Congressional Research Service Reports - 404 Matching Results

Search Results

Court-Ordered Access to Smart Phones: In Brief

Description: This report specifically examines certain encryption issues that have been raised in the investigation of the December 2, 2015, terrorist attack in San Bernardino, CA. This report highlights certain issues that policymakers may examine as they follow the ongoing dispute between law enforcement and technology companies, and it focuses on questions related to the government's request.
Date: February 23, 2016
Creator: Finklea, Kristin; Thompson, Richard M., II & Jaikaran, Chris
Partner: UNT Libraries Government Documents Department

Cyber Intrusion into U.S. Office of Personnel Management: In Brief

Description: This report provides an overview of the current understanding of the recent U.S. Office of Personnel Management (OPM) breaches, which may have compromised personal information of former and current federal employees. It also discusses issues and questions raised about the source of the breaches, possible uses of the information exfiltrated, potential national security ramifications, and implications for the cybersecurity of federal information systems.
Date: July 17, 2015
Creator: Finklea, Kristin; Christensen, Michelle D.; Fischer, Eric A.; Lawrence, Susan V. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Cyber Operations in DOD Policy and Plans: Issues for Congress

Description: This report presents an overview of the threat landscape in cyberspace, including the types of offensive weapons available, the targets they are designed to attack, and the types of actors carrying out the attacks. It presents a picture of what kinds of offensive and defensive tools exist and a brief overview of recent attacks. The report then describes the current status of U.S. capabilities, and the national and international authorities under which the U.S. Department of Defense carries out cyber operations.
Date: January 5, 2014
Creator: Theohary, Catherine A. & Harrington, Anne I.
Partner: UNT Libraries Government Documents Department

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act.
Date: December 27, 2010
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report discusses the concept of cybercrime and related cyber threats such as cyber espionage and cyber warfare, and questions whether--and under what circumstances--clear distinctions between the various threats should be delineated. It also outlines how current federal strategies may address cybercrime, including issues surrounding the measurement and tracking of cybercrime.
Date: January 15, 2015
Creator: Finklea, Kristin & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: May 23, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: July 20, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Description: This report compares provisions in two bills in the House of Representatives that address information sharing and related activities in cybersecurity. Both bills focus on information sharing among private entities and between them and the federal government.
Date: June 18, 2015
Creator: Fischer, Eric A. & Logan, Stephanie M.
Partner: UNT Libraries Government Documents Department

Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Description: This report compares provisions in two bills in the House of Representatives that address information sharing and related activities in cybersecurity. This report consists of an overview of those and other legislative proposals on information sharing, along with selected associated issues, followed by a side-by-side analysis of the two House bills as passed.
Date: June 4, 2015
Creator: Fischer, Eric A. & Logan, Stephanie M.
Partner: UNT Libraries Government Documents Department

Cybersecurity and Information Sharing: Comparison of Legislative Proposals in the 114th Congress

Description: This report compares two House bills and one Senate bill that address information sharing and related activities in cybersecurity. The report consists of an overview of those and other legislative proposals on information sharing, along with selected associated issues, followed by a side-by-side analysis of the National Cybersecurity Protection Advancement Act of 2015 (NCPAA), the Protecting Cyber Networks Act (PCNA), and the Cybersecurity Information Sharing Act of 2015 (CISA).
Date: June 18, 2015
Creator: Fischer, Eric A. & Logan, Stephanie M.
Partner: UNT Libraries Government Documents Department

Cybersecurity and Information Sharing: Legal Challenges and Solutions

Description: While considerable debate exists with regard to the best strategies for protecting America’s various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely exchange of cyber-threat intelligence both within the private sector and between the private sector and the government. This report examines the various legal issues that arise with respect to the sharing of cybersecurity intelligence, with a special focus on two distinct concepts: (1) sharing of cyberinformation within the government’s possession and (2) sharing of cyber-information within the possession of the private sector.
Date: March 16, 2015
Creator: Nolan, Andrew
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: March 8, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: March 20, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: May 22, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: January 17, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: April 17, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: May 24, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department