You limited your search to:

 Country: United States
 Collection: Congressional Research Service Reports
Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Date: September 23, 2010
Creator: Kruger, Lennard G. & Gilroy, Angele A.
Description: Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a "digital divide" in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the "digital divide," and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive.
Contributing Partner: UNT Libraries Government Documents Department
Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Date: August 28, 2014
Creator: James, Nathan
Description: This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs.
Contributing Partner: UNT Libraries Government Documents Department
Clean Energy Standard: Potential Qualifying Energy Sources

Clean Energy Standard: Potential Qualifying Energy Sources

Date: May 3, 2011
Creator: Bracmort, Kelsi; Folger, Peter; Holt, Mark; Ratner, Michael & Sissine, Fred
Description: This report begins with a brief examination of clean energy, renewable energy, and alternative energy. It then presents possible selection criteria Congress could use to determine which sources could be eligible for a CES depending on the goal(s) of the CES. The report provides an overview of the energy sources most commonly discussed as potential CES qualifying sources: biomass, fossil fuels (natural gas combined-cycle and coal-fired power plants with carbon capture and sequestration), geothermal resources, nuclear, solar, water, and wind. The report describes where each source can be found in the United States, the estimated quantity available for electricity generation, technologies used to create electricity from the source, advantages and disadvantages of using the source for electricity generation, and policy implications should the source be included in a CES.5 The report also contains a section on energy efficiency and its potential inclusion in a CES.
Contributing Partner: UNT Libraries Government Documents Department
Cloud Computing: Constitutional and Statutory Privacy Protections

Cloud Computing: Constitutional and Statutory Privacy Protections

Date: March 22, 2013
Creator: Thompson, Richard M., II
Description: This report first describes cloud computing and how it differs from traditional computing. It then describes how the Fourth Amendment and federal electronic privacy statutes apply to communications in the physical world, to Internet communications generally, and specifically to the cloud. Finally, this report surveys recent legislation and other various proposals designed to update the existing statutory framework.
Contributing Partner: UNT Libraries Government Documents Department
Cooperative R&D: Federal Efforts to Promote Industrial Competitiveness

Cooperative R&D: Federal Efforts to Promote Industrial Competitiveness

Date: December 3, 2012
Creator: Schacht, Wendy H.
Description: Report regarding the ways the United States Congress has explored to stimulate technological advancement in the private sector.
Contributing Partner: UNT Libraries Government Documents Department
Cyber Operations in DOD Policy and Plans: Issues for Congress

Cyber Operations in DOD Policy and Plans: Issues for Congress

Date: January 5, 2014
Creator: Theohary, Catherine A. & Harrington, Anne I.
Description: This report presents an overview of the threat landscape in cyberspace, including the types of offensive weapons available, the targets they are designed to attack, and the types of actors carrying out the attacks. It presents a picture of what kinds of offensive and defensive tools exist and a brief overview of recent attacks. The report then describes the current status of U.S. capabilities, and the national and international authorities under which the U.S. Department of Defense carries out cyber operations.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Date: October 15, 2014
Creator: Doyle, Charles
Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Date: December 27, 2010
Creator: Doyle, Charles
Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Date: October 15, 2014
Creator: Doyle, Charles
Description: This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Date: May 23, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Contributing Partner: UNT Libraries Government Documents Department