You limited your search to:

 Collection: Congressional Research Service Reports
Broadband Internet Access: Background and Issues
This is one part in the series of reports that provide a background and analysis, and most recent developments regarding broadband or high-speed Internet access. The report starts out by answering questions; what is broadband and why is it important? This report also discusses broadband technologies, the status of broadband deployment and the related policy issues, as well as the legislation in congress. digital.library.unt.edu/ark:/67531/metacrs3459/
Terrorist Capabilities for Cyberattack: Overview and Policy Issues
No Description digital.library.unt.edu/ark:/67531/metacrs7633/
Encryption Technology: Congressional Issues
This report discusses primarily, the controversy over encryption concerns what access the government should have to encrypted stored computer data or electronic communications (voice and data, wired and wireless) for law enforcement purposes. digital.library.unt.edu/ark:/67531/metacrs728/
Immigration: A Guide to Internet Sources
No Description digital.library.unt.edu/ark:/67531/metacrs3168/
Immigration: A Guide to Internet Sources
No Description digital.library.unt.edu/ark:/67531/metacrs3169/
Appalachian Development Highway Program (ADHP): An Overview
This report discusses the Appalachian Development Highway Program (ADHP). After a brief description of the ADHP system, the report describes the ADHP's operation, organization, spending history and status. It then describes changes in its funding mechanism resultant from TEA 21 and issues of interest to Congress related to the ADHP. digital.library.unt.edu/ark:/67531/metacrs725/
Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview
No Description digital.library.unt.edu/ark:/67531/metacrs3175/
Critical Infrastructure: Control Systems and the Terrorist Threat
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet. digital.library.unt.edu/ark:/67531/metacrs3173/
Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis
The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011). digital.library.unt.edu/ark:/67531/metadc86604/
Aereo and FilmOn X: Internet Television Streaming and Copyright Law
This report begins with a discussion of the technology used by Aereo and FilmOn X that permit subscribers to watch live broadcast television as well as already-aired programming. It then examines the public performance right in the Copyright Act and discusses the interpretation of the transmit clause and public performance right by the courts in the Aereo and FilmOn cases. The report concludes with a brief overview of future litigation by these parties and related legislative proposals in the 113th Congress. digital.library.unt.edu/ark:/67531/metadc284471/
Aereo and FilmOn X: Internet Television Streaming and Copyright Law
This report begins with a discussion of the technology used by Aereo and FilmOn X that permit subscribers to watch live broadcast television as well as already-aired programming. It then examines the public performance right in the Copyright Act and discusses the interpretation of the transmit clause and public performance right by the courts in the Aereo and FilmOn cases. The report concludes with a brief overview of future litigation by these parties and related legislative proposals in the 113th Congress. digital.library.unt.edu/ark:/67531/metadc284491/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc284460/
Spectrum Policy in the Age of Broadband: Issues for Congress
This report discusses key spectrum policy provisions in the bills, as well as other spectrum policy issues that are being considered in the 112th Congress, such as the role of wholesale networks like that being deployed by LightSquared. digital.library.unt.edu/ark:/67531/metadc93820/
The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement
This report looks at issues for Congress related to expansion of legitimate and criminal operations across physical borders and through cyberspace as a result of globalization and technological innovation. In particular, it considers how Congress can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime and whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information. digital.library.unt.edu/ark:/67531/metadc98012/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc306502/
Internet Domain Names: Background and Policy Issues
This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the services, as well as related issues for the 113th Congress. digital.library.unt.edu/ark:/67531/metadc306512/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc306561/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc306484/
Spectrum Policy in the Age of Broadband: Issues for Congress
This report discusses key spectrum policy provisions in the bills, as well as other spectrum policy issues that are being considered in the 112th Congress, such as the role of wholesale networks like that being deployed by LightSquared. digital.library.unt.edu/ark:/67531/metadc83927/
The National Telecommunications and Information Administration (NTIA): Policies, Programs, and Funding
The National Telecommunications and Information Administration (NTIA), an agency of the Department of Commerce, is the executive branch's principal advisory office on domestic and international telecommunications and information policies. Its mandate is to provide greater access for all Americans to telecommunications services, support U.S. attempts to open foreign markets, advise on international telecommunications negotiations, and fund research for new technologies and their applications. NTIA also manages the distribution of funds for several key grant programs. digital.library.unt.edu/ark:/67531/metadc83990/
State Taxation of Internet Transactions
This report intends to clarify significant issues in the remote sales tax collection debate, beginning with a description of state and local sales and use taxes. Congress has a role in this issue because interstate commerce, in most cases, falls under the Commerce Clause of the Constitution. Congress will likely be asked to choose between taking either an active or passive role in the debate. In the 111th Congress, H.R. 5660 (former Representative Delahunt) would have granted SSUTA member states the authority to compel out-of- state vendors to collect sales and use taxes. digital.library.unt.edu/ark:/67531/metadc83968/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc93930/
The U.S. Science and Technology Workforce
In the 21st century, global competition and rapid advances in science and technology will challenge the scientific and technical proficiency of the U.S. workforce. This report provides an overview of the status of the U.S. science and technology (S&T) workforce, and identifies some of the issues and options that are currently being discussed in Congress. digital.library.unt.edu/ark:/67531/metadc26280/
Spectrum Policy in the Age of Broadband: Issues for Congress
The convergence of wireless telecommunications technology and Internet protocols is fostering new generations of mobile technologies. This transformation has created new demands for advanced communications infrastructure and radio frequency spectrum capacity that can support high-speed, content-rich uses. This report considers the possibility of modifying spectrum policy: (1) to support national goals for broadband deployment by placing more emphasis on attracting new providers of wireless broadband services; and (2) to accommodate the wireless broadband needs of industries that are considered by many to be the economic drivers of the future, not only communications, but also areas such as energy, health care, transportation, and education. digital.library.unt.edu/ark:/67531/metadc26172/
