Search Results

open access

Weapons of Mass Destruction: Trade Between North Korea and Pakistan

Description: U.S. intelligence officials claimed Pakistan was a key supplier of uranium enrichment technology to North Korea, and some media reports suggested that Pakistan had exchanged centrifuge enrichment technology for North Korean help in developing longer range missiles. U.S. official statements leave little doubt that cooperation occurred, but there are significant details missing on the scope of cooperation and the role of Pakistan's government. The roots of cooperation are deep. North Korea and Pa… more
Date: October 11, 2006
Creator: Squassoni, Sharon A.
Partner: UNT Libraries Government Documents Department
open access

Weapons of Mass Destruction: Trade Between North Korea and Pakistan

Description: In October 2002, the United States confronted North Korea about its alleged clandestine uranium enrichment program. Soon after, the Agreed Framework collapsed, North Korea expelled international inspectors, and withdrew from the Nuclear Nonproliferation Treaty (NPT). U.S. intelligence officials claimed Pakistan was a key supplier of uranium enrichment technology to North Korea, and some media reports suggested that Pakistan had exchanged centrifuge enrichment technology for North Korean help in… more
Date: October 11, 2006
Creator: Squassoni, Sharon
Partner: UNT Libraries Government Documents Department
open access

China: Possible Missile Technology Transfers under U.S. Satellite Export Policy - Actions and Chronology

Description: This CRS Report discusses security concerns, significant congressional and administration action, and a comprehensive chronology pertaining to satellite exports to the PRC. The report discusses issues for U.S. foreign and security policy (including that on China and weapons nonproliferation), such as: What are the benefits and costs of satellite exports to China for U.S. economic and security interests? Should the United States continue, change, or cease the policy in place since the Reagan Adm… more
Date: October 6, 2003
Creator: Kan, Shirley A.
Partner: UNT Libraries Government Documents Department
open access

Internet Domain Names: Background and Policy Issues

Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet.
Date: October 28, 2009
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Data Mining and Homeland Security: An Overview

Description: Data mining has become one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terro… more
Date: October 3, 2006
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Digital Television: An Overview

Description: Digital television (DTV) is a new television service representing the most significant development in television technology since the advent of color television in the 1950s. DTV can provide sharper pictures, a wider screen, CD-quality sound, better color rendition, and other new services currently being developed. A successful deployment of DTV requires: the development by content providers of compelling digital programming; the delivery of digital signals to consumers by broadcast television … more
Date: October 2, 2002
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: This report discusses the "digital divide," a term that has been used to characterize a gap between those Americans who use or have access to telecommunications technologies (e.g., telephones, computers, the Internet) and those who do not. It particularly discusses one important subset of the digital divide debate concerns high speed Internet access or broadband.
Date: October 31, 2006
Creator: Kruger, Lennard G. & Gilroy, Angele A.
Partner: UNT Libraries Government Documents Department
open access

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a “digital divide” in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriat… more
Date: October 24, 2001
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Spectrum Policy in the Age of Broadband: Issues for Congress

Description: This report considers the possibility of modifying spectrum policy: (1) to support national goals for broadband deployment by placing more emphasis on attracting new providers of wireless broadband services; and (2) to accommodate the wireless broadband needs of industries that are considered by many to be the economic drivers of the future, not only communications, but also areas such as energy, health care, transportation, and education.
Date: October 22, 2009
Creator: Moore, Linda K.
Partner: UNT Libraries Government Documents Department
open access

Internet Privacy: Overview and Pending Legislation

Description: Internet privacy issues generally encompass two types of concerns. One is the collection of personally identifiable information (PII) by website operators from visitors to government and commercial websites, or by software that is surreptitiously installed on a user’s computer (“spyware”) and transmits the information to someone else. The other is the monitoring of electronic mail and Web usage by the government or law enforcement officials, employers, or email service providers.
Date: October 19, 2005
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

Protection of Children Online: Federal and State Laws Addressing Cyberstalking, Cyberharassment, and Cyberbullying

Description: This report discusses Internet crimes, such as cyberbullying, cyberharassment, and cyberstalking, along with the limitations of such laws in the current environment. While Congress, under the Commerce Clause, has authority to regulate the Internet, Internet "harassment" presents new challenges for legislators in terms of defining and prosecuting such activity.
Date: October 19, 2009
Creator: Smith, Alison M.
Partner: UNT Libraries Government Documents Department
open access

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last two Congresses, but no bill cleared Congress. … more
Date: October 23, 2002
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing te… more
Date: October 6, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

Internet and E-Commerce Statistics: What They Mean and Where to Find Them on the Web

Description: Statistics indicating Internet usage are imprecise. It is difficult to measure the scale of the Internet (or the World Wide Web), calculate the number and types of users (age, sex, race, gender, location, etc.), or forecast future growth. This report discusses the inherent complexities of estimating Internet and electronic commerce growth and describes various types of Internet statistics, discussing how to evaluate them and providing Web addresses for locating them. In addressing these topics,… more
Date: October 24, 2000
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Managing Electronic Waste: Issues with Exporting E-Waste

Description: This report looks at issues specifically related to export for recycling of electronic waste (e-waste). Particularly, it discusses documented impacts to human health and the environment that have been tied to unsafe recycling practices in developing countries, as well as issues that have motivated certain stakeholders to divert e-waste from landfill disposal and, hence, increase recycling.
Date: October 7, 2009
Creator: Luther, Linda
Partner: UNT Libraries Government Documents Department
Back to Top of Screen