Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

Big Data in U.S. Agriculture

Description: This report discusses big data within the context of agriculture. Many observers predict that the growth of big data will bring positive benefits through enhanced production, resource efficiency, and improved adaptation to climate change. While lauded for its potentially revolutionary applications, big data is not without issues. From a policy perspective, issues related to big data involve nearly every stage of its existence, including its collection (how it is captured), management (how it is stored and managed), and use (how it is analyzed and used). It is still unclear how big data will progress within agriculture due to technical and policy challenges, such as privacy and security, for producers and policymakers. As Congress follows the issue, a number of questions may arise, including a principal one--what is the federal role?
Date: January 6, 2016
Creator: Stubbs, Megan
Item Type: Report
Partner: UNT Libraries Government Documents Department

Border Searches of Laptop Computers and Other Electronic Storage Devices

Description: This report discusses a developing issue in the law of search and seizure: whether the Fourth Amendment of the U.S. Constitution permits warrantless searches of the content of laptop computers and other electronic storage devices at U.S. borders. The federal courts that have addressed this issue have held that the border search exception to the Fourth Amendment applies to these searches, making warrantless searches permissible.
Date: July 28, 2009
Creator: Kim, Yule
Item Type: Report
Partner: UNT Libraries Government Documents Department

Border Searches of Laptop Computers and Other Electronic Storage Devices

Description: This report discusses a developing issue in the law of search and seizure: whether the Fourth Amendment of the U.S. Constitution permits warrantless searches of the content of laptop computers and other electronic storage devices at U.S. borders. The federal courts that have addressed this issue have held that the border search exception to the Fourth Amendment applies to these searches, making warrantless searches permissible.
Date: November 17, 2008
Creator: Kim, Yule & Henning, Anna C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a "digital divide" in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the "digital divide," and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive.
Date: September 23, 2010
Creator: Kruger, Lennard G. & Gilroy, Angele A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: The "digital divide" is a term used to describe a perceived gap between "information haves and have-nots," or in other words, between those Americans who use or have access to telecommunications and information technologies and those who do not. Whether or not individuals or communities fall into the "information haves" category depends on a number of factors, ranging from the presence of computers in the home, to training and education, to the availability of affordable Internet access.
Date: April 12, 2011
Creator: Kruger, Lennard G. & Gilroy, Angele A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: Report that provides an overview of the "digital divide", which is a term used to describe a perceived gap between those Americans who use or have access to telecommunications and information technologies and those who do not.
Date: July 17, 2013
Creator: Kruger, Lennard G. & Gilroy, Angele A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: This report provides an overview of the "digital divide", which is a term used to describe a perceived gap between those Americans who use or have access to telecommunications and information technologies and those who do not.
Date: March 19, 2009
Creator: Kruger, Lennard G. & Gilroy, Angele A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: This report provides an overview of the "digital divide", which is a term used to describe a perceived gap between those Americans who use or have access to telecommunications and information technologies and those who do not.
Date: February 2, 2005
Creator: Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: This report discusses the "digital divide," a term that has been used to characterize a gap between those Americans who use or have access to telecommunications technologies (e.g., telephones, computers, the Internet) and those who do not. It particularly discusses one important subset of the digital divide debate concerns high speed Internet access or broadband.
Date: October 31, 2006
Creator: Kruger, Lennard G. & Gilroy, Angele A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: This report examines issues regarding broadband access in the U.S., more specifically the "digital divide,” which is a term that has been used to characterize a gap between “information haves and have-nots,” or in other words, between those Americans who use or have access to telecommunications technologies (e.g., telephones, computers, the Internet) and those who do not.
Date: March 14, 2007
Creator: Kruger, Lennard G. & Gilroy, Angele A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: This report provides an overview of the "digital divide," which is a term used to describe a perceived gap between those Americans who use or have access to telecommunications and information technologies and those who do not.
Date: December 28, 2016
Creator: Kruger, Lennard G. & Gilroy, Angele A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Regulation and Access: Background and Issues

Description: This report discusses broadband Internet, examining what it is and the various technologies that allow for its transmission. Broadband or high-speed Internet access is provided by technologies that give users the ability to send and receive data at volumes and speeds far greater than access over traditional telephone lines; it also provides a continuous, "always on" connection (no need to dial-up) and a "twoway" capability, that is, the ability to both receive (download) and transmit (upload) data at high speeds.
Date: June 14, 2006
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Regulation and Access: Background and Issues

