You limited your search to:

 Collection: Congressional Research Service Reports
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Date: October 17, 2003
Creator: Wilson, Clay
Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Date: April 1, 2005
Creator: Wilson, Clay
Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Contributing Partner: UNT Libraries Government Documents Department
Constitutionality of Applying the FCC's Indecency Restriction to Cable Television

Constitutionality of Applying the FCC's Indecency Restriction to Cable Television

Date: December 1, 2005
Creator: Cohen, Henry
Description: Various federal officials have spoken in favor of extending the Federal Communication Commission’s indecency restriction, which currently applies to broadcast television and radio, to cable and satellite television. This report examines whether such an extension would violate the First Amendment’s guarantee of freedom of speech.
Contributing Partner: UNT Libraries Government Documents Department
Copyright Protection of Digital Television:  The "Broadcast Flag"

Copyright Protection of Digital Television: The "Broadcast Flag"

Date: May 11, 2005
Creator: Welborn, Angie A
Description: This report addresses the adoption of a “broadcast flag” system by the Federal Communications Commission (FCC) to protect digital television (DTV) broadcasts from unauthorized redistribution. The report also addresses the recent decision of the United States Court of Appeals for the District of Columbia Circuit reversing and vacating the FCC’s broadcast flag report and order.
Contributing Partner: UNT Libraries Government Documents Department
The Corporation for Public Broadcasting: Federal Funding Facts and Status

The Corporation for Public Broadcasting: Federal Funding Facts and Status

Date: June 22, 2005
Creator: McLoughlin, Glenn J
Description: The Corporation for Public Broadcasting, created in 1967, receives approximately 15% of its annual funding from federal appropriations. In turn, the CPB, acting as an umbrella agency, is required to spend 89 percent of the appropriations in grants to members of Public Broadcasting Service (PBS), National Public Radio (NPR), Public Radio International (PRI), and other affiliated public television and radio broadcasters.
Contributing Partner: UNT Libraries Government Documents Department
The Corporation for Public Broadcasting: Federal Funding Facts and Status

The Corporation for Public Broadcasting: Federal Funding Facts and Status

Date: July 25, 2005
Creator: McLoughlin, Glenn J
Description: Congressional policymakers are closely examining federal funding for the Corporation for Public Broadcasting (CPB). Overall, 15.6% of all public television and radio broadcasting funding comes from the federal appropriations that CPB distributes. The CPB’s appropriation is allocated through a distribution formula established in its authorizing legislation. It has historically received two-year advanced appropriations.
Contributing Partner: UNT Libraries Government Documents Department
Creating a National Framework for Cybersecurity: An Analysis of Issues and Options

Creating a National Framework for Cybersecurity: An Analysis of Issues and Options

Date: February 22, 2005
Creator: Fischer, Eric A
Description: Cyber- security refers to three things: measures to protect information technology; the information it contains, processes, and transmits, and associated physical and virtual elements (which together comprise cyberspace); the degree of protection resulting from application of those measures; and the associated field of professional endeavor. This report aims to examine what kind of national cyber-security framework may be needed and how it might be implemented, and it addresses three questions: 1. Where are the major cyber-security weaknesses currently, and where might weaknesses be anticipated in the future? What are the major means of leverage for addressing those weaknesses? What roles should government and the private sector play in the use of those means of leverage to address current and potential future weaknesses?
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: The Council of Europe Convention

Cybercrime: The Council of Europe Convention

Date: December 1, 2005
Creator: Archick, Kristin
Description: This report discusses the Europe’s Convention on Cybercrime of November 2001, which includes forty-two countries and the United States.
Contributing Partner: UNT Libraries Government Documents Department
Data Security: Protecting the Privacy of Phone Records

Data Security: Protecting the Privacy of Phone Records

Date: May 17, 2006
Creator: Stevens, Gina Marie & Rainson, Tara Alexandra
Description: This report discusses recent legislative and regulatory efforts to protect the privacy of customer telephone records, and efforts to prevent the unauthorized use, disclosure, or sale of such records by data brokers. In addition, it provides a brief overview of the confidentiality protections for customer information established by the Communications Act of 1934.
Contributing Partner: UNT Libraries Government Documents Department
Data Security: Protecting the Privacy of Phone Records

Data Security: Protecting the Privacy of Phone Records

Date: February 28, 2006
Creator: Stevens, Gina Marie & Rainson, Tara Alexandra
Description: This report discusses recent legislative and regulatory efforts to protect the privacy of customer telephone records, and efforts to prevent the unauthorized use, disclosure, or sale of such records by data brokers. In addition, it provides a brief overview of the confidentiality protections for customer information established by the Communications Act of 1934.
Contributing Partner: UNT Libraries Government Documents Department