding the Nation's Drinking Water: EPA and Congressional Actions [September 30, 2010]
"The events of September 11, 2001, focused heightened attention on the security status of the nation's drinking water supplies and the vulnerability of this critical infrastructure sector to attack. Congress since has enacted security requirements for public water systems and has provided funding for vulnerability assessments, emergency planning, and drinking water research. The Environmental Protection Agency (EPA), the lead federal agency for the water sector, has worked with water utilities, state and local governments, and federal agencies to improve the drinking water security. The Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (P.L. 107- 188) amended the Safe Drinking Water Act to require some 8,400 community water systems to assess vulnerabilities and prepare emergency response plans. It authorized funding for these activities and for emergency grants to states and utilities, and it directed EPA to review methods to prevent, detect, and respond to threats to water safety and infrastructure security. The act did not require water systems to make security upgrades to address potential vulnerabilities. In most years since FY2002, Congress appropriated roughly $5 million annually for EPA to work with states and the water sector to improve the security of drinking water supplies."
Library of Congress. Congressional Research Service
Tiemann, Mary
2010-09-30
-
Taking Shelter from the Storm: Building a Safe Room inside Your House
"Every year, tornadoes, hurricanes, and other extreme windstorms injure and kill people, and damage millions of dollars worth of property in the United States. Even so, more and more people build houses in tornado- and hurricane-prone areas each year, possibly putting themselves into the path of such storms. Having a shelter, or a safe room, built into your house can help you protect yourself and your family from injury or death caused by the dangerous forces of extreme winds. It can also relieve some of the anxiety created by the threat of an oncoming tornado or hurricane. This booklet will help you answer these and other questions so you can decide how best to protect yourself and your family. It includes the results of research that has been underway for more than 20 years, by Texas Tech University's Wind Engineering Research Center (WERC) and other wind engineering research facilities, on the effects of extreme winds on buildings. This booklet also provides shelter designs that will show you and your builder/contractor how to construct a shelter underneath a new house, in the basement of a new house, or in an interior room of a new house, or how to modify an existing house to add a shelter in one of these areas. These shelters are designed to protect you and your family from the high winds expected during tornadoes and hurricanes and from flying debris, such as wood studs, that tornadoes and hurricanes usually create."
United States. Federal Emergency Management Agency
1998-10
-
2009 Influenza Pandemic: An Overview [September 10, 2009]
"This report first provides a synopsis of key events, actions taken, and authorities invoked by [World Health Organization (WHO)], the U.S. federal government, and state and local governments. It then discusses the WHO process to determine the phase of a flu pandemic, and selected actions taken by the Departments of Homeland Security and Health and Human Services, and by state and local authorities. Next, it lists congressional hearings held to date, and provides information about appropriations and funding for pandemic flu activities. Finally, it summarizes U.S. government pandemic flu planning documents and lists sources for additional information about the situation as it unfolds. This report will be continually updated to reflect unfolding events."
Library of Congress. Congressional Research Service
Redhead, C. Stephen; Lister, Sarah A.
2009-09-10
-
2009 Influenza Pandemic: An Overview [August 6, 2009]
"This report first provides a synopsis of key events, actions taken, and authorities invoked by [World Health Organization (WHO)], the U.S. federal government, and state and local governments. It then discusses the WHO process to determine the phase of a flu pandemic, and selected actions taken by the Departments of Homeland Security and Health and Human Services, and by state and local authorities. Next, it lists congressional hearings held to date, and provides information about appropriations and funding for pandemic flu activities. Finally, it summarizes U.S. government pandemic flu planning documents and lists sources for additional information about the situation as it unfolds. This report will be continually updated to reflect unfolding events."
