Search Results

open access

Broadband Internet Regulation and Access: Background and Issues

Description: This report discusses broadband Internet, examining what it is and the various technologies that allow for its transmission. Broadband or high-speed Internet access is provided by technologies that give users the ability to send and receive data at volumes and speeds far greater than access over traditional telephone lines; it also provides a continuous, "always on" connection (no need to dial-up) and a "two-way" capability, that is, the ability to both receive (download) and transmit (upload) … more
Date: May 29, 2007
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Broadband Internet Regulation and Access: Background and Issues

Description: This report discusses broadband Internet, examining what it is and the various technologies that allow for its transmission. Broadband or high-speed Internet access is provided by technologies that give users the ability to send and receive data at volumes and speeds far greater than access over traditional telephone lines; it also provides a continuous, "always on" connection (no need to dial-up) and a "twoway" capability, that is, the ability to both receive (download) and transmit (upload) d… more
Date: June 14, 2006
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Broadband Internet Regulation and Access: Background and Issues

Description: This is one part in the series of reports that provide a background and analysis, and most recent developments regarding broadband or high-speed Internet access. The report starts out by answering questions; what is broadband and why is it important? This report also discusses broadband technologies, the status of broadband deployment and the related policy issues, as well as the legislation in congress.
Date: July 31, 2007
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Broadband Internet Regulation and Access: Background and Issues

Description: This is one part in the series of reports that provide a background and analysis, and most recent developments regarding broadband or high-speed Internet access. The report starts out by answering questions; what is broadband and why is it important? This report also discusses broadband technologies, the status of broadband deployment and the related policy issues, as well as the legislation in congress.
Date: May 27, 2008
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Description: This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs.
Date: August 28, 2014
Creator: James, Nathan
Partner: UNT Libraries Government Documents Department
open access

Clean Energy Standard: Potential Qualifying Energy Sources

Description: This report begins with a brief examination of clean energy, renewable energy, and alternative energy. It then presents possible selection criteria Congress could use to determine which sources could be eligible for a CES depending on the goal(s) of the CES. The report provides an overview of the energy sources most commonly discussed as potential CES qualifying sources: biomass, fossil fuels (natural gas combined-cycle and coal-fired power plants with carbon capture and sequestration), geother… more
Date: May 3, 2011
Creator: Bracmort, Kelsi; Folger, Peter; Holt, Mark; Ratner, Michael & Sissine, Fred
Partner: UNT Libraries Government Documents Department
open access

Cloud Computing: Constitutional and Statutory Privacy Protections

Description: This report first describes cloud computing and how it differs from traditional computing. It then describes how the Fourth Amendment and federal electronic privacy statutes apply to communications in the physical world, to Internet communications generally, and specifically to the cloud. Finally, this report surveys recent legislation and other various proposals designed to update the existing statutory framework.
Date: March 22, 2013
Creator: Thompson, Richard M., II
Partner: UNT Libraries Government Documents Department
open access

Congressional Organization for Science and Technology 92nd Congress, 1st Session: A Listing of Congressional Committees and Subcommittees Having Jurisdiction Over Scientific and Technological Activities

Description: This report is an alphabetical collection of every Senate, House, and Joint Committee that show a relation to scientific and technological matters.
Date: May 12, 1971
Creator: Ayton, Mauree V.
Partner: UNT Libraries Government Documents Department
open access

Court-Ordered Access to Smart Phones: In Brief

Description: This report specifically examines certain encryption issues that have been raised in the investigation of the December 2, 2015, terrorist attack in San Bernardino, CA. This report highlights certain issues that policymakers may examine as they follow the ongoing dispute between law enforcement and technology companies, and it focuses on questions related to the government's request.
Date: February 23, 2016
Creator: Finklea, Kristin; Thompson, Richard M., II & Jaikaran, Chris
Partner: UNT Libraries Government Documents Department
open access

Cyber Intrusion into U.S. Office of Personnel Management: In Brief

Description: This report provides an overview of the current understanding of the recent U.S. Office of Personnel Management (OPM) breaches, which may have compromised personal information of former and current federal employees. It also discusses issues and questions raised about the source of the breaches, possible uses of the information exfiltrated, potential national security ramifications, and implications for the cybersecurity of federal information systems.
Date: July 17, 2015
Creator: Finklea, Kristin; Christensen, Michelle D.; Fischer, Eric A.; Lawrence, Susan V. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Cyber Operations in DOD Policy and Plans: Issues for Congress

Description: This report presents an overview of the threat landscape in cyberspace, including the types of offensive weapons available, the targets they are designed to attack, and the types of actors carrying out the attacks. It presents a picture of what kinds of offensive and defensive tools exist and a brief overview of recent attacks. The report then describes the current status of U.S. capabilities, and the national and international authorities under which the U.S. Department of Defense carries out … more
Date: January 5, 2014
Creator: Theohary, Catherine A. & Harrington, Anne I.
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketc… more
Date: December 27, 2010
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report discusses the concept of cybercrime and related cyber threats such as cyber espionage and cyber warfare, and questions whether--and under what circumstances--clear distinctions between the various threats should be delineated. It also outlines how current federal strategies may address cybercrime, including issues surrounding the measurement and tracking of cybercrime.
Date: January 15, 2015
Creator: Finklea, Kristin & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: May 23, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: July 20, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen