Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Description: This report provides an overview of the perennial issue involving technology outpacing law enforcement and discusses how policy makers and law enforcement officials have dealt with this issue in the past. It discusses the current debate surrounding smartphone data encryption and how this may impact U.S. law enforcement operations. The report also discusses existing law enforcement capabilities, the debate over whether law enforcement is "going dark" because of rapid technological advances, and resulting issues that policy makers may consider.
Date: September 8, 2015
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

Unmanned Aircraft Systems (UAS): Commercial Outlook for a New Industry

Description: This report discusses unmanned aircraft systems (UAS)--commonly referred to as drones-- which have become a staple of U.S. military reconnaissance and weapons delivery in overseas war zones such as Afghanistan. Now some new technologies and pending federal regulations are enabling the manufacture and use of UAS in domestic commerce, giving rise to a growing commercial UAS industry.
Date: September 9, 2015
Creator: Canis, Bill
Partner: UNT Libraries Government Documents Department

OPM Data Breach: Personnel Security Background Investigation Data

Description: This report provides information on the types of data that may be collected in a typical personnel security background investigation. In a July 9, 2015, news release on the cyber-intrusions of its systems, OPM "concluded with high confidence that sensitive information, including the Social Security Numbers (SSNs) of 21.5 million individuals, was stolen from the background investigation databases." This report is not an official statement of the data that was compromised in the OPM breach.
Date: July 24, 2015
Creator: Christensen, Michelle D.
Partner: UNT Libraries Government Documents Department

Policy Implications of the Internet of Things

Description: This report briefly discusses the Internet of Things (IoT), which is an umbrella term that many policymakers use to refer to the technologies and network structures that interconnect objects, humans, and animals to collect and analyze data and manage processes.
Date: August 25, 2015
Creator: Moore, Linda K.
Partner: UNT Libraries Government Documents Department

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Description: This report provides links to cybersecurity committee hearings and legislation from the 112th, 113th, and 114th Congresses, as well as a list of executive orders and presidential directives pertaining to information and computer security. Summaries of activities and findings are included as a series of tables.
Date: August 18, 2015
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cyber Intrusion into U.S. Office of Personnel Management: In Brief

Description: This report provides an overview of the current understanding of the recent U.S. Office of Personnel Management (OPM) breaches, which may have compromised personal information of former and current federal employees. It also discusses issues and questions raised about the source of the breaches, possible uses of the information exfiltrated, potential national security ramifications, and implications for the cybersecurity of federal information systems.
Date: July 17, 2015
Creator: Finklea, Kristin; Christensen, Michelle D.; Fischer, Eric A.; Lawrence, Susan V. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Cybersecurity and Information Sharing: Comparison of Legislative Proposals in the 114th Congress

Description: This report compares two House bills and one Senate bill that address information sharing and related activities in cybersecurity. The report consists of an overview of those and other legislative proposals on information sharing, along with selected associated issues, followed by a side-by-side analysis of the National Cybersecurity Protection Advancement Act of 2015 (NCPAA), the Protecting Cyber Networks Act (PCNA), and the Cybersecurity Information Sharing Act of 2015 (CISA).
Date: June 18, 2015
Creator: Fischer, Eric A. & Logan, Stephanie M.
Partner: UNT Libraries Government Documents Department

Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Description: This report compares provisions in two bills in the House of Representatives that address information sharing and related activities in cybersecurity. This report consists of an overview of those and other legislative proposals on information sharing, along with selected associated issues, followed by a side-by-side analysis of the two House bills as passed.
Date: June 4, 2015
Creator: Fischer, Eric A. & Logan, Stephanie M.
Partner: UNT Libraries Government Documents Department

Dark Web

Description: This report illuminates information on the various layers of the Internet, with a particular focus on the Dark Web. It discusses both legitimate and illicit uses of the Dark Web, including how the government may rely upon it. Throughout, the report raises issues that policy makers may consider as they explore means to curb malicious activity online.
Date: July 7, 2015
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

Protecting Civil Aviation from Cyberattacks

Description: This report briefly discusses cyber-security issues in civil aviation. unclear. A recent probe into alleged hacking incidents unfolded just weeks after the Federal Bureau of Investigation (FBI) and the Transportation Security Administration (TSA) alerted airlines to be on the lookout for passengers trying to tap into aircraft electronics and for evidence of tampering or network intrusions.
Date: June 18, 2015
Creator: Elias, Bart
Partner: UNT Libraries Government Documents Department

The Internet Tax Freedom Act: In Brief

Description: This report discusses the Internet Tax Freedom Act (ITFA; P.L. 105-277), which enacted in 1998, implemented a three-year moratorium preventing state and local governments from taxing Internet access, or imposing multiple or discriminatory taxes on electronic commerce.
Date: June 11, 2015
Creator: Stupak, Jeffrey M.
Partner: UNT Libraries Government Documents Department

A Federal Chief Technology Officer in the Obama Administration: Options and Issues for Consideration

Description: This report presents President Obama's vision for the chief technology officer (CTO) position. It also discusses the potential scope of the position's duties, articulates organizational precedents and challenges for the CTO, reviews some of the activities undertaken by Aneesh Chopra during his tenure as CTO, and identifies issues Congress may choose to consider if it opts to exert oversight or to develop legislation to create the position and/or office of the CTO.
Date: January 7, 2010
Creator: Sargent, John F., Jr.
Partner: UNT Libraries Government Documents Department

Privacy Law and Online Advertising

Description: This report will examine the application of the Electronic Communications Privacy Act and the Communications Act to online behavioral advertising in more detail. It is likely that in many cases these laws could be held to apply to such activities and that these methods of data collection would be forbidden unless consent is obtained from one of the parties to the communication.
Date: January 20, 2010
Creator: Ruane, Kathleen Ann
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Date: March 13, 2015
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department