This system will be undergoing maintenance Friday, March 31 from 9:00 AM to 10:00 AM CDT.

Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

E-Commerce Statistics: Explanation and Sources

Description: Congress will play a vital role in many e-commerce policy issues, including Internet taxation, encryption and electronic authentication (i.e., digital signatures), intellectual property protection (i.e., patent or copyright infringement), computer network security, and privacy safeguards for individuals and organizations, as well as consideration of how European Union (EU) and World Trade Organization (WTO) policies may affect U.S. e-commerce activities. This report addresses the complexities of measuring e-commerce growth, and provides background information on government and private firms’ methods for estimating it.
Date: June 4, 2003
Creator: Tehan, Rita
Item Type: Report
Partner: UNT Libraries Government Documents Department

Election Reform and Electronic Voting Systems (DREs): Analysis of Security Issues

Description: This report discusses several questions about voting-system security. To address these questions, this report begins with a description of the historical and policy context of the controversy. That is followed by an analysis of the issues in the broader context of computer security. The next section discusses several proposals that have been made for addressing those issues, and the last section discusses options for action that might be considered by policymakers.
Date: November 4, 2003
Creator: Fischer, Eric A
Item Type: Report
Partner: UNT Libraries Government Documents Department

Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress

Description: Programs for implementing network-centric warfare (NCW) in the Navy include the Cooperative Engagement Capability (CEC), the IT-21 program, and FORCEnet. A related program is the Navy-Marine Corps Intranet (NMCI). Congress has expressed concern for some of these programs, particularly NMCI.
Date: May 30, 2006
Creator: O'Rourke, Ronald
Item Type: Report
Partner: UNT Libraries Government Documents Department

Access to Broadband Networks

Description: The purpose of this report is to provide a more concrete discussion of access to wireline broadband networks. To that end, this report provides a discussion of what broadband networks look like; how both consumers and independent applications providers gain access to these networks; and the parameters available to network providers (such as their choices about network architecture, overall bandwidth capacity, bandwidth reserved for their own use, traffic prioritization, the terms and rates for access to their networks and for their retail services) that can affect end users’ and independent applications providers’ access to those networks.
Date: June 29, 2006
Creator: Goldfarb, Charles B.
Item Type: Report
Partner: UNT Libraries Government Documents Department

The Advanced Technology Program

Description: The Advanced Technology Program (ATP) was created by P.L. 100-418, the Omnibus Trade and Competitiveness Act of 1988, to encourage public-private cooperation in the development of pre-competitive technologies with broad application across industries. This activity has been targeted for elimination as a means to cut federal spending. Since FY2000, the original House-passed appropriation bills have not included funding for ATP. Many of the Administration’s budget requests have proposed termination of the program. However, ATP continues to be supported, although at levels below that achieved in FY1995 when the activity was expanded significantly. This report discusses funding (or lack thereof) appropriated for the ATP for FY2006.
Date: July 6, 2005
Creator: Schacht, Wendy H.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Cybercrime: The Council of Europe Convention

Description: Forty-three countries, including the United States, have signed the Council of Europe’s Convention on Cybercrime of November 2001. The U.S. Senate ratified the Convention on August 3, 2006. The Convention seeks to better combat cybercrime by harmonizing national laws, improving investigative abilities, and boosting international cooperation. Supporters argue that the Convention will enhance deterrence, while critics counter it will have little effect without participation by countries in which cybercriminals operate freely. Others warn it will endanger privacy and civil liberties.
Date: September 28, 2006
Creator: Archick, Kristin
Item Type: Report
Partner: UNT Libraries Government Documents Department

Cybercrime: The Council of Europe Convention

Description: Forty-three countries, including the United States, have signed the Council of Europe’s Convention on Cybercrime of November 2001. The U.S. Senate ratified the Convention on August 3, 2006. The Convention seeks to better combat cybercrime by harmonizing national laws, improving investigative abilities, and boosting international cooperation. Supporters argue that the Convention will enhance deterrence, while critics counter it will have little effect without participation by countries in which cybercriminals operate freely. Others warn it will endanger privacy and civil liberties.
Date: April 26, 2002
Creator: Archick, Kristin
Item Type: Report
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: October 1, 2002
Creator: Shea, Dana A
Item Type: Report
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: February 21, 2003
Creator: Shea, Dana A
Item Type: Report
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: April 23, 2003
Creator: Shea, Dana A
Item Type: Report
Partner: UNT Libraries Government Documents Department

Critical Infrastructure: Control Systems and the Terrorist Threat

Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Date: July 14, 2003
Creator: Shea, Dana A
Item Type: Report
Partner: UNT Libraries Government Documents Department

Constitutionality of Requiring Sexually Explicit Material on the Internet to be Under a Separate Domain Name

Description: It is unclear whether making a “.xxx” domain mandatory would violate the First Amendment. Some propose making use of a “.xxx” domain voluntary, but others propose that Congress make it mandatory. The latter proposal raises the question whether a mandatory separate domain would violate the First Amendment, and this report focuses on that question.
Date: January 3, 2006
Creator: Cohen, Henry
Item Type: Report
Partner: UNT Libraries Government Documents Department