Posts tagged ‘gao’
by Davi M. D’Agostino
Paperback, 35 pages, 2011, $20.00
The U.S. military depends heavily on computer networks, and potential adversaries see cyberwarfare as an opportunity to pose a significant threat at low cost — a few programmers could cripple an entire information system. The Department of Defense (DoD) created the U.S. Cyber Command to counter cyber threats, and tasked the military services with providing support. This report examined the extent to which DoD and the U.S. Cyber Command have identified for the military services the: (1) roles and responsibilities; (2) command and control relationships; and (3) mission requirements and capabilities to enable them to organize, train, and equip for cyberspace operations. Includes recommend. Charts and tables. This is a print on demand report.
by Stephen L. Caldwell
Paperback, 29 pages, 2011, $20.00
This report reviews the Department of Homeland Security’s (DHS) framework for securing critical infrastructure and key resources (CIKR), and subsequent agency comments. The report provides information on: (1) how DHS coordinates with CIKR stakeholders to identify overlaps and gaps in CIKR security activities across all sectors; (2) how DHS addresses these potential overlaps in CIKR security activities; and (3) how DHS addresses CIKR security gaps. Charts and tables. This is a print on demand edition of an important, hard-to-find publication.
by Kay L. Daly
Paperback, 43 pages, 2011, $20.00
To help combat fraud and abuse in health care programs, Congress enacted the Health Care Fraud and Abuse Control (HCFAC) program as part of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). HIPAA requires that the Depts. of Health and Human Services (HHS) and Justice (DoJ) issue a joint annual report to Congress on amounts deposited to and appropriated from the Fed. Hospital Insur. Trust Fund for the HCFAC program. This review assesses the extent to which HHS and DOJ: (1) took actions to address the recommendations made in a 2005 report; and (2) designed effective controls over reporting HCFAC deposits and expenditures for FY 2008 and 2009. Charts and tables.
by David C. Trimble
Paperback, 34 pages, 2011, $20.00
Tall smokestacks (TS) — stacks of 500 feet or higher, which are primarily used at coal power plants — release air pollutants high into the atmosphere to help limit the impact of these emissions on local air quality. The 1977 amend. to the Clean Air Act encourage the use of pollution control equipment over dispersion techniques, such as TS, to meet national air standards. This report discusses: (1) the number and location of TS of 500 feet or higher at coal power plants; (2) what is known about such stacks’ contribution to the interstate transport of air pollution and the pollution controls installed at plants with these stacks; and (3) the number of TS that were built above good engineering practice height since 1988 and the reasons for this.
New Government Report: Taxes and Identity Theft Status of IRS Initiatives to Help Victimized Taxpayers
by James R. White
Paperback, 17 pages, 2011, $20.00
Identity theft (IT) is a serious and growing problem in the U.S. Taxpayers are harmed when identity thieves file fraudulent tax documents using stolen names and Social Security numbers. In 2010, the IRS identified 245,000+ IT incidents that affected the tax system. The hundreds of thousands of taxpayers with tax problems caused by IT represent a small percentage of the 140 million individual returns filed, but for those affected, the problems can be quite serious. This report describes: (1) when IRS detects IT based refund and employ. fraud; (2) the steps IRS has taken to resolve, detect, and prevent innocent taxpayers’ IT related problems; and (3) constraints that hinder IRS’s ability to address these issues. Illus. This is a print on demand report.
by Gregory D. Kutz
Paperback, 26 pages, 2011, $20.00
According to the IRS, as of the end of FY 2010, the balance of reported unpaid federal taxes was about $330 billion. Given the many challenges that IRS faces, the enforcement of the tax laws and the tax code is on a list of high-risk areas. This report: (1) determined the magnitude of known unpaid federal taxes for individuals who were issued passports in FY 2008; and (2) identified examples of passport recipients who have known unpaid federal taxes. To identify examples for detailed audit and investigation, the report chose a non-representative selection of 25 passport recipients based on a number of factors, including the more egregious amount of federal taxes owed. Charts and tables. This is a print on demand report.