You limited your search to:

 Decade: 2010-2019
 Collection: Congressional Research Service Reports
Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Date: February 18, 2016
Creator: Finklea, Kristin
Description: This report provides an overview of the perennial issue involving technology outpacing law enforcement and discusses how policy makers and law enforcement officials have dealt with this issue in the past. It also outlines the current debate surrounding smartphone data encryption and how this may impact U.S. law enforcement operations, as well as existing law enforcement capabilities, the debate over whether law enforcement is "going dark" because of rapid technological advances, and resulting issues that policy makers may consider.
Contributing Partner: UNT Libraries Government Documents Department
The Federal Cybersecurity Workforce: Background and Congressional Oversight Issues for the Departments of Defense and Homeland Security

The Federal Cybersecurity Workforce: Background and Congressional Oversight Issues for the Departments of Defense and Homeland Security

Date: January 8, 2016
Creator: Francis, Kathryn A. & Ginsberg, Wendy
Description: This report examines congressional oversight of two strategies undertaken by Congress and the executive branch to strengthen the federal cybersecurity workforce: initiatives to define and identify the federal cybersecurity workforce, and hiring and pay flexibilities applicable to cybersecurity positions at the Department of Defense (DOD) and the Department of Homeland Security (DHS).
Contributing Partner: UNT Libraries Government Documents Department
Using Data to Improve Defense Acquisitions: Background, Analysis, and Questions for Congress

Using Data to Improve Defense Acquisitions: Background, Analysis, and Questions for Congress

Date: January 5, 2016
Creator: Schwartz, Moshe
Description: This report examines (1) the extent to which the Department of Defense (DOD) effectively uses data to inform decisionmaking, (2) some of the critical elements needed for DOD to use data more effectively, (3) recent efforts to improve DOD's use of data, and (4) potential questions for Congress. This report focuses primarily (but not exclusively) on defense acquisitions as a case study.
Contributing Partner: UNT Libraries Government Documents Department
Data Security and Breach Notification Legislation: Selected Legal Issues

Data Security and Breach Notification Legislation: Selected Legal Issues

Date: December 28, 2015
Creator: Dolan, Alissa M.
Description: This report describes the common elements of several data security and breach notification bills that have been introduced in the 114th Congress, which broadly would impose security and notification requirements on businesses regardless of industry sector. It also discusses state laws that may apply in the event of a data breach and addresses two legal issues that may arise in consideration of new legislation about data security and breach notification.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Overview Reports and Links to Government, News, and Related Resources

Cybersecurity: Overview Reports and Links to Government, News, and Related Resources

Date: March 2, 2016
Creator: Tehan, Rita
Description: This report directs the reader to authoritative sources that address many of the most prominent issues related to cybersecurity. Included in the reports are resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources.
Contributing Partner: UNT Libraries Government Documents Department
Is Broadband Deployment Reasonable and Timely?

Is Broadband Deployment Reasonable and Timely?

Date: February 6, 2016
Creator: Kruger, Lennard G.
Description: This report briefly discusses the state of broadband Internet in America as determined by the Federal Communications Commission (FCC) in its latest Broadband Progress Report.
Contributing Partner: UNT Libraries Government Documents Department
Renewed Crypto Wars?

Renewed Crypto Wars?

Date: February 9, 2016
Creator: Finklea, Kristin
Description: This report briefly examines renewed tensions between tech companies and the government regarding encryption "back doors" and how quickly-advancing technologies could impact law enforcement investigations.
Contributing Partner: UNT Libraries Government Documents Department
The National Telecommunications and Information Administration (NTIA): Policies, Programs, and Funding

The National Telecommunications and Information Administration (NTIA): Policies, Programs, and Funding

Date: March 5, 2012
Creator: Moore, Linda K.
Description: This report discusses the National Telecommunications and Information Administration (NTIA), which is an agency of the Department of Commerce set up to advise on domestic and international telecommunications and information policies.
Contributing Partner: UNT Libraries Government Documents Department
Illegal Internet Streaming of Copyrighted Content: Legislation in the 112th Congress

Illegal Internet Streaming of Copyrighted Content: Legislation in the 112th Congress

Date: December 1, 2011
Creator: Yeh, Brian T.
Description: This report describes streaming technology, explains the disparity in criminal penalties for different forms of infringement committed by electronic means, analyzes legislation in the 112th Congress that would harmonize penalties for illegal streaming with those available for other forms of online copyright infringement, and summarizes arguments for and against such a legislative change.
Contributing Partner: UNT Libraries Government Documents Department
America COMPETES Acts: FY2008 to FY2013 Funding Tables

America COMPETES Acts: FY2008 to FY2013 Funding Tables

Date: October 31, 2014
Creator: Gonzalez, Heather B.
Description: The 2007 America COMPETES Act (P.L. 110-69) is designed to “invest in innovation through research and development, and to improve the competitiveness of the United States.” This report tracks accounts and activities authorized by the 2007 and 2010 COMPETES Acts during each act’s authorization period. It includes only those accounts and activities for which the acts provide a defined (i.e., specific) appropriations authorization.
Contributing Partner: UNT Libraries Government Documents Department
Selected Federal Data Security Breach Legislation

