{ "id": "RL30153", "type": "CRS Report", "typeId": "REPORTS", "number": "RL30153", "active": true, "source": "EveryCRSReport.com, University of North Texas Libraries Government Documents Department", "versions": [ { "source": "EveryCRSReport.com", "id": 441950, "date": "2015-06-10", "retrieved": "2016-04-06T18:57:44.102201", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "The nation\u2019s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, functions, and systems across which these goods and services move are called critical infrastructures (e.g., electricity, the power plants that generate it, and the electric grid upon which it is distributed).\nThe national security community has been concerned for some time about the vulnerability of critical infrastructure to both physical and cyberattack. In May 1998, President Clinton released Presidential Decision Directive No. 63. The Directive set up groups within the federal government to develop and implement plans that would protect government-operated infrastructures and called for a dialogue between government and the private sector to develop a National Infrastructure Assurance Plan that would protect all of the nation\u2019s critical infrastructures by the year 2003. While the Directive called for both physical and cyber protection from both man-made and natural events, implementation focused on cyber protection against man-made cyber events (i.e., computer hackers). Following the destruction and disruptions caused by the September 11 terrorist attacks in 2001, the nation directed increased attention toward physical protection of critical infrastructures. Over the intervening years, policy, programs, and legislation related to physical security of critical infrastructure have stabilized to a large extent. However, current legislative activity has refocused on cybersecurity of critical infrastructure.\nThis report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights two primary issues confronting Congress going forward, both in the context of cybersecurity: information sharing and regulation.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/RL30153", "sha1": "7a8ef0cfaf1ec6858d0ae20d03fb87b103bd7fc5", "filename": "files/20150610_RL30153_7a8ef0cfaf1ec6858d0ae20d03fb87b103bd7fc5.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/RL30153", "sha1": "aa2f7cdab92cc461d205ca3e55d712545b47e4ee", "filename": "files/20150610_RL30153_aa2f7cdab92cc461d205ca3e55d712545b47e4ee.pdf", "images": null } ], "topics": [ { "source": "IBCList", "id": 4300, "name": "Cybersecurity" }, { "source": "IBCList", "id": 4585, "name": "Homeland Security" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc627221/", "id": "RL30153_2015May12", "date": "2015-05-12", "retrieved": "2015-06-15T14:46:40", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20150512_RL30153_4381acf8d1dba986e6dd337f45b6107155797ef4.pdf" }, { "format": "HTML", "filename": "files/20150512_RL30153_4381acf8d1dba986e6dd337f45b6107155797ef4.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security -- U.S.", "name": "National security -- U.S." }, { "source": "LIV", "id": "National policy -- U.S.", "name": "National policy -- U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc282311/", "id": "RL30153_2014Feb21", "date": "2014-02-21", "retrieved": "2014-04-02T19:38:14", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140221_RL30153_29fe8036f42f5737e71d27edc06cb9456134f0fe.pdf" }, { "format": "HTML", "filename": "files/20140221_RL30153_29fe8036f42f5737e71d27edc06cb9456134f0fe.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security -- U.S.", "name": "National security -- U.S." }, { "source": "LIV", "id": "National policy -- U.S.", "name": "National policy -- U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc96733/", "id": "RL30153_2011Jul11", "date": "2011-07-11", "retrieved": "2012-08-07T13:52:45", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20110711_RL30153_a42db32aafc4eaa6a233c90d569baeb6cde8a392.pdf" }, { "format": "HTML", "filename": "files/20110711_RL30153_a42db32aafc4eaa6a233c90d569baeb6cde8a392.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security -- U.S.", "name": "National security -- U.S." }, { "source": "LIV", "id": "National policy -- U.S.", "name": "National policy -- U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc491591/", "id": "RL30153_2010Jun07", "date": "2010-06-07", "retrieved": "2015-01-27T19:40:46", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "This report discusses the evolution of a national critical infrastructure policy and the institutional structures established to implement it. Critical infrastructure includes physical assets used to produce and distribute services such as electricity (including the power plants and electric grid), communications, and computers. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20100607_RL30153_d232aa50ff12f1b0e32dff1e7f626fc007af9772.pdf" }, { "format": "HTML", "filename": "files/20100607_RL30153_d232aa50ff12f1b0e32dff1e7f626fc007af9772.