You limited your search to:

 Decade: 2000-2009
 Collection: Congressional Research Service Reports
Meeting Public Safety Spectrum Needs

Meeting Public Safety Spectrum Needs

Date: July 11, 2002
Creator: Moore, Linda K
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Meeting Public Safety Spectrum Needs

Meeting Public Safety Spectrum Needs

Date: July 22, 2002
Creator: Moore, Linda K
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Meeting Public Safety Spectrum Needs

Meeting Public Safety Spectrum Needs

Date: December 18, 2002
Creator: Moore, Linda K
Description: None
Contributing Partner: UNT Libraries Government Documents Department
The Federal Excise Tax on Telephone Service: A History

The Federal Excise Tax on Telephone Service: A History

Date: January 4, 2001
Creator: Talley, Louis Alan
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Telephone Excise Tax

Telephone Excise Tax

Date: September 15, 2000
Creator: Talley, Louis Alan
Description: None
Contributing Partner: UNT Libraries Government Documents Department
The Telephone Excise Tax: Revenues, Effects, and Repeal Proposals

The Telephone Excise Tax: Revenues, Effects, and Repeal Proposals

Date: February 1, 2001
Creator: Talley, Louis Alan
Description: None
Contributing Partner: UNT Libraries Government Documents Department
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Date: June 18, 2003
Creator: Smith, Marcia S
Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. While 33 states have anti-spam laws, there is no federal law. Six bills addressing the spam issue are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), and S. 1231 (Schumer). Spam on wireless devices such as cell phones is discussed in CRS Report RL31636, Wireless Privacy: Availability of Location Information for Telemarketing.
Contributing Partner: UNT Libraries Government Documents Department
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Date: June 25, 2003
Creator: Smith, Marcia S
Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. While 34 states have anti-spam laws, there is no federal law specifically concerning spam. Nine “antispam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), H.R. 2515 (Wilson), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327 (Corzine). Tables providing brief “side-by-side” comparisons of the bills are included in this report.
Contributing Partner: UNT Libraries Government Documents Department
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Date: July 24, 2003
Creator: Smith, Marcia S
Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. While 34 states have anti-spam laws, there is no federal law specifically concerning spam. Nine “antispam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), H.R. 2515 (Wilson), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327 (Corzine). Tables providing brief “side-by-side” comparisons of the bills are included at the end of this report.
Contributing Partner: UNT Libraries Government Documents Department
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Date: August 22, 2003
Creator: Smith, Marcia S
Description: None
Contributing Partner: UNT Libraries Government Documents Department
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Date: October 6, 2003
Creator: Smith, Marcia S
Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. While 36 states have anti-spam laws, there is no federal law specifically concerning spam. Nine “antispam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), H.R. 2515 (Wilson-Green), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327 (Corzine). Two (S. 877 and S. 1293) have been reported from committee. Tables providing brief “side-by-side” comparisons of the bills are included at the end of this report.
Contributing Partner: UNT Libraries Government Documents Department
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Date: January 30, 2004
Creator: Smith, Marcia S
Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. On December 16, President Bush signed into law S. 877, the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act. The law, P.L. 108-187, went into effect on January 1, 2004.
Contributing Partner: UNT Libraries Government Documents Department
"Spam": An Overview of Issues Concerning Commercial Electronic Mail

"Spam": An Overview of Issues Concerning Commercial Electronic Mail

Date: September 16, 2004
Creator: Smith, Marcia S
Description: Spam, also called unsolicited commercial email (UCE) or “junk email,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment, and that some consumers want to receive such solicitations. This report discusses this issue in detail, as well as related legislation.
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Date: October 17, 2003
Creator: Wilson, Clay
Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Date: April 1, 2005
Creator: Wilson, Clay
Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Contributing Partner: UNT Libraries Government Documents Department
Network Centric Warfare: Background and Oversight Issues for Congress

Network Centric Warfare: Background and Oversight Issues for Congress

Date: June 2, 2004
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
The Multi-State Anti-Terrorism Information Exchange (MATRIX) Pilot Project

The Multi-State Anti-Terrorism Information Exchange (MATRIX) Pilot Project

Date: August 18, 2004
Creator: Krouse, William J
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Creating a National Framework for Cybersecurity: An Analysis of Issues and Options

Creating a National Framework for Cybersecurity: An Analysis of Issues and Options

Date: February 22, 2005
Creator: Fischer, Eric A
Description: Cyber- security refers to three things: measures to protect information technology; the information it contains, processes, and transmits, and associated physical and virtual elements (which together comprise cyberspace); the degree of protection resulting from application of those measures; and the associated field of professional endeavor. This report aims to examine what kind of national cyber-security framework may be needed and how it might be implemented, and it addresses three questions: 1. Where are the major cyber-security weaknesses currently, and where might weaknesses be anticipated in the future? What are the major means of leverage for addressing those weaknesses? What roles should government and the private sector play in the use of those means of leverage to address current and potential future weaknesses?
Contributing Partner: UNT Libraries Government Documents Department
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Date: May 28, 2002
Creator: Smith, Marcia S.
Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last two Congresses, but no bill cleared Congress. Several bills have been introduced in the 107th Congress. H.R. 718 was reported from the House Energy and Commerce Committee and the House Judiciary Committee (H. Rept. 107-41, Parts 1 and 2). The two versions are quite different. S. 630 was ordered reported from the Senate Commerce Committee.
Contributing Partner: UNT Libraries Government Documents Department
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Date: October 23, 2002
Creator: Smith, Marcia S
Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last two Congresses, but no bill cleared Congress. Several bills have been introduced in the 107th Congress. H.R. 718 was reported from the House Energy and Commerce Committee and the House Judiciary Committee (H. Rept. 107-41, Parts 1 and 2). The two versions are quite different. S. 630 was ordered reported from the Senate Commerce Committee.
Contributing Partner: UNT Libraries Government Documents Department
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Date: April 15, 2003
Creator: Smith, Marcia S.
Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last three Congresses (105th-107th), but no federal law was enacted (27 states have anti-spam laws, however). Two bills have been introduced in the 108th Congress: S. 563 (Dayton) and S. 877 (Burns).
Contributing Partner: UNT Libraries Government Documents Department
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Date: May 15, 2003
Creator: Smith, Marcia S.
Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of spam insist it is a legitimate marketing technique and protected by the First Amendment. While 27 states have anti-spam laws, there is no federal law. Four bills are pending in the 108th Congress: H.R. 1933, S. 563, S. 877, and S. 1052. (Spam on wireless devices such as cell phones is discussed in CRS Report RL31636.)
Contributing Partner: UNT Libraries Government Documents Department
Third Generation ("3G") Mobile Wireless Technologies and Services

Third Generation ("3G") Mobile Wireless Technologies and Services

Date: January 17, 2001
Creator: Nunno, Richard M
Description: None
Contributing Partner: UNT Libraries Government Documents Department
V-Chip and TV Ratings: Helping Parents Supervise Their Children's Television Viewing

V-Chip and TV Ratings: Helping Parents Supervise Their Children's Television Viewing

Date: June 8, 2001
Creator: Smith, Marcia S
Description: None
Contributing Partner: UNT Libraries Government Documents Department