You limited your search to:

 Collection: Congressional Research Service Reports
Remedies Available to Victims of Identity Theft

Remedies Available to Victims of Identity Theft

Date: April 19, 2005
Creator: Welborn, Angie A
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Remedies Available to Victims of Identity Theft

Remedies Available to Victims of Identity Theft

Date: September 12, 2003
Creator: Welborn, Angie A
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Remedies Available to Victims of Identity Theft

Remedies Available to Victims of Identity Theft

Date: July 9, 2003
Creator: Welborn, Angie A
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Remedies Available to Victims of Identity Theft

Remedies Available to Victims of Identity Theft

Date: May 13, 2003
Creator: Welborn, Angie A
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Remedies Available to Victims of Identity Theft

Remedies Available to Victims of Identity Theft

Date: March 21, 2003
Creator: Welborn, Angie A
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Remedies Available to Victims of Identity Theft

Remedies Available to Victims of Identity Theft

Date: February 27, 2003
Creator: Welborn, Angie A
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Remedies Available to Victims of Identity Theft

Remedies Available to Victims of Identity Theft

Date: February 7, 2003
Creator: Welborn, Angie A
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Date: October 17, 2003
Creator: Wilson, Clay
Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Date: April 1, 2005
Creator: Wilson, Clay
Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Contributing Partner: UNT Libraries Government Documents Department
Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Date: September 25, 2006
Creator: Wilson, Clay
Description: Since October 2001, Improvised Explosive Devices (IEDs, or roadside bombs) have been responsible for many of the more than 2,000 combat deaths in Iraq, and 178 combat deaths in Afghanistan. IEDs are hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with these bombs are becoming more numerous and deadly in both Iraq and Afghanistan. Department of Defense (DOD) efforts to counter IEDs have proven only marginally effective, and U.S. forces continue to be exposed to the threat at military checkpoints, or whenever on patrol. IEDs are increasingly being used in Afghanistan, and DOD reportedly is concerned that they might eventually be more widely used by other insurgents and terrorists worldwide.
Contributing Partner: UNT Libraries Government Documents Department