Library of Congress. Congressional Research Service
Lister, Sarah A.; Redhead, C. Stephen
2009-08-06
-
Public Health and Medical Response to Disasters: Federal Authority and Funding [Updated August 4, 2006]
"This report examines (1) the statutory authorities and coordinating mechanisms of the President (acting through the Secretary of Homeland Security) and the Secretary of HHS in providing routine assistance, and in providing assistance pursuant to emergency or major disaster declarations and/or public health emergency determinations; (2) mechanisms to assure a coordinated federal response to public health and medical emergencies, and overlaps or gaps in agency responsibilities; and (3) existing mechanisms and potential gaps in financing the costs of a response to public health and medical emergencies."
Library of Congress. Congressional Research Service
Lister, Sarah A.
2006-08-04
-
Cyber Threats, Law Enforcement and Private Sector Responses, Hearing Before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Thirteenth Congress, First Session, May 8, 2013
This is the May 8, 2013 hearing before the U.S. Senate Judiciary Committee, Subcommittee on Crime and Terrorism entitled "Cyber Threats: Law Enforcements and Private Sector Responses." From the opening statement of Jenny A. Durkan: "As United States Attorney, I see the full range of threats our communities and nation face. Few things are as sobering as the daily cyber threat briefing I receive. Cyberspace is the new frontier. We have witnessed the rapid creation of incredible businesses, lifesaving technologies, and new ways to connect society. Unfortunately, the 'good guys' are not the only innovators. We have seen a significant growth in the number and nature of bad actors exploiting new technology. As Attorney General Holder has noted, '[f]rom criminal syndicates, to terrorist organizations, to foreign intelligence groups, to disgruntled employees and other malicious intruders, the range of entities that stand ready to execute and exploit cyber attacks has never been greater.' Threats to the nation's computer networks and cyber systems continue to evolve, as the nature and capabilities of those responsible for the threats evolve. Over the last several years, investigators and prosecutors have seen significant increases in the skills of threat actors and the complexity of their organizations. These actors have a variety of aims and motivations." Statements, letters, and materials submitted for the record include those of the following: Cheri McGuire, Stewart Baker, Kevin Mandia, Joseph Demarest, Jr., and Jenny Durkan.
United States. Government Printing Office
2013-05-08
-
Transmissible Spongiform Encephalopathies (TSEs), Including 'Mad Cow Disease': Public Health and Scientific Issues [Updated March, 1, 2004]
From the Summary: "On December 23, 2003, the U.S. Secretary of Agriculture announced that a cow in Washington state had tested positive for bovine spongiform encephalopathy (BSE, or Mad Cow disease), representing the first domestic case. The Secretary announced expanded protections against BSE on December 30, 2003. On January 26, 2004, the U.S. Secretary of Health and Human Services announced additional safety measures for products regulated by the U.S. Food and Drug Administration (FDA) to protect public health. Both have stressed that the human health impact of finding one BSE positive cow is believed to be minimal. BSE is a member of a group of diseases called Transmissible Spongiform Encephalopathies (TSEs). Although the predominant theory is that TSEs are caused by prions or proteinaceous infectious particles (a novel disease mechanism first described in the 1980s), some scientists believe a virus may eventually be identified as the infectious agent. While some TSEs, such as scrapie in sheep, have been known for over 200 years, others, including BSE, appear to have emerged quite recently. Some TSEs seem to affect only one species and others, like BSE, appear to have jumped the 'species barrier' to infect more than one species. This event has transformed prion diseases from a rare and esoteric area of research to a matter of significant public health concern. BSE is believed to have been transmitted to people who ate contaminated beef, leading to the identification in 1996 of a new human disease, variant Creutzfeld-Jakob disease (vCJD), in the United Kingdom."
Library of Congress. Congressional Research Service
Johnson, Judith A. (Judith Ann), 1957-; Lister, Sarah A.
