Search Results

Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs
No Description Available.
Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs
No Description Available.
Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview
This report assesses the impact of September 11, 2001 attack on public and private information infrastructures in the context of critical infrastructure protection,continuity of operation (COP) and homeland security.
China/Asia Broadcasting: Proposals for New U.S. Surrogate Services
Two groups -- the President's Task Force on U.S. International Broadcasting (December 1991) and the Commission on Broadcasting to the People's Republic of China (September 1992) -- have both recommended that the United States increase broadcasting to China and other Communist countries in Asia, although the panels split on significant points for implementing their recommendations
Radio Free Asia
No Description Available.
Military Role in Space Control: A Primer
No Description Available.
Satellite Television: Provisions of SHVIA and LOCAL, and Continuing Issues
No Description Available.
Satellite Television: Provisions of SHVIA and LOCAL, and Continuing Issues
No Description Available.
Satellite Television: Provisions of SHVIA and LOCAL, and Continuing Issues
No Description Available.
Satellite Television: Provisions of SHVIA and LOCAL, and Continuing Issues
No Description Available.
Satellite Television: Provisions of SHVIA and LOCAL, and Continuing Issues
No Description Available.
Satellite Television: Provisions of SHVIA and LOCAL, and Continuing Issues
No Description Available.
Emergency Communications: Meeting Public Safety Spectrum Needs
This report has two main sections. In the first section “Identifying Public Safety Needs,” some of the organizations involved with public safety telecommunications are introduced, and key activities dealing with wireless and spectrum issues are summarized. The second main section, “Spectrum for Public Safety,” is organized by the major spectrum bands where public safety wireless communications are in use or planned. These are at: 100-512 MHz; 700 MHz; 800 MHz; 900 MHz and 4.9 GHz. Ultra-wide band (UWB), that broadcasts across a broad range of frequencies, is also discussed. The final section of this report recaps recent activities and legislation in the 107th and 108th Congresses regarding public safety and spectrum use.
Emergency Communications: Meeting Public Safety Spectrum Needs
This report has two main sections. In the first section “Identifying Public Safety Needs,” some of the organizations involved with public safety telecommunications are introduced, and key activities dealing with wireless and spectrum issues are summarized. The second main section, “Spectrum for Public Safety,” is organized by the major spectrum bands where public safety wireless communications are in use or planned. These are at: 100-512 MHz; 700 MHz; 800 MHz; 900 MHz and 4.9 GHz. Ultra-wide band (UWB), that broadcasts across a broad range of frequencies, is also discussed. The final section of this report recaps recent activities and legislation in the 107th and 108th Congresses regarding public safety and spectrum use.
Meeting Public Safety Spectrum Needs
No Description Available.
Meeting Public Safety Spectrum Needs
No Description Available.
Meeting Public Safety Spectrum Needs
No Description Available.
Telephone Excise Tax
No Description Available.
The Telephone Excise Tax: Revenues, Effects, and Repeal Proposals
No Description Available.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. While 33 states have anti-spam laws, there is no federal law. Six bills addressing the spam issue are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), and S. 1231 (Schumer). Spam on wireless devices such as cell phones is discussed in CRS Report RL31636, Wireless Privacy: Availability of Location Information for Telemarketing.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. While 34 states have anti-spam laws, there is no federal law specifically concerning spam. Nine “antispam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), H.R. 2515 (Wilson), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327 (Corzine). Tables providing brief “side-by-side” comparisons of the bills are included in this report.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. While 34 states have anti-spam laws, there is no federal law specifically concerning spam. Nine “antispam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), H.R. 2515 (Wilson), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327 (Corzine). Tables providing brief “side-by-side” comparisons of the bills are included at the end of this report.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
No Description Available.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. While 36 states have anti-spam laws, there is no federal law specifically concerning spam. Nine “antispam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), H.R. 2515 (Wilson-Green), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327 (Corzine). Two (S. 877 and S. 1293) have been reported from committee. Tables providing brief “side-by-side” comparisons of the bills are included at the end of this report.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. On December 16, President Bush signed into law S. 877, the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act. The law, P.L. 108-187, went into effect on January 1, 2004.
"Spam": An Overview of Issues Concerning Commercial Electronic Mail
Spam, also called unsolicited commercial email (UCE) or “junk email,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment, and that some consumers want to receive such solicitations. This report discusses this issue in detail, as well as related legislation.
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Network Centric Warfare: Background and Oversight Issues for Congress
No Description Available.
