The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability

The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability

Date: December 9, 2010
Creator: Kerr, Paul K.; Rollins, John & Theohary, Catherine A.
Description: In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. This report discusses this cyber attack, a malicious software program known as Stuxnet, which infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. Although early reports focused on the impact on facilities in Iran, researchers discovered that the program had spread throughout multiple countries worldwide.
Contributing Partner: UNT Libraries Government Documents Department
Spyware: Background and Policy Issues for Congress

Spyware: Background and Policy Issues for Congress

Date: September 8, 2010
Creator: Figliola, Patricia Moloney
Description: The Anti-Spyware Coalition (ASC) defines spyware as "technologies deployed without appropriate user consent and/or implemented in ways that impair user control over (1) material changes that affect their user experience, privacy, or system security; (2) use of their system resources, including what programs are installed on their computers; and/or (3) collection, use, and distribution of their personal or other sensitive information. The main issue for Congress over spyware is whether to enact new legislation specifically addressing spyware, or to rely on industry self-regulation and enforcement actions by the Federal Trade Commission (FTC) and the Department of Justice under existing law. This report discusses this issue, as well as the opinions of both the opponents and the supporters of industry self-regulation.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: April 26, 2012
Creator: Tehan, Rita
Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed.
Contributing Partner: UNT Libraries Government Documents Department
Smart Meter Data: Privacy and Cybersecurity

Smart Meter Data: Privacy and Cybersecurity

Date: February 3, 2012
Creator: Murrill, Brandon J.; Liu, Edward, C. & Thompson, Richard M., II
Description: Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. Smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. Detailed electricity usage data offers a window into the lives of people inside of a home by revealing what individual appliances they are using, and the transmission of the data potentially subjects this information to interception or theft by unauthorized third parties or hackers. Unforeseen consequences under federal law may result from the installation of smart meters and the communications technologies that accompany them. This report examines federal privacy and cybersecurity laws that may apply to consumer data collected by residential smart meters.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Date: May 23, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Contributing Partner: UNT Libraries Government Documents Department
Online Copyright Infringement and Counterfeiting: Legislation in the 112th Congress

Online Copyright Infringement and Counterfeiting: Legislation in the 112th Congress

Date: January 10, 2012
Creator: Yeh, Brian T.
Description: The global nature of the Internet offers expanded commercial opportunities for intellectual property (IP) rights holders but also increases the potential for copyright and trademark infringement. This report discusses the following recent draconian legislation in regard to this topic: the Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act (PROTECT IP Act); the Stop Online Piracy Act (SOPA); and the Online Protection and Enforcement of Digital Trade Act (OPEN Act).
Contributing Partner: UNT Libraries Government Documents Department
The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

Date: November 8, 2013
Creator: Fischer, Eric A.; Liu, Edward C.; Rollins, John W. & Theohary, Catherine A.
Description: This report provides background information regarding the threats and consequences of cybersecurity. The federal legislative framework for cybersecurity is complex, with more than 50 statutes addressing various aspects of it either directly or indirectly.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: July 24, 2012
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Contributing Partner: UNT Libraries Government Documents Department
Privacy Protections for Personal Information Online

Privacy Protections for Personal Information Online

Date: April 6, 2011
Creator: Stevens, Gina
Description: This report examines some of the efforts being made to protect of personal information, through federal laws and regulations. This report provides a brief overview of selected recent developments in the area of federal privacy law. This report does not cover workplace privacy laws or state privacy laws.
Contributing Partner: UNT Libraries Government Documents Department
Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions

Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions

Date: April 23, 2012
Creator: Fischer, Eric A.
Description: For more than a decade, various experts have expressed concerns about information-system security-often referred to as cybersecurity-in the United States and abroad. This report discusses that framework and proposals to amend more than 30 acts of Congress that are part of or relevant to it.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 3 4 5 NEXT LAST