2004-03-01
-
Terrorist Precursor Crimes: Issues and Options for Congress [May 24, 2007]
From the Summary: "Terrorist precursor crimes, offenses committed to facilitate a particular attack or promote a terrorist campaign's objectives, are thought to be often carried out far away from the primary theater of conflict associated with a terrorist group. Much of the precursor activity, especially with regard to crimes conducted for the purpose of fundraising, takes place in wealthy Western countries, including the United States. Precursor crimes, known and/or alleged, include various fraud schemes, petty crime, identity and immigration crimes, the counterfeit of goods, narcotics trade, and illegal weapons procurement, amongst others. The implications of domestically occurring terrorist precursor crimes on the current threat environment, and specifically the United State's security posture, are not fully understood. It does appear, however, that the likely presence of terrorist groups or their sympathizers conducting precursor crimes within the United States presents a series of unique problems and challenges for U.S. law enforcement and intelligence communities' counterterrorism programs, many of which have important implications for Congress. As Congress conducts oversight of the federal agencies engaged in terrorist precursor crime investigations and intelligence efforts, this phenomenon and U.S. efforts to identify, investigate, and counter it may be of particular concern."
Library of Congress. Congressional Research Service
O'Neil, Siobhan
2007-05-24
-
Homeland Security: Roles and Missions for United States Northern Command [January 28, 2008]
"In 2002, President Bush signed a new Unified Command Plan (UCP) establishing United States Northern Command (NORTHCOM) to provide command and control of the Department of Defense's (DOD's) homeland defense efforts and to coordinate military support to civil authorities. As a geographical combatant command, NORTHCOM has an area of responsibility that includes the continental United States, Alaska, Canada, Mexico, and surrounding waters out to approximately 500 nautical miles, including the Gulf of Mexico and the Straits of Florida. The NORTHCOM Commander also commands North American Aerospace Defense Command. NORTHCOM, headquartered at Peterson Air Force Base, Colorado, employs approximately 1,200 DOD civilians, contractors, and service members from each service component. The Army, Air Force, and Marine Corps have service components assigned to NORTHCOM, while Navy Fleet Forces Command is a supporting component. Additionally, NORTHCOM maintains five subordinate joint headquarters to carry out assigned missions. One of NORTHCOM's key charters is to build ongoing relationships with government agencies that play a role in homeland security and defense. To ensure integration of homeland security and defense efforts, NORTHCOM participates in the Joint Interagency Coordination Group while also working closely with both the Department of Homeland Security and the National Guard Bureau. As a geographical combatant command, NORTHCOM also plays a key role in facilitating cooperation with both Canada and Mexico."
Library of Congress. Congressional Research Service
Knight, William
2008-01-28
-
Border Security: The San Diego Fence [Updated May 23, 2007]
From the Summary: "This report outlines the issues involved with DHS's construction of the San Diego border fence and highlights some of the major legislative and administrative developments regarding its completion; it will be updated as warranted. Congress first authorized the construction of a 14-mile, triple-layered fence along the U.S.-Mexico border near San Diego in the Illegal Immigration Reform and Immigration Responsibility Act (IIRIRA) of 1996. By 2004, only nine miles had been completed, and construction was halted because of environmental concerns. The 109th Congress subsequently passed the REAL ID Act (P.L. 109-13, Div. B), which contained provisions to facilitate the completion of the 14-mile fence. These provisions allow the Secretary of Homeland Security to waive all legal requirements determined necessary to ensure expeditious construction of authorized barriers and roads. In September 2005, the Secretary used this authority to waive a number of mostly environmental and conservation laws. Subsequently, the Secure Fence Act of 2006 (P.L. 109-367) removed the specific IIRIRA provisions authorizing the San Diego fence and added provisions authorizing five stretches of two-layered reinforced fencing along the southwest border. While the specific authorization of the San Diego fence was deleted, the project appears permissible under a separate, more general authorization provision of IIRIRA. In the 110th Congress, S.Amdt. 1150, the Secure Borders, Economic Opportunity, and Immigration Reform Act of 2007, which has been proposed in the nature of a substitute to S. 1348, the Comprehensive Immigration Reform Act of 2007, would amend § 102 of IIRIRA to once again expressly authorize the construction of the San Diego fence."
Library of Congress. Congressional Research Service
Nunez-Neto, Blas; Garcia, Michael John
2007-05-23