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security -- U.S.", "name": "National security -- U.S." }, { "source": "LIV", "id": "National policy -- U.S.", "name": "National policy -- U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc627143/", "id": "RL30153_2009Nov12", "date": "2009-11-12", "retrieved": "2015-06-15T14:46:40", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and regulation.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20091112_RL30153_ab1728510bc24e43cabf57193c32facc25f888c4.pdf" }, { "format": "HTML", "filename": "files/20091112_RL30153_ab1728510bc24e43cabf57193c32facc25f888c4.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security -- U.S.", "name": "National security -- U.S." }, { "source": "LIV", "id": "National policy -- U.S.", "name": "National policy -- U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc462469/", "id": "RL30153_2008Oct10", "date": "2008-10-10", "retrieved": "2014-12-05T09:57:41", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "This report discusses in more detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights five issues of Congressional concern: identifying critical assets; assessing vulnerabilities and risks; allocating resources; information sharing; and, regulation.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20081010_RL30153_5da9910e97d3dc815c334d99ee4c774500669cdd.pdf" }, { "format": "HTML", "filename": "files/20081010_RL30153_5da9910e97d3dc815c334d99ee4c774500669cdd.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security -- U.S.", "name": "National security -- U.S." }, { "source": "LIV", "id": "National policy -- U.S.", "name": "National policy -- U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc807587/", "id": "RL30153_2008Apr02", "date": "2008-04-02", "retrieved": "2016-03-19T13:57:26", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20080402_RL30153_11ff9dbe106c37896291408c6b22a14aa330ea1f.pdf" }, { "format": "HTML", "filename": "files/20080402_RL30153_11ff9dbe106c37896291408c6b22a14aa330ea1f.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc809084/", "id": "RL30153_2008Jan15", "date": "2008-01-15", "retrieved": "2016-03-19T13:57:26", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20080115_RL30153_07521748ea117a0b439fd08ff54cdd6eadf455e6.pdf" }, { "format": "HTML", "filename": "files/20080115_RL30153_07521748ea117a0b439fd08ff54cdd6eadf455e6.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc805870/", "id": "RL30153_2007Mar13", "date": "2007-03-13", "retrieved": "2016-03-19T13:57:26", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20070313_RL30153_6a8be2b974c8c5700727761d8502253a937b9c9d.pdf" }, { "format": "HTML", "filename": "files/20070313_RL30153_6a8be2b974c8c5700727761d8502253a937b9c9d.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc809773/", "id": "RL30153_2007Jan08", "date": "2007-01-08", "retrieved": "2016-03-19T13:57:26", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20070108_RL30153_7e0ede30cf975980ec3991408f4b8b450587d195.pdf" }, { "format": "HTML", "filename": "files/20070108_RL30153_7e0ede30cf975980ec3991408f4b8b450587d195.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc795865/", "id": "RL30153_2006Apr18", "date": "2006-04-18", "retrieved": "2016-01-13T14:26:20", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "This report discusses in detail the evolution of a national critical infrastructure policy and the institutional structures established to implement it. The report highlights three issues of Congressional concern: allocating resources based on risk; information sharing; and, regulation.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20060418_RL30153_fee1416c15283334bb8f80155c3dc0ab4e53b380.pdf" }, { "format": "HTML", "filename": "files/20060418_RL30153_fee1416c15283334bb8f80155c3dc0ab4e53b380.html" } ], "topics": [ { "source": "LIV", "id": "Congress", "name": "Congress" }, { "source": "LIV", "id": "Congressional gold metals", "name": "Congressional gold metals" }, { "source": "LIV", "id": "Commemorations", "name": "Commemorations" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs6664/", "id": "RL30153 2005-07-12", "date": "2005-07-12", "retrieved": "2005-08-03T10:02:07", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "The nation\u2019s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation\u2019s critical infrastructures to \u201ccyber\u201d attacks.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20050712_RL30153_0cd51e5d1c1e3aa69ef6b91987d4b71724e4626f.pdf" }, { "format": "HTML", "filename": "files/20050712_RL30153_0cd51e5d1c1e3aa69ef6b91987d4b71724e4626f.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security - U.S.", "name": "National security - U.S." }, { "source": "LIV", "id": "National policy - U.S.", "name": "National policy - U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc818461/", "id": "RL30153_2005Jun10", "date": "2005-06-10", "retrieved": "2016-03-19T13:57:26", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20050610_RL30153_ac9972b37bdabaa41dde5773a7de0970fd31c4ae.pdf" }, { "format": "HTML", "filename": "files/20050610_RL30153_ac9972b37bdabaa41dde5773a7de0970fd31c4ae.