Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: May 3, 2004
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives

Description: This report provides a short summary of selected federal laws, executive orders, and presidential directives, currently in force, that govern computer security. The report focuses on the major roles and responsibilities assigned various federal agencies in the area of computer security.
Date: April 16, 2004
Creator: Moteff, John D.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Internet Commerce and State Sales and Use Taxes

Description: State governments rely on sales and use taxes for approximately one-third (33.6%) of their total tax revenue - or approximately $179 billion in FY2002 .' Local governments derived 12.4% of their tax revenue or $44 .1 billion from local sales and use taxes in FY20012 Both state and local sales taxes are collected by vendors at the time of transaction and are levied at a percentage of a product's retail price. Alternatively, use taxes are not collected by the vendor if the vendor does not have nexus (loosely defined as a physical presence) in the consumer's state . Consumers are required to remit use taxes to their taxing jurisdiction . However, compliance with this requirement is quite low. Because of the low compliance, many observers suggest that the expansion of the internet as a means of transacting business across state lines, both from business to consumer (B to C) and from business to business (B to B), threatens to diminish the ability of state and local governments to collect sales and use taxes . Congress has a role in this issue because commerce between parties in different states conducted over the Internet falls under the Commerce Clause of the Constitution.' Congress can either take an active or passive role in the "Internet tax" debate. This report intends to clarify important issues in the Internet tax debate .
Date: March 31, 2004
Creator: Maguire, Steven
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access: Background and Issues

Description: From a public policy perspective, the goals are to ensure that broadband deployment is timely, that industry competes fairly, and that service is provided to all sectors and geographical locations of American society. The federal government -- through Congress and the Federal Communications Commission (FCC) -- is seeking to ensure fair competition among the players so that broadband will be available and affordable in a timely manner to all Americans who want it. While the FCC's position is not to intervene at this time, some assert that legislation is necessary to ensure fair competition and timely broadband deployment. One proposal would ease certain legal restrictions and requirements, imposed by the Telecommunications Act of 1996, on incumbent telephone companies who provide high speed data (broadband) access. Another proposal would compel cable companies to provide "open access" to competing Internet service providers.
Date: March 29, 2004
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a “digital divide” in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the “digital divide,” and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive.
Date: March 11, 2004
Creator: Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. On December 16, President Bush signed into law S. 877, the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act. The law, P.L. 108-187, went into effect on January 1, 2004.
Date: January 30, 2004
Creator: Smith, Marcia S.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Dual-Use Biological Equipment: Difficulties in Domestic Regulation

Description: A question in the current debate over chemical and biological terrorism is: how well do current United States policies limit opportunities to terrorist groups for acquisition of such weapons? The domestic purchase and use of “dual-use” biological equipment, such as fermenters, centrifuges, and other equipment, is one area suggested as potentially providing opportunities for terrorist, biological weapons development. Dual-use equipment has both legitimate civilian and military use. Regulating international sale of dual-use equipment is used as a nonproliferation policy tool. Similar regulation of domestic sales has not been employed. This report will discuss the difficulties of applying domestic controls on dual-use biological equipment and the potential advantages and disadvantages of doing so.
Date: January 22, 2004
Creator: Shea, Dana A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access: Background and Issues

Description: From a public policy perspective, the goals are to ensure that broadband deployment is timely, that industry competes fairly, and that service is provided to all sectors and geographical locations of American society. The federal government -- through Congress and the Federal Communications Commission (FCC) -- is seeking to ensure fair competition among the players so that broadband will be available and affordable in a timely manner to all Americans who want it. While the FCC's position is not to intervene at this time, some assert that legislation is necessary to ensure fair competition and timely broadband deployment. One proposal would ease certain legal restrictions and requirements, imposed by the Telecommunications Act of 1996, on incumbent telephone companies who provide high speed data (broadband) access. Another proposal would compel cable companies to provide "open access" to competing Internet service providers.
Date: January 21, 2004
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Election Reform and Electronic Voting Systems (DREs): Analysis of Security Issues

Description: This report discusses several questions about voting-system security. To address these questions, this report begins with a description of the historical and policy context of the controversy. That is followed by an analysis of the issues in the broader context of computer security. The next section discusses several proposals that have been made for addressing those issues, and the last section discusses options for action that might be considered by policymakers.
Date: November 4, 2003
Creator: Fischer, Eric A
Item Type: Report
Partner: UNT Libraries Government Documents Department

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Date: October 17, 2003
Creator: Wilson, Clay
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access: Background and Issues

Description: From a public policy perspective, the goals are to ensure that broadband deployment is timely, that industry competes fairly, and that service is provided to all sectors and geographical locations of American society. The federal government -- through Congress and the Federal Communications Commission (FCC) -- is seeking to ensure fair competition among the players so that broadband will be available and affordable in a timely manner to all Americans who want it. While the FCC's position is not to intervene at this time, some assert that legislation is necessary to ensure fair competition and timely broadband deployment. One proposal would ease certain legal restrictions and requirements, imposed by the Telecommunications Act of 1996, on incumbent telephone companies who provide high speed data (broadband) access. Another proposal would compel cable companies to provide "open access" to competing Internet service providers.
Date: October 10, 2003
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

China: Possible Missile Technology Transfers under U.S. Satellite Export Policy - Actions and Chronology

Description: This CRS Report discusses security concerns, significant congressional and administration action, and a comprehensive chronology pertaining to satellite exports to the PRC. The report discusses issues for U.S. foreign and security policy (including that on China and weapons nonproliferation), such as: What are the benefits and costs of satellite exports to China for U.S. economic and security interests? Should the United States continue, change, or cease the policy in place since the Reagan Administration that has allowed exports of satellites to China (for its launch and – increasingly – for its use)? Etc.
Date: October 6, 2003
Creator: Kan, Shirley A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. While 36 states have anti-spam laws, there is no federal law specifically concerning spam. Nine “antispam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), H.R. 2515 (Wilson-Green), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327 (Corzine). Two (S. 877 and S. 1293) have been reported from committee. Tables providing brief “side-by-side” comparisons of the bills are included at the end of this report.
Date: October 6, 2003
Creator: Smith, Marcia S.
Item Type: Report
Partner: UNT Libraries Government Documents Department