Selected Federal Data Security Breach Legislation

Date: April 9, 2012
Creator: Ruane, Kathleen Ann
Description: The protection of data, particularly data that can be used to identify individuals, has become an issue of great concern to Congress. This report discusses relevant legislation regarding data security.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity and Information Sharing: Legal Challenges and Solutions

Cybersecurity and Information Sharing: Legal Challenges and Solutions

Date: March 16, 2015
Creator: Nolan, Andrew
Description: While considerable debate exists with regard to the best strategies for protecting America’s various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely exchange of cyber-threat intelligence both within the private sector and between the private sector and the government. This report examines the various legal issues that arise with respect to the sharing of cybersecurity intelligence, with a special focus on two distinct concepts: (1) sharing of cyberinformation within the government’s possession and (2) sharing of cyber-information within the possession of the private sector.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: December 4, 2013
Creator: Tehan, Rita
Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. This report provides links to selected authoritative resources related to cybersecurity issues.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: July 18, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions.
Contributing Partner: UNT Libraries Government Documents Department
The EU-U.S. Safe Harbor Agreement on Personal Data Privacy: In Brief

The EU-U.S. Safe Harbor Agreement on Personal Data Privacy: In Brief

Date: October 29, 2015
Creator: Weiss, Martin A.
Description: This report discusses a recent judgement by the Court of Justice of the European Union (CJEU) that invalidates the Safe Harbor Agreement between the United States and the 28-member European Union (EU). Safe Harbor is a 15-year-old accord, under which personal data could legally be transferred between EU member countries and the United States.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Date: June 18, 2015
Creator: Fischer, Eric A. & Logan, Stephanie M.
Description: This report compares provisions in two bills in the House of Representatives that address information sharing and related activities in cybersecurity. Both bills focus on information sharing among private entities and between them and the federal government.
Contributing Partner: UNT Libraries Government Documents Department
U.S.-China Cyber Agreement

U.S.-China Cyber Agreement

Date: October 16, 2015
Creator: Rollins, John W.; Lawrence, Susan V.; Rennack, Dianne E. & Theohary, Catherine A.
Description: During the state visit on September 24-25, 2015, President Xi Jinping of China and President Barack Obama reached a Cyber Agreement. This report briefly discusses that agreement.
Contributing Partner: UNT Libraries Government Documents Department
Internet Governance and the Domain Name System: Issues for Congress

Internet Governance and the Domain Name System: Issues for Congress

Date: November 9, 2015
Creator: Kruger, Lennard G.
Description: This report provides a definition regarding Internet governance and how the Internet is currently governed. The report discusses the role of United States government and future model of Internet governance.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Date: November 17, 2015
Creator: Tehan, Rita
Description: This report provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses. It also provides a list of executive orders and presidential directives pertaining to information and computer security.
Contributing Partner: UNT Libraries Government Documents Department
Internet Governance and the Domain Name System: Issues for Congress

Internet Governance and the Domain Name System: Issues for Congress

Date: November 20, 2015
Creator: Kruger, Lennard G.
Description: This report provides a definition regarding Internet governance and how the Internet is currently governed, and discusses the role of United States government and future model of Internet governance.
Contributing Partner: UNT Libraries Government Documents Department
The Internet Tax Freedom Act: In Brief

The Internet Tax Freedom Act: In Brief

Date: October 5, 2015
Creator: Stupak, Jeffrey M.
Description: This report discusses the Internet Tax Freedom Act (ITFA; P.L. 105-277), which enacted in 1998, implemented a three-year moratorium preventing state and local governments from taxing Internet access, or imposing multiple or discriminatory taxes on electronic commerce.
Contributing Partner: UNT Libraries Government Documents Department
The Internet of Things: Frequently Asked Questions

The Internet of Things: Frequently Asked Questions

Date: October 13, 2015
Creator: Fischer, Eric A.
Description: This report was developed to assist Congress in responding to some commonly asked questions about the Internet of Things (IoT), a complex, often poorly understood phenomenon.
Contributing Partner: UNT Libraries Government Documents Department
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Date: August 3, 2015
Creator: Moloney Figliola, Patricia
Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. Support of IT R&D began because the government had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Contributing Partner: UNT Libraries Government Documents Department
Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Date: September 8, 2015
Creator: Finklea, Kristin
Description: This report provides an overview of the perennial issue involving technology outpacing law enforcement and discusses how policy makers and law enforcement officials have dealt with this issue in the past. It discusses the current debate surrounding smartphone data encryption and how this may impact U.S. law enforcement operations. The report also discusses existing law enforcement capabilities, the debate over whether law enforcement is "going dark" because of rapid technological advances, and resulting issues that policy makers may consider.
Contributing Partner: UNT Libraries Government Documents Department