Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

Cybersecurity: Overview Reports and Links to Government, News, and Related Resources

Description: This report directs the reader to authoritative sources that address many of the most prominent issues related to cybersecurity. Included in the reports are resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources.
Date: March 2, 2016
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Court-Ordered Access to Smart Phones: In Brief

Description: This report specifically examines certain encryption issues that have been raised in the investigation of the December 2, 2015, terrorist attack in San Bernardino, CA. This report highlights certain issues that policymakers may examine as they follow the ongoing dispute between law enforcement and technology companies, and it focuses on questions related to the government's request.
Date: February 23, 2016
Creator: Finklea, Kristin; Thompson, Richard M., II & Jaikaran, Chris
Partner: UNT Libraries Government Documents Department

Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Description: This report provides an overview of the perennial issue involving technology outpacing law enforcement and discusses how policy makers and law enforcement officials have dealt with this issue in the past. It also outlines the current debate surrounding smartphone data encryption and how this may impact U.S. law enforcement operations, as well as existing law enforcement capabilities, the debate over whether law enforcement is "going dark" because of rapid technological advances, and resulting issues that policy makers may consider.
Date: February 18, 2016
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. Support of IT R&D began because the government had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Date: February 16, 2016
Creator: Moloney Figliola, Patricia
Partner: UNT Libraries Government Documents Department

Renewed Crypto Wars?

Description: This report briefly examines renewed tensions between tech companies and the government regarding encryption "back doors" and how quickly-advancing technologies could impact law enforcement investigations.
Date: February 9, 2016
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

The Federal Cybersecurity Workforce: Background and Congressional Oversight Issues for the Departments of Defense and Homeland Security

Description: This report examines congressional oversight of two strategies undertaken by Congress and the executive branch to strengthen the federal cybersecurity workforce: initiatives to define and identify the federal cybersecurity workforce, and hiring and pay flexibilities applicable to cybersecurity positions at the Department of Defense (DOD) and the Department of Homeland Security (DHS).
Date: January 8, 2016
Creator: Francis, Kathryn A. & Ginsberg, Wendy
Partner: UNT Libraries Government Documents Department

Big Data in U.S. Agriculture

Description: This report discusses big data within the context of agriculture. Many observers predict that the growth of big data will bring positive benefits through enhanced production, resource efficiency, and improved adaptation to climate change. While lauded for its potentially revolutionary applications, big data is not without issues. From a policy perspective, issues related to big data involve nearly every stage of its existence, including its collection (how it is captured), management (how it is stored and managed), and use (how it is analyzed and used). It is still unclear how big data will progress within agriculture due to technical and policy challenges, such as privacy and security, for producers and policymakers. As Congress follows the issue, a number of questions may arise, including a principal one--what is the federal role?
Date: January 6, 2016
Creator: Stubbs, Megan
Partner: UNT Libraries Government Documents Department

Using Data to Improve Defense Acquisitions: Background, Analysis, and Questions for Congress

Description: This report examines (1) the extent to which the Department of Defense (DOD) effectively uses data to inform decisionmaking, (2) some of the critical elements needed for DOD to use data more effectively, (3) recent efforts to improve DOD's use of data, and (4) potential questions for Congress. This report focuses primarily (but not exclusively) on defense acquisitions as a case study.
Date: January 5, 2016
Creator: Schwartz, Moshe
Partner: UNT Libraries Government Documents Department

Data Security and Breach Notification Legislation: Selected Legal Issues

Description: This report describes the common elements of several data security and breach notification bills that have been introduced in the 114th Congress, which broadly would impose security and notification requirements on businesses regardless of industry sector. It also discusses state laws that may apply in the event of a data breach and addresses two legal issues that may arise in consideration of new legislation about data security and breach notification.
Date: December 28, 2015
Creator: Dolan, Alissa M.
Partner: UNT Libraries Government Documents Department

The EU-U.S. Safe Harbor Agreement on Personal Data Privacy: In Brief

Description: This report discusses a recent judgement by the Court of Justice of the European Union (CJEU) that invalidates the Safe Harbor Agreement between the United States and the 28-member European Union (EU). Safe Harbor is a 15-year-old accord, under which personal data could legally be transferred between EU member countries and the United States.
Date: October 29, 2015
Creator: Weiss, Martin A.
Partner: UNT Libraries Government Documents Department

U.S.-China Cyber Agreement

Description: During the state visit on September 24-25, 2015, President Xi Jinping of China and President Barack Obama reached a Cyber Agreement. This report briefly discusses that agreement.
Date: October 16, 2015
Creator: Rollins, John W.; Lawrence, Susan V.; Rennack, Dianne E. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

The Internet Tax Freedom Act: In Brief

Description: This report discusses the Internet Tax Freedom Act (ITFA; P.L. 105-277), which enacted in 1998, implemented a three-year moratorium preventing state and local governments from taxing Internet access, or imposing multiple or discriminatory taxes on electronic commerce.
Date: October 5, 2015
Creator: Stupak, Jeffrey M.
Partner: UNT Libraries Government Documents Department

Unmanned Aircraft Systems (UAS): Commercial Outlook for a New Industry

Description: This report discusses unmanned aircraft systems (UAS)--commonly referred to as drones-- which have become a staple of U.S. military reconnaissance and weapons delivery in overseas war zones such as Afghanistan. Now some new technologies and pending federal regulations are enabling the manufacture and use of UAS in domestic commerce, giving rise to a growing commercial UAS industry.
Date: September 9, 2015
Creator: Canis, Bill
Partner: UNT Libraries Government Documents Department

Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Description: This report provides an overview of the perennial issue involving technology outpacing law enforcement and discusses how policy makers and law enforcement officials have dealt with this issue in the past. It discusses the current debate surrounding smartphone data encryption and how this may impact U.S. law enforcement operations. The report also discusses existing law enforcement capabilities, the debate over whether law enforcement is "going dark" because of rapid technological advances, and resulting issues that policy makers may consider.
Date: September 8, 2015
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

Policy Implications of the Internet of Things

Description: This report briefly discusses the Internet of Things (IoT), which is an umbrella term that many policymakers use to refer to the technologies and network structures that interconnect objects, humans, and animals to collect and analyze data and manage processes.
Date: August 25, 2015
Creator: Moore, Linda K.
Partner: UNT Libraries Government Documents Department

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Description: This report provides links to cybersecurity committee hearings and legislation from the 112th, 113th, and 114th Congresses, as well as a list of executive orders and presidential directives pertaining to information and computer security. Summaries of activities and findings are included as a series of tables.
Date: August 18, 2015
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. Support of IT R&D began because the government had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Date: August 3, 2015
Creator: Moloney Figliola, Patricia
Partner: UNT Libraries Government Documents Department