Description: This is one part in the series of reports that provide a background and analysis, and most recent developments regarding broadband or high-speed Internet access. The report starts out by answering questions; what is broadband and why is it important? This report also discusses broadband technologies, the status of broadband deployment and the related policy issues, as well as the legislation in congress.
Date: May 27, 2008
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Regulation and Access: Background and Issues

Description: This is one part in the series of reports that provide a background and analysis, and most recent developments regarding broadband or high-speed Internet access. The report starts out by answering questions; what is broadband and why is it important? This report also discusses broadband technologies, the status of broadband deployment and the related policy issues, as well as the legislation in congress.
Date: July 31, 2007
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Regulation and Access: Background and Issues

Description: This report discusses broadband Internet, examining what it is and the various technologies that allow for its transmission. Broadband or high-speed Internet access is provided by technologies that give users the ability to send and receive data at volumes and speeds far greater than access over traditional telephone lines; it also provides a continuous, "always on" connection (no need to dial-up) and a "two-way" capability, that is, the ability to both receive (download) and transmit (upload) data at high speeds.
Date: May 29, 2007
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Description: This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs.
Date: August 28, 2014
Creator: James, Nathan
Item Type: Report
Partner: UNT Libraries Government Documents Department

Clean Energy Standard: Potential Qualifying Energy Sources

Description: This report begins with a brief examination of clean energy, renewable energy, and alternative energy. It then presents possible selection criteria Congress could use to determine which sources could be eligible for a CES depending on the goal(s) of the CES. The report provides an overview of the energy sources most commonly discussed as potential CES qualifying sources: biomass, fossil fuels (natural gas combined-cycle and coal-fired power plants with carbon capture and sequestration), geothermal resources, nuclear, solar, water, and wind. The report describes where each source can be found in the United States, the estimated quantity available for electricity generation, technologies used to create electricity from the source, advantages and disadvantages of using the source for electricity generation, and policy implications should the source be included in a CES.5 The report also contains a section on energy efficiency and its potential inclusion in a CES.
Date: May 3, 2011
Creator: Bracmort, Kelsi; Folger, Peter; Holt, Mark; Ratner, Michael & Sissine, Fred
Item Type: Report
Partner: UNT Libraries Government Documents Department

Cloud Computing: Constitutional and Statutory Privacy Protections

Description: This report first describes cloud computing and how it differs from traditional computing. It then describes how the Fourth Amendment and federal electronic privacy statutes apply to communications in the physical world, to Internet communications generally, and specifically to the cloud. Finally, this report surveys recent legislation and other various proposals designed to update the existing statutory framework.
Date: March 22, 2013
Creator: Thompson, Richard M., II
Item Type: Report
Partner: UNT Libraries Government Documents Department

Court-Ordered Access to Smart Phones: In Brief

Description: This report specifically examines certain encryption issues that have been raised in the investigation of the December 2, 2015, terrorist attack in San Bernardino, CA. This report highlights certain issues that policymakers may examine as they follow the ongoing dispute between law enforcement and technology companies, and it focuses on questions related to the government's request.
Date: February 23, 2016
Creator: Finklea, Kristin; Thompson, Richard M., II & Jaikaran, Chris
Item Type: Report
Partner: UNT Libraries Government Documents Department

Cyber Intrusion into U.S. Office of Personnel Management: In Brief

Description: This report provides an overview of the current understanding of the recent U.S. Office of Personnel Management (OPM) breaches, which may have compromised personal information of former and current federal employees. It also discusses issues and questions raised about the source of the breaches, possible uses of the information exfiltrated, potential national security ramifications, and implications for the cybersecurity of federal information systems.
Date: July 17, 2015
Creator: Finklea, Kristin; Christensen, Michelle D.; Fischer, Eric A.; Lawrence, Susan V. & Theohary, Catherine A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Cyber Operations in DOD Policy and Plans: Issues for Congress

Description: This report presents an overview of the threat landscape in cyberspace, including the types of offensive weapons available, the targets they are designed to attack, and the types of actors carrying out the attacks. It presents a picture of what kinds of offensive and defensive tools exist and a brief overview of recent attacks. The report then describes the current status of U.S. capabilities, and the national and international authorities under which the U.S. Department of Defense carries out cyber operations.
Date: January 5, 2014
Creator: Theohary, Catherine A. & Harrington, Anne I.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Item Type: Report
Partner: UNT Libraries Government Documents Department