Search Results

open access

Information Warfare: Cyberattacks on Sony

Description: This report discusses information warfare, which includes information-related capabilities to influence, disrupt, corrupt, or usurp the decision making of adversaries while protecting our own.
Date: January 30, 2015
Creator: Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Desalination and Membrane Technologies: Federal Research and Adoption Issues

Description: This report discusses emerging technologies (e.g., forward osmosis, nanocomposite and chlorine resistant membranes) that show promise for reducing desalination costs. It also discusses the research to support development of emerging technologies and to reduce desalination's environmental and social impacts.
Date: January 2, 2015
Creator: Carter, Nicole T.
Partner: UNT Libraries Government Documents Department
open access

Internet Domain Names: Background and Policy Issues

Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet.
Date: March 6, 2015
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

The Network for Manufacturing Innovation

Description: This report discusses the Revitalize American Manufacturing and Innovation Act of 2014 (RAMIA). RAMIA includes provisions authorizing the Commerce Department's National Institute of Standards and Technology (NIST), the Department of Energy, and other agencies to support the establishment of centers for manufacturing innovation, as well as establishing and providing for the operation of a Network for Manufacturing Innovation.
Date: January 8, 2015
Creator: Sargent, John F., Jr.
Partner: UNT Libraries Government Documents Department
open access

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Description: This report analyzes the sharing of cyberattack information by government with private companies, by private companies with the government, and among private companies. Sharing information with consumers is mentioned but is not the central focus of this report.
Date: February 23, 2015
Creator: Weiss, N. Eric
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: January 9, 2015
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: February 3, 2015
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report discusses the concept of cybercrime and related cyber threats such as cyber espionage and cyber warfare, and questions whether--and under what circumstances--clear distinctions between the various threats should be delineated. It also outlines how current federal strategies may address cybercrime, including issues surrounding the measurement and tracking of cybercrime.
Date: January 15, 2015
Creator: Finklea, Kristin & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Information Warfare: The Role of Social Media in Conflict

Description: This report briefly discusses the use if social media as a tool of information warfare. The ability to rapidly disseminate graphic images and ideas to shape the public narrative transforms social media into a strategic weapon in the hands of terrorists, insurgent groups, or governments engaged in conflict.
Date: March 4, 2015
Creator: Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Aereo and FilmOn X: Internet Television Streaming and Copyright Law

Description: This report begins with a discussion of the technology used by Aereo and FilmOn X that permit subscribers to watch live broadcast television as well as already-aired programming. It then examines the public performance right in the Copyright Act and discusses the interpretation of the transmit clause and public performance right by the courts in the Aereo and FilmOn cases. The report concludes with a brief overview of future litigation by these parties and related legislative proposals in the 1… more
Date: January 22, 2015
Creator: Lanza, Emily M.
Partner: UNT Libraries Government Documents Department
open access

The America COMPETES Acts: An Overview

Description: This report provides an overview of the COMPETES Acts for readers seeking background and legislative context. It includes a description and legislative history of the acts, a summary of the broad policy debate, and an examination of the implementation status of selected COMPETES-related programs and policies. This report also highlights major bills to reauthorize the COMPETES Acts from the 113th Congress.
Date: January 27, 2015
Creator: Gonzalez, Heather B.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: March 13, 2015
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Date: April 10, 2015
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department
Back to Top of Screen