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs6265/", "id": "RL30153 2005-02-17", "date": "2005-02-17", "retrieved": "2005-06-11T21:01:47", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "The nation\u2019s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation\u2019s critical infrastructures to \u201ccyber\u201d attacks.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20050217_RL30153_1b1292d9ca18e5bf02b411d98266d852f5770338.pdf" }, { "format": "HTML", "filename": "files/20050217_RL30153_1b1292d9ca18e5bf02b411d98266d852f5770338.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security - U.S.", "name": "National security - U.S." }, { "source": "LIV", "id": "National policy - U.S.", "name": "National policy - U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs6843/", "id": "RL30153 2004-07-15", "date": "2004-07-15", "retrieved": "2005-08-16T09:29:19", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "The nation\u2019s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation\u2019s critical infrastructures to \u201ccyber\u201d attacks.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20040715_RL30153_b445cd6357435febfbf17b2df43b4db23381c6fc.pdf" }, { "format": "HTML", "filename": "files/20040715_RL30153_b445cd6357435febfbf17b2df43b4db23381c6fc.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security - U.S.", "name": "National security - U.S." }, { "source": "LIV", "id": "National policy - U.S.", "name": "National policy - U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc806029/", "id": "RL30153_2004Feb04", "date": "2004-02-04", "retrieved": "2016-03-19T13:57:26", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20040204_RL30153_4281c3a3d7fac650f0b9806af72227dd47dfa71f.pdf" }, { "format": "HTML", "filename": "files/20040204_RL30153_4281c3a3d7fac650f0b9806af72227dd47dfa71f.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs5036/", "id": "RL30153 2003-09-25", "date": "2003-09-25", "retrieved": "2005-06-11T21:01:00", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "The nation\u2019s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation\u2019s critical infrastructures to \u201ccyber\u201d attacks.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20030925_RL30153_c0548442c9d5a56fc6d38fd46831ff3fc0996336.pdf" }, { "format": "HTML", "filename": "files/20030925_RL30153_c0548442c9d5a56fc6d38fd46831ff3fc0996336.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security - U.S.", "name": "National security - U.S." }, { "source": "LIV", "id": "National policy - U.S.", "name": "National policy - U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs5035/", "id": "RL30153 2003-08-07", "date": "2003-08-07", "retrieved": "2005-06-11T21:00:07", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "The nation\u2019s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation\u2019s critical infrastructures to \u201ccyber\u201d attacks.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20030807_RL30153_e1a4f49b86ce0daad47a92b81602ff44b2cf6e7a.pdf" }, { "format": "HTML", "filename": "files/20030807_RL30153_e1a4f49b86ce0daad47a92b81602ff44b2cf6e7a.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security - U.S.", "name": "National security - U.S." }, { "source": "LIV", "id": "National policy - U.S.", "name": "National policy - U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs5034/", "id": "RL30153 2003-05-06", "date": "2003-05-06", "retrieved": "2005-06-11T20:59:14", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "The nation\u2019s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation\u2019s critical infrastructures to \u201ccyber\u201d attacks.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20030506_RL30153_1cacac7ee65f6565d7a21e87acaee4a966a8f790.pdf" }, { "format": "HTML", "filename": "files/20030506_RL30153_1cacac7ee65f6565d7a21e87acaee4a966a8f790.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security - U.S.", "name": "National security - U.S." }, { "source": "LIV", "id": "National policy - U.S.", "name": "National policy - U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs5033/", "id": "RL30153 2003-04-09", "date": "2003-04-09", "retrieved": "2005-06-11T20:58:17", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "The nation\u2019s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation\u2019s critical infrastructures to \u201ccyber\u201d attacks.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20030409_RL30153_fdfd36e0674b9e5d5067e0555f77b08e3214d079.pdf" }, { "format": "HTML", "filename": "files/20030409_RL30153_fdfd36e0674b9e5d5067e0555f77b08e3214d079.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security - U.S.", "name": "National security - U.S." }, { "source": "LIV", "id": "National policy - U.S.", "name": "National policy - U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs5032/", "id": "RL30153 2003-02-10", "date": "2003-02-10", "retrieved": "2005-06-11T20:57:26", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "The nation\u2019s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation\u2019s critical infrastructures to \u201ccyber\u201d attacks.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20030210_RL30153_12d2ad9340275f03422969addf077f4552a5f8ab.pdf" }, { "format": "HTML", "filename": "files/20030210_RL30153_12d2ad9340275f03422969addf077f4552a5f8ab.