Posts tagged ‘government accountability office’
by Davi M. D’Agostino
Paperback, 35 pages, 2011, $20.00
The U.S. military depends heavily on computer networks, and potential adversaries see cyberwarfare as an opportunity to pose a significant threat at low cost — a few programmers could cripple an entire information system. The Department of Defense (DoD) created the U.S. Cyber Command to counter cyber threats, and tasked the military services with providing support. This report examined the extent to which DoD and the U.S. Cyber Command have identified for the military services the: (1) roles and responsibilities; (2) command and control relationships; and (3) mission requirements and capabilities to enable them to organize, train, and equip for cyberspace operations. Includes recommend. Charts and tables. This is a print on demand report.
by Stephen L. Caldwell
Paperback, 29 pages, 2011, $20.00
This report reviews the Department of Homeland Security’s (DHS) framework for securing critical infrastructure and key resources (CIKR), and subsequent agency comments. The report provides information on: (1) how DHS coordinates with CIKR stakeholders to identify overlaps and gaps in CIKR security activities across all sectors; (2) how DHS addresses these potential overlaps in CIKR security activities; and (3) how DHS addresses CIKR security gaps. Charts and tables. This is a print on demand edition of an important, hard-to-find publication.
by Kay L. Daly
Paperback, 43 pages, 2011, $20.00
To help combat fraud and abuse in health care programs, Congress enacted the Health Care Fraud and Abuse Control (HCFAC) program as part of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). HIPAA requires that the Depts. of Health and Human Services (HHS) and Justice (DoJ) issue a joint annual report to Congress on amounts deposited to and appropriated from the Fed. Hospital Insur. Trust Fund for the HCFAC program. This review assesses the extent to which HHS and DOJ: (1) took actions to address the recommendations made in a 2005 report; and (2) designed effective controls over reporting HCFAC deposits and expenditures for FY 2008 and 2009. Charts and tables.
by David C. Trimble
Paperback, 34 pages, 2011, $20.00
Tall smokestacks (TS) — stacks of 500 feet or higher, which are primarily used at coal power plants — release air pollutants high into the atmosphere to help limit the impact of these emissions on local air quality. The 1977 amend. to the Clean Air Act encourage the use of pollution control equipment over dispersion techniques, such as TS, to meet national air standards. This report discusses: (1) the number and location of TS of 500 feet or higher at coal power plants; (2) what is known about such stacks’ contribution to the interstate transport of air pollution and the pollution controls installed at plants with these stacks; and (3) the number of TS that were built above good engineering practice height since 1988 and the reasons for this.
New Government Report: Taxes and Identity Theft Status of IRS Initiatives to Help Victimized Taxpayers
by James R. White
Paperback, 17 pages, 2011, $20.00
Identity theft (IT) is a serious and growing problem in the U.S. Taxpayers are harmed when identity thieves file fraudulent tax documents using stolen names and Social Security numbers. In 2010, the IRS identified 245,000+ IT incidents that affected the tax system. The hundreds of thousands of taxpayers with tax problems caused by IT represent a small percentage of the 140 million individual returns filed, but for those affected, the problems can be quite serious. This report describes: (1) when IRS detects IT based refund and employ. fraud; (2) the steps IRS has taken to resolve, detect, and prevent innocent taxpayers’ IT related problems; and (3) constraints that hinder IRS’s ability to address these issues. Illus. This is a print on demand report.
by Mark E. Gaffigan
Paperback, 80 pages, 2011, $25.00
Spent nuclear fuel — considered very hazardous — is accumulating at commercial reactor sites in 33 states. The Nuclear Waste Policy Act of 1982 directs the Dept. of Energy (DoE) to dispose of this waste in a repository at Yucca Mountain, Nevada. In June 2008, DoE submitted a license application for the repository, but in March 2010 moved to withdraw it. However, the NRC or the courts could compel DoE to resume the licensing process. This report examines: (1) the basis for DoE’s decision to terminate the Yucca Mountain program; (2) the termination steps DoE has taken and their effects; (3) the major impacts if the repository were terminated; and (4) the principal lessons learned. Charts and tables. This is a print on demand report.