The Multi-State Anti-Terrorism Information Exchange (MATRIX) Pilot Project
No Description Available.
Creating a National Framework for Cybersecurity: An Analysis of Issues and Options
Cyber- security refers to three things: measures to protect information technology; the information it contains, processes, and transmits, and associated physical and virtual elements (which together comprise cyberspace); the degree of protection resulting from application of those measures; and the associated field of professional endeavor. This report aims to examine what kind of national cyber-security framework may be needed and how it might be implemented, and it addresses three questions: 1. Where are the major cyber-security weaknesses currently, and where might weaknesses be anticipated in the future? What are the major means of leverage for addressing those weaknesses? What roles should government and the private sector play in the use of those means of leverage to address current and potential future weaknesses?
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last two Congresses, but no bill cleared Congress. Several bills have been introduced in the 107th Congress. H.R. 718 was reported from the House Energy and Commerce Committee and the House Judiciary Committee (H. Rept. 107-41, Parts 1 and 2). The two versions are quite different. S. 630 was ordered reported from the Senate Commerce Committee.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last two Congresses, but no bill cleared Congress. Several bills have been introduced in the 107th Congress. H.R. 718 was reported from the House Energy and Commerce Committee and the House Judiciary Committee (H. Rept. 107-41, Parts 1 and 2). The two versions are quite different. S. 630 was ordered reported from the Senate Commerce Committee.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last three Congresses (105th-107th), but no federal law was enacted (27 states have anti-spam laws, however). Two bills have been introduced in the 108th Congress: S. 563 (Dayton) and S. 877 (Burns).
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of spam insist it is a legitimate marketing technique and protected by the First Amendment. While 27 states have anti-spam laws, there is no federal law. Four bills are pending in the 108th Congress: H.R. 1933, S. 563, S. 877, and S. 1052. (Spam on wireless devices such as cell phones is discussed in CRS Report RL31636.)
Third Generation ("3G") Mobile Wireless Technologies and Services
No Description Available.
How to Obtain Copies of Videotapes of Proceedings of Congress and Network and Cable Television Broadcasts
This report has been compiled in response to numerous requests made by congressional offices for videotape copies of congressional proceedings and programs from network or cable television
Radiofrequency Spectrum Management
The radio spectrum, a limited and valuable resource, is used for all forms of wireless communications including cellular telephony, paging, personal communications service, radio, and television broadcast, telephone radio relay, aeronautical and maritime radio navigation, and satellite command and control.
V-Chip and TV Ratings: Helping Parents Supervise Their Children's Television Viewing
To assist parents in supervising the television viewing habits of their children, Congress included a provision in the Telecommunications Act of 1996 (P.L. 104-104) that television sets with screens 13 inches or larger sold in the United States be equipped with a "V-chip" to screen out objectionable programming. A V-chip is a computer chip that can detect program rating information that is transmitted with the television signal (broadcast or cable) and block the display of programs designated as unacceptable by parents. The use of the V-chip by parents is optional. In March 1998, the Federal Communications Commission approved technical standards for the V-chip and directed that manufacturers include V-chip technology in at least half of their product models by July 1, 1999, and the other half by January 1, 2000. At the same time, the Commission approved a program rating system developed and now used by most of the television industry. An age-based rating system was announced in December 1996.
V-Chip and TV Ratings: Helping Parents Supervise Their Children's Television Viewing
No Description Available.
V-Chip and TV Ratings: Helping Parents Supervise Their Children's Television Viewing
No Description Available.
E-Rate for Schools: Background on Telecommunications Discounts Through the Universal Service Fund
Congressional Research Service (CRS) report entailing information about telecommunications discounts through the Universal Service Fund, in regards to E-rate for schools. Topics include, impacts on education, current level of access, available federal assistance, application and award process, etc..
Slamming: The Unauthorized Change of a Consumer's Telephone Service Provider
No Description Available.
Slamming: The Unauthorized Change of a Consumer's Telephone Service Provider
No Description Available.
Slamming: The Unauthorized Change of a Consumer's Telephone Service Provider
No Description Available.
Slamming: The Unauthorized Change of a Consumer's Telephone Service Provider
No Description Available.
Slamming: The Unauthorized Change of a Consumer's Telephone Service Provider
No Description Available.
Slamming: The Unauthorized Change of a Consumer's Telephone Service Provider
No Description Available.
Slamming: The Unauthorized Change of a Consumer's Telephone Service Provider
No Description Available.
Slamming: The Unauthorized Change of a Consumer's Telephone Service Provider
No Description Available.
Back to Top of Screen