{ "id": "RL32531", "type": "CRS Report", "typeId": "REPORTS", "number": "RL32531", "active": false, "source": "EveryCRSReport.com, University of North Texas Libraries Government Documents Department", "versions": [ { "source": "EveryCRSReport.com", "id": 100105, "date": "2005-01-11", "retrieved": "2016-04-07T19:58:08.851094", "title": "Critical Infrastructure Protections: The 9/11 Commission Report and Congressional Response", "summary": "Many of the recommendations made in the 9/11 Commission's report dealt indirectly with\ncritical\ninfrastructure protection, especially as the goals of critical infrastructure protection have evolved to\ninclude countering the type of attack that occurred on September 11. However, relatively few of the\nrecommendations addressed critical infrastructure protection specifically. Those that did called for\nusing a systematic risk management approach for setting priorities and allocating resources for\ncritical infrastructure protection. None of these recommendations advocated a change in the\ndirection of, or the organizational structures that have evolved to implement, existing infrastructure\nprotection policies. Nevertheless, the Commission's recommendations could speed up\nimplementation in some areas, given the attention and renewed urgency expressed by the\nCommission.\n Two bills were introduced as legislative vehicles for enacting some or many of the Commission\nrecommendations ( S. 2845 and H.R. 10 ). Like the Commission's \nrecommendations, the language in these two bills, and the subsequent Intelligence Reform and\nTerrorism Prevention Act of 2004 ( P.L. 108-458 ), for the most part, strengthen or reinforce existing\npolicy and organization associated with critical infrastructure protection.\n For a more detailed discussion of national policy regarding critical infrastructure protection,\nincluding its evolution, implementation, and continuing issues, see CRS Report RL30153 ,\n Critical\nInfrastructures: Background, Policy, and Implementation . For a discussion on the use of risk\nmanagement techniques in the context of critical infrastructure protection, see CRS Report RL32561 ,\n Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing\nThreats, Vulnerabilities, and Consequences . \n This report will be updated as appropriate.", "type": "CRS Report", "typeId": "REPORTS", "active": false, "formats": [ { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/RL32531", "sha1": "a8c1e35469c76dc2c6c918a91e257000d0f188f2", "filename": "files/20050111_RL32531_a8c1e35469c76dc2c6c918a91e257000d0f188f2.pdf", "images": null }, { "format": "HTML", "filename": "files/20050111_RL32531_a8c1e35469c76dc2c6c918a91e257000d0f188f2.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc817668/", "id": "RL32531_2004Oct20", "date": "2004-10-20", "retrieved": "2016-03-19T13:57:26", "title": "Critical Infrastructure Protections: The 9/11 Commission Report and Congressional Response", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20041020_RL32531_bc199d7d73a1a629f18365ecd528dee265243c10.pdf" }, { "format": "HTML", "filename": "files/20041020_RL32531_bc199d7d73a1a629f18365ecd528dee265243c10.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc813516/", "id": "RL32531_2004Aug16", "date": "2004-08-16", "retrieved": "2016-03-19T13:57:26", "title": "Critical Infrastructure Protections: The 9/11 Commission Report", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20040816_RL32531_be9d55d221175368f6b80715ab5ee3f2922775c5.pdf" }, { "format": "HTML", "filename": "files/20040816_RL32531_be9d55d221175368f6b80715ab5ee3f2922775c5.html" } ], "topics": [] } ], "topics": [ "Intelligence and National Security", "Science and Technology Policy" ] }