Access to Broadband Networks: The Net Neutrality Debate
This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet. digital.library.unt.edu/ark:/67531/metadc333001/
Access to Broadband Networks: The Net Neutrality Debate
This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet. digital.library.unt.edu/ark:/67531/metadc40076/
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
The "digital divide" is a term used to describe a perceived gap between "information haves and have-nots," or in other words, between those Americans who use or have access to telecommunications and information technologies and those who do not. Whether or not individuals or communities fall into the "information haves" category depends on a number of factors, ranging from the presence of computers in the home, to training and education, to the availability of affordable Internet access. digital.library.unt.edu/ark:/67531/metadc40179/
The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement
This report looks at issues for Congress, such as how legislative and oversight roles can bolster U.S. law enforcement's abilities to confront modern-day crime, including operations in cyberspace. It also examines whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information. digital.library.unt.edu/ark:/67531/metadc96708/
State Taxation of Internet Transactions
This report discusses significant issues in the remote sales tax collection debate, beginning with a description of state and local sales and use taxes. digital.library.unt.edu/ark:/67531/metadc463510/
The Obama Administration's Proposal to Establish a National Network for Manufacturing Innovation
This report discusses the proposed creation of the National Network for Manufacturing Innovation (NNMI), which would help accelerate innovation and support manufacturing technology commercialization. The report includes an overview of the topic as well as discussion on the Administration's proposal, preliminary activities, legislative status, and issues for consideration. digital.library.unt.edu/ark:/67531/metadc463238/
Spectrum Policy in the Age of Broadband: Issues for Congress
This report discusses some of the commercial and federal radio frequency spectrum policy changes required by the Middle Class Tax Relief and Job Creation Act of 2012. It also summarizes new policy directions for spectrum management under consideration in the 112th Congress, such as the encouragement of new technologies that use spectrum more efficiently. digital.library.unt.edu/ark:/67531/metadc491218/
The National Broadband Plan
This report discusses the Federal Communications Commission's (FCC) National Broadband Plan (NBP), which mandated by the American Recovery and Reinvestment Act of 2009 (ARRA) is a 360-page document composed of 17 chapters containing 208 specific recommendations directed to the FCC, to the Executive Branch (both to individual agencies and to Administration as a whole), to Congress, and to nonfederal and nongovernmental entities. The ARRA specified that the NBP should "seek to ensure that all people of the United States have access to broadband capability." digital.library.unt.edu/ark:/67531/metadc491376/
Federal Lands and Natural Resources: Overview and Selected Issues for the 113th Congress
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc491088/
Internet Domain Names: Background and Policy Issues
This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the services, as well as related issues for the 113th Congress. digital.library.unt.edu/ark:/67531/metadc491152/
Organized Crime: An Evolving Challenge for U.S. Law Enforcement
This report provides an analysis of how organized crime has capitalized on globalization by using borders as opportunities, relying on fast-paced technological change, and adapting its organizational structures. It illustrates how these transformations can impact U.S. persons, businesses, and interests. The report includes a discussion of how U.S. law enforcement conceptualizes organized crime in the 21st century and concludes by examining potential issues for Congress, including the extent to which organized crime is a national security threat (partly to be tackled by U.S. law enforcement agencies), congressional oversight regarding the federal coordination of organized crime investigations, and the utility of current resources appropriated to combat organized crime. digital.library.unt.edu/ark:/67531/metadc491441/
Spectrum Policy in the Age of Broadband: Issues for Congress
This report discusses key spectrum policy provisions in the bills, as well as other spectrum policy issues that are being considered in the 112th Congress, such as the role of wholesale networks like that being deployed by LightSquared. digital.library.unt.edu/ark:/67531/metadc491603/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc462338/
Advanced Vehicle Technologies: Energy, Environment, and Development Issues
This report discusses four major vehicle technologies — electric vehicles, hybrid electric vehicles, plug-in hybrids, and fuel cell vehicles — as well as advanced component technologies. Each technology is discussed in terms of cost, fueling and maintenance infrastructure, and performance. digital.library.unt.edu/ark:/67531/metadc462526/
Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis
This report discusses the Cyber Crime Protection Security Act (S. 2111) that would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011). digital.library.unt.edu/ark:/67531/metadc462558/
Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?
This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs. digital.library.unt.edu/ark:/67531/metadc462415/
State Taxation of Internet Transactions
This report intends to clarify significant issues in the remote sales tax collection debate, beginning with a description of state and local sales and use taxes. Congress has a role in this issue because interstate commerce, in most cases, falls under the Commerce Clause of the Constitution. digital.library.unt.edu/ark:/67531/metadc462442/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc462495/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc463359/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc462060/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc463466/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc462636/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc462922/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc462557/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc462130/
Cyber Operations in DOD Policy and Plans: Issues for Congress
This report presents an overview of the threat landscape in cyberspace, including the types of offensive weapons available, the targets they are designed to attack, and the types of actors carrying out the attacks. It presents a picture of what kinds of offensive and defensive tools exist and a brief overview of recent attacks. The report then describes the current status of U.S. capabilities, and the national and international authorities under which the U.S. Department of Defense carries out cyber operations. digital.library.unt.edu/ark:/67531/metadc501838/