You limited your search to:

 Collection: Congressional Research Service Reports
Radio Broadcasting Chips for Smartphones: A Status Report

Radio Broadcasting Chips for Smartphones: A Status Report

Date: December 15, 2014
Creator: Moore, Linda K.
Description: This report provides information on consumer and industry trends in radio and wireless network communications to give perspective on the proposal for widespread deployment of FM radio chips in smartphones as an emergency preparedness measure. It also provides a brief overview of the role of technology in disseminating emergency alerts and information.
Contributing Partner: UNT Libraries Government Documents Department
Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Date: December 11, 2014
Creator: Weiss, N. Eric
Description: This report analyzes the incentives for companies to share information about cybersecurity breaches with other companies and the federal government. Data breaches, such as those at Target, Home Depot, Neiman Marcus, and JPMorgan Chase, affecting financial records of tens of millions of households seem to occur regularly. Companies typically respond by trying to increase their cybersecurity by hiring consultants and purchasing new hardware and software. Policy analysts have suggested that sharing information about these breaches could be an effective and inexpensive part of improving cybersecurity. Firms share information directly on an ad hoc basis and through private-sector, nonprofit organizations such as Information Sharing and Analysis Centers (ISACs) that can analyze and disseminate information.
Contributing Partner: UNT Libraries Government Documents Department
"Amazon Laws" and Taxation of Internet Sales: Constitutional Analysis

"Amazon Laws" and Taxation of Internet Sales: Constitutional Analysis

Date: November 28, 2014
Creator: Lunder, Erika K. & Pettit, Carol A.
Description: As more purchases are made over the Internet, states are looking for new ways to collect taxes on online sales. There is a common misperception that the U.S. Constitution prohibits states from taxing Internet sales. This report discusses "Amazon laws", which try to capture uncollected taxes on Internet sales and yet still comply with the Constitution's requirements.
Contributing Partner: UNT Libraries Government Documents Department
Internet Domain Names: Background and Policy Issues

Internet Domain Names: Background and Policy Issues

Date: November 26, 2014
Creator: Kruger, Lennard G.
Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the services, as well as related issues for the 113th Congress.
Contributing Partner: UNT Libraries Government Documents Department
Internet Governance and the Domain Name System: Issues for Congress

Internet Governance and the Domain Name System: Issues for Congress

Date: November 26, 2014
Creator: Kruger, Lennard G.
Description: This report provides a definition regarding Internet governance and how the Internet is currently governed. The report discusses the role of United States government and future model of Internet governance.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: FISMA Reform

Cybersecurity: FISMA Reform

Date: November 24, 2014
Creator: Fischer, Eric A.
Description: This report briefly discusses current requirements under the Federal Information Security Management Act (FISMA) and two bills currently being considered by Congress that would revise the conditions and authority granted by FISMA.
Contributing Partner: UNT Libraries Government Documents Department
America COMPETES Acts: FY2008 to FY2013 Funding Tables

America COMPETES Acts: FY2008 to FY2013 Funding Tables

Date: October 31, 2014
Creator: Gonzalez, Heather B.
Description: The 2007 America COMPETES Act (P.L. 110-69) is designed to “invest in innovation through research and development, and to improve the competitiveness of the United States.” This report tracks accounts and activities authorized by the 2007 and 2010 COMPETES Acts during each act’s authorization period. It includes only those accounts and activities for which the acts provide a defined (i.e., specific) appropriations authorization.
Contributing Partner: UNT Libraries Government Documents Department
Smartphone Data Encryption: A Renewed Boundary for Law Enforcement?

Smartphone Data Encryption: A Renewed Boundary for Law Enforcement?

Date: October 17, 2014
Creator: Finklea, Kristin
Description: This report briefly examines new issues for law enforcement regarding data encryption and smartphones including cyber-criminals and Apple's new privacy policy that removes the back-doors that law enforcement used to be able to use to access user data.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Date: October 15, 2014
Creator: Doyle, Charles
Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Date: October 15, 2014
Creator: Doyle, Charles
Description: This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: October 14, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Federal Lands and Natural Resources: Overview and Selected Issues for the 113th Congress

Federal Lands and Natural Resources: Overview and Selected Issues for the 113th Congress

Date: October 14, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Date: August 28, 2014
Creator: James, Nathan
Description: This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: July 18, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions.
Contributing Partner: UNT Libraries Government Documents Department
Access to Broadband Networks: The Net Neutrality Debate

Access to Broadband Networks: The Net Neutrality Debate

Date: July 2, 2014
Creator: Gilroy, Angele A.
Description: This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: May 30, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Nanotechnology: A Policy Primer

Nanotechnology: A Policy Primer

Date: May 30, 2014
Creator: Sargent, John F., Jr.
Description: This report provides an overview of nanomanufacturing as well as public understanding of and attitudes toward nanotechnology.
Contributing Partner: UNT Libraries Government Documents Department
Internet Domain Names: Background and Policy Issues

Internet Domain Names: Background and Policy Issues

Date: May 23, 2014
Creator: Kruger, Lennard G.
Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the services, as well as related issues for the 113th Congress.
Contributing Partner: UNT Libraries Government Documents Department
Internet Governance and the Domain Name System: Issues for Congress

Internet Governance and the Domain Name System: Issues for Congress

Date: May 23, 2014
Creator: Kruger, Lennard G.
Description: This report provides a definition regarding Internet governance and how the Internet is currently governed. The report discusses the role of United States government and future model of Internet governance.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: May 22, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: May 2, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: April 3, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Internet Domain Names: Background and Policy Issues

Internet Domain Names: Background and Policy Issues

Date: March 28, 2014
Creator: Kruger, Lennard G.
Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the servies, as well as related issues for the 113th Congress.
Contributing Partner: UNT Libraries Government Documents Department
Aereo and FilmOn X: Internet Television Streaming and Copyright Law

Aereo and FilmOn X: Internet Television Streaming and Copyright Law

Date: March 20, 2014
Creator: Lanza, Emily M.
Description: This report begins with a discussion of the technology used by Aereo and FilmOn X that permit subscribers to watch live broadcast television as well as already-aired programming. It then examines the public performance right in the Copyright Act and discusses the interpretation of the transmit clause and public performance right by the courts in the Aereo and FilmOn cases. The report concludes with a brief overview of future litigation by these parties and related legislative proposals in the 113th Congress.
Contributing Partner: UNT Libraries Government Documents Department