You limited your search to:

 Collection: Congressional Research Service Reports
The National Broadband Plan

The National Broadband Plan

Date: July 9, 2010
Creator: Kruger, Lennard G.; Gilroy, Angele A.; Goldfarb, Charles B.; Moore, Linda K. & Ruane, Kathleen Ann
Description: This report discusses the Federal Communications Commission's (FCC) National Broadband Plan (NBP), which mandated by the American Recovery and Reinvestment Act of 2009 (ARRA) is a 360-page document composed of 17 chapters containing 208 specific recommendations directed to the FCC, to the Executive Branch (both to individual agencies and to Administration as a whole), to Congress, and to nonfederal and nongovernmental entities. The ARRA specified that the NBP should "seek to ensure that all people of the United States have access to broadband capability."
Contributing Partner: UNT Libraries Government Documents Department
Federal Lands and Natural Resources: Overview and Selected Issues for the 113th Congress

Federal Lands and Natural Resources: Overview and Selected Issues for the 113th Congress

Date: October 14, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Internet Domain Names: Background and Policy Issues

Internet Domain Names: Background and Policy Issues

Date: November 26, 2014
Creator: Kruger, Lennard G.
Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the services, as well as related issues for the 113th Congress.
Contributing Partner: UNT Libraries Government Documents Department
Organized Crime: An Evolving Challenge for U.S. Law Enforcement

Organized Crime: An Evolving Challenge for U.S. Law Enforcement

Date: December 23, 2010
Creator: Bjelopera, Jerome P. & Finklea, Kristin M.
Description: This report provides an analysis of how organized crime has capitalized on globalization by using borders as opportunities, relying on fast-paced technological change, and adapting its organizational structures. It illustrates how these transformations can impact U.S. persons, businesses, and interests. The report includes a discussion of how U.S. law enforcement conceptualizes organized crime in the 21st century and concludes by examining potential issues for Congress, including the extent to which organized crime is a national security threat (partly to be tackled by U.S. law enforcement agencies), congressional oversight regarding the federal coordination of organized crime investigations, and the utility of current resources appropriated to combat organized crime.
Contributing Partner: UNT Libraries Government Documents Department
Spectrum Policy in the Age of Broadband: Issues for Congress

Spectrum Policy in the Age of Broadband: Issues for Congress

Date: August 20, 2010
Creator: Moore, Linda K.
Description: This report discusses key spectrum policy provisions in the bills, as well as other spectrum policy issues that are being considered in the 112th Congress, such as the role of wholesale networks like that being deployed by LightSquared.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: October 14, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Advanced Vehicle Technologies: Energy, Environment, and Development Issues

Advanced Vehicle Technologies: Energy, Environment, and Development Issues

Date: December 6, 2007
Creator: Yacobucci, Brent D.
Description: This report discusses four major vehicle technologies — electric vehicles, hybrid electric vehicles, plug-in hybrids, and fuel cell vehicles — as well as advanced component technologies. Each technology is discussed in terms of cost, fueling and maintenance infrastructure, and performance.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis

Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis

Date: January 28, 2013
Creator: Doyle, Charles
Description: This report discusses the Cyber Crime Protection Security Act (S. 2111) that would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Contributing Partner: UNT Libraries Government Documents Department
Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Date: August 28, 2014
Creator: James, Nathan
Description: This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs.
Contributing Partner: UNT Libraries Government Documents Department
State Taxation of Internet Transactions

State Taxation of Internet Transactions

Date: April 19, 2013
Creator: Maguire, Steven
Description: This report intends to clarify significant issues in the remote sales tax collection debate, beginning with a description of state and local sales and use taxes. Congress has a role in this issue because interstate commerce, in most cases, falls under the Commerce Clause of the Constitution.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: March 8, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: March 20, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: May 22, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: January 17, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: April 17, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: May 24, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: January 9, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: January 23, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Cyber Operations in DOD Policy and Plans: Issues for Congress

Cyber Operations in DOD Policy and Plans: Issues for Congress

Date: January 5, 2014
Creator: Theohary, Catherine A. & Harrington, Anne I.
Description: This report presents an overview of the threat landscape in cyberspace, including the types of offensive weapons available, the targets they are designed to attack, and the types of actors carrying out the attacks. It presents a picture of what kinds of offensive and defensive tools exist and a brief overview of recent attacks. The report then describes the current status of U.S. capabilities, and the national and international authorities under which the U.S. Department of Defense carries out cyber operations.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity Issues and Challenges: In Brief

Cybersecurity Issues and Challenges: In Brief

Date: December 16, 2014
Creator: Fischer, Eric A.
Description: The information and communications technology (ICT) industry has evolved greatly over the last half century. The technology is ubiquitous and increasingly integral to almost every facet of modern society. ICT devices and components are generally interdependent, and disruption of one may affect many others. Over the past several years, experts and policy makers have expressed increasing concerns about protecting ICT systems from cyberattacks, which many experts expect to increase in frequency and severity over the next several years. This report discusses the concept of cybersecurity, the management of cybersecurity risks, and the federal government's role in managing such risks.
Contributing Partner: UNT Libraries Government Documents Department
Access to Broadband Networks: The Net Neutrality Debate

Access to Broadband Networks: The Net Neutrality Debate

Date: January 15, 2015
Creator: Gilroy, Angele A.
Description: This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Date: December 11, 2014
Creator: Weiss, N. Eric
Description: This report analyzes the incentives for companies to share information about cybersecurity breaches with other companies and the federal government. Data breaches, such as those at Target, Home Depot, Neiman Marcus, and JPMorgan Chase, affecting financial records of tens of millions of households seem to occur regularly. Companies typically respond by trying to increase their cybersecurity by hiring consultants and purchasing new hardware and software. Policy analysts have suggested that sharing information about these breaches could be an effective and inexpensive part of improving cybersecurity. Firms share information directly on an ad hoc basis and through private-sector, nonprofit organizations such as Information Sharing and Analysis Centers (ISACs) that can analyze and disseminate information.
Contributing Partner: UNT Libraries Government Documents Department
The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

Date: December 15, 2014
Creator: Fischer, Eric A.; Liu, Edward C.; Rollins, John W. & Theohary, Catherine A.
Description: The federal role in cybersecurity has been a topic of discussion and debate for over a decade. Despite significant legislative efforts in the 112th Congress on bills designed to improve the cybersecurity of U.S. critical infrastructure (CI), no legislation on that issue was enacted in that Congress. This report discusses the ramifications of Executive Order 13636, which issued in February 2013 was an attempt to enhance security and resiliency of CI through voluntary, collaborative efforts involving federal agencies and owners and operators of privately owned CI, as well as use of existing federal regulatory authorities.
Contributing Partner: UNT Libraries Government Documents Department
Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Date: February 23, 2015
Creator: Weiss, N. E.
Description: This report analyzes the incentives for companies to share information about cybersecurity breaches with other companies and the federal government.
Contributing Partner: UNT Libraries Government Documents Department