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security - U.S.", "name": "National security - U.S." }, { "source": "LIV", "id": "National policy - U.S.", "name": "National policy - U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs3174/", "id": "RL30153 2002-12-17", "date": "2002-12-17", "retrieved": "2005-06-11T20:56:39", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "The nation\u2019s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation\u2019s critical infrastructures to \u201ccyber\u201d attacks.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20021217_RL30153_3054ee8020c94910f319dd001c7a351092e19514.pdf" }, { "format": "HTML", "filename": "files/20021217_RL30153_3054ee8020c94910f319dd001c7a351092e19514.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security - U.S.", "name": "National security - U.S." }, { "source": "LIV", "id": "National policy - U.S.", "name": "National policy - U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs3172/", "id": "RL30153 2002-07-18", "date": "2002-07-18", "retrieved": "2005-06-11T20:55:52", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "The nation\u2019s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation\u2019s critical infrastructures to \u201ccyber\u201d attacks.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20020718_RL30153_be2c4abc1e0d10f32c4008ccbe347c7942745ee7.pdf" }, { "format": "HTML", "filename": "files/20020718_RL30153_be2c4abc1e0d10f32c4008ccbe347c7942745ee7.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security - U.S.", "name": "National security - U.S." }, { "source": "LIV", "id": "National policy - U.S.", "name": "National policy - U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs3171/", "id": "RL30153 2002-02-04", "date": "2002-02-04", "retrieved": "2005-06-11T20:55:06", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "The nation\u2019s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation\u2019s critical infrastructures to \u201ccyber\u201d attacks.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20020204_RL30153_5a9fc4350e872feda3164d5929ac59c5476fcdfa.pdf" }, { "format": "HTML", "filename": "files/20020204_RL30153_5a9fc4350e872feda3164d5929ac59c5476fcdfa.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security - U.S.", "name": "National security - U.S." }, { "source": "LIV", "id": "National policy - U.S.", "name": "National policy - U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs1828/", "id": "RL30153 2001-12-14", "date": "2001-12-14", "retrieved": "2005-06-11T20:54:21", "title": "Critical Infrastructures: Background, Policy, and Implementation", "summary": "The nation\u2019s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed). Computers and communications, themselves critical infrastructures, are increasingly tying these infrastructures together. This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation\u2019s critical infrastructures to \u201ccyber\u201d attacks.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20011214_RL30153_155cda00d182e9b6acb032212127b5a4c57b714e.pdf" }, { "format": "HTML", "filename": "files/20011214_RL30153_155cda00d182e9b6acb032212127b5a4c57b714e.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security - U.S.", "name": "National security - U.S." }, { "source": "LIV", "id": "National policy - U.S.", "name": "National policy - U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs1827/", "id": "RL30153 2001-06-19", "date": "2001-06-19", "retrieved": "2005-06-11T20:53:30", "title": "Critical Infrastructures: Background and Early Implementation of PDD-63", "summary": "The nation's health, wealth, and security rely on the supply and distribution of certain goods and services. The array of physical assets, processes and organizations across which these goods and services move are called critical infrastructures (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, and the record- keeping and communications that move it from one institution to another).", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20010619_RL30153_733b6d58fef64d01369593e298619a5cf0555672.pdf" }, { "format": "HTML", "filename": "files/20010619_RL30153_733b6d58fef64d01369593e298619a5cf0555672.html" } ], "topics": [ { "source": "LIV", "id": "Infrastructure", "name": "Infrastructure" }, { "source": "LIV", "id": "National security - U.S.", "name": "National security - U.S." }, { "source": "LIV", "id": "National policy - U.S.", "name": "National policy - U.S." }, { "source": "LIV", "id": "Defense policy", "name": "Defense policy" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc820240/", "id": "RL30153_2001Feb27", "date": "2001-02-27", "retrieved": "2016-03-19T13:57:26", "title": "Critical Infrastructures: Background and Early Implementation of PDD-63", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20010227_RL30153_19aa30f46f64a66d32920cf858e64c1367e40e7e.pdf" }, { "format": "HTML", "filename": "files/20010227_RL30153_19aa30f46f64a66d32920cf858e64c1367e40e7e.html" } ], "topics": [] } ], "topics": [ "Foreign Affairs", "Intelligence and National Security", "National Defense" ] }