Search Results

open access

Encryption: Selected Legal Issues

Description: This report first provides background to the ongoing encryption debate, including a primer on encryption basics and an overview of Apple, Google, and Facebook's new encryption policies. Next, it provides an overview of the Fifth Amendment right to be free from self-incrimination.
Date: March 3, 2016
Creator: Thompson, Richard M., II & Jaikaran, Chris
Partner: UNT Libraries Government Documents Department
open access

The Advocacy of Terrorism on the Internet: Freedom of Speech Issues and the Material Support Statutes

Description: This report discusses relevant precedent concerning the extent to which advocacy of terrorism may be restricted in a manner consistent with the First Amendment's Freedom of Speech Clause. The report also discusses the potential application of the federal ban on the provision of material support to foreign terrorist organizations (FTOs) to the advocacy of terrorism, including as it relates to the dissemination of such advocacy via online services like Twitter or Facebook.
Date: September 8, 2016
Creator: Ruane, Kathleen Ann
Partner: UNT Libraries Government Documents Department
open access

Vermont Utility Cybersecurity Alarm

Description: This report discusses the cyber-security alarm, which was raised after a joint report by the Federal Bureau of Investigation (FBI) and the Department of Homeland Security (DHS) urged electric utilities to search their networks for signs of an infiltration linked to a Russian hacking operation (called the Grizzly Steppe) suspected in the hack of Democratic Party servers.
Date: January 3, 2017
Creator: Campbell, Richard J.
Partner: UNT Libraries Government Documents Department
open access

Justice Department''s Role in Cyber Incident Response

Description: This report outlines the federal framework for cyber incident response, highlighting the Department of Justice's (DOJ's) role in this response. It also discusses challenges for federal law enforcement and potential policy issues for Congress.
Date: August 23, 2017
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department
open access

North Korean Cyber Capabilities: In Brief

Description: This report discusses how as North Korea has accelerated its missile and nuclear programs in spite of international sanctions, Congress and the Trump Administration have elevated North Korea to a top U.S. foreign policy priority. Legislation such as the North Korea Sanctions and Policy Enhancement Act of 2016 (P.L. 114-122) and international sanctions imposed by the United Nations Security Council have focused on North Korea's WMD and ballistic missile programs and human rights abuses. North Ko… more
Date: August 3, 2017
Creator: Chanlett-Avery, Emma; Rosen, Liana W.; Rollins, John W. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

COPA Commission

Description: The COPA Commission, a congressionally appointed panel, was mandated by the Child Online Protection Act, which was approved by Congress in October 1998. The primary purpose of the Commission is to "identify technological or other methods that will help reduce access by minors to material that is harmful to minors on the Internet."
Date: March 7, 2000
Creator: COPA Commission
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity Issues and Challenges: In Brief

Description: The information and communications technology (ICT) industry has evolved greatly over the last half century. The technology is ubiquitous and increasingly integral to almost every facet of modern society. ICT devices and components are generally interdependent, and disruption of one may affect many others. Over the past several years, experts and policy makers have expressed increasing concerns about protecting ICT systems from cyberattacks, which many experts expect to increase in frequency an… more
Date: December 16, 2014
Creator: Fischer, Eric A.
Partner: UNT Libraries Government Documents Department
open access

Information Warfare: Cyberattacks on Sony

Description: This report discusses information warfare, which includes information-related capabilities to influence, disrupt, corrupt, or usurp the decision making of adversaries while protecting our own.
Date: January 30, 2015
Creator: Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Description: This report analyzes the incentives for companies to share information about cybersecurity breaches with other companies and the federal government. Data breaches, such as those at Target, Home Depot, Neiman Marcus, and JPMorgan Chase, affecting financial records of tens of millions of households seem to occur regularly. Companies typically respond by trying to increase their cybersecurity by hiring consultants and purchasing new hardware and software. Policy analysts have suggested that sharin… more
Date: December 11, 2014
Creator: Weiss, N. Eric
Partner: UNT Libraries Government Documents Department
open access

The Target and Other Financial Data Breaches: Frequently Asked Questions

Description: This report answers some frequently asked questions about the Target and selected other data breaches, including what is known to have happened in the breach, and what costs may result. It also examines some of the broader issues common to data breaches, including how the payment system works, how cybersecurity costs are shared and allocated within the payment system, who bears the losses in such breaches more generally, what emerging cybersecurity technologies may help prevent them, and what r… more
Date: February 4, 2015
Creator: Weiss, N. E. & Miller, Rena S.
Partner: UNT Libraries Government Documents Department
open access

Anthem Data Breach: How Safe Is Health Information Under HIPAA?

Description: This report discusses the implications of the recent data breach at Anthem Inc., which raised new concerns about the vulnerability of electronic health information. Security experts question whether the Health Insurance Portability and Accountability Act (HIPAA) privacy and security standards are sufficiently protective of sensitive patient information.
Date: February 24, 2015
Creator: Redhead, C. S.
Partner: UNT Libraries Government Documents Department
open access

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Description: This report analyzes the sharing of cyberattack information by government with private companies, by private companies with the government, and among private companies. Sharing information with consumers is mentioned but is not the central focus of this report.
Date: February 23, 2015
Creator: Weiss, N. Eric
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: March 13, 2015
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

Description: The federal role in cybersecurity has been a topic of discussion and debate for over a decade. Despite significant legislative efforts in the 112th Congress on bills designed to improve the cybersecurity of U.S. critical infrastructure (CI), no legislation on that issue was enacted in that Congress. This report discusses the ramifications of Executive Order 13636, which issued in February 2013 was an attempt to enhance security and resiliency of CI through voluntary, collaborative efforts invo… more
Date: December 15, 2014
Creator: Fischer, Eric A.; Liu, Edward C.; Rollins, John W. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Cyber Operations in DOD Policy and Plans: Issues for Congress

Description: This report presents an overview of the threat landscape in cyberspace, including the types of offensive weapons available, the targets they are designed to attack, and the types of actors carrying out the attacks. It presents a picture of what kinds of offensive and defensive tools exist and a brief overview of recent attacks. The report then describes the current status of U.S. capabilities, and the national and international authorities under which the U.S. Department of Defense carries out … more
Date: January 5, 2014
Creator: Theohary, Catherine A. & Harrington, Anne I.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, … more
Date: January 17, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: January 9, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
Back to Top of Screen