Search Results

FCC Media Ownership Rules: Issues for Congress
The Federal Communications Commission adopted an order on June 2, 2003 that modified five of its media ownership rules and retained two others.1 The new rules will go into effect on September 4, 2003 – thirty days after their appearance in the Federal Register. Because of the potential that changes in these rules – which set limits on national television ownership, newspaper-broadcast and radio-television cross-ownership in a market, and ownership of multiple television or radio stations in a market – could have far-reaching effects, a number of bills have been introduced in the 108th Congress that reflect a range of positions on these issues. This report analyzes each of the areas that have changed as a result of the FCC action or may change as a result of congressional action. The various positions in the debate also are summarized.
FCC Media Ownership Rules: Issues for Congress
The Federal Communications Commission adopted an order on June 2, 2003 that modified five of its media ownership rules and retained two others. The new rules were scheduled to go into effect on September 4, 2003, but the U.S. Court of Appeals for the Third Circuit stayed implementation of the new rules pending adjudication of claims that the rules are unlawful. (Prometheus Radio Project v. FCC, 3rd Cir., No 03-3388, stay issued 9/3/03). Because of the potential that changes in these rules – which set limits on national television ownership, newspaper-broadcast and radio-television cross-ownership in a market, and ownership of multiple television or radio stations in a market – could have far-reaching effects, a number of bills have been introduced in the 108th Congress that reflect a range of positions on these issues. This report analyzes each of the areas that have changed as a result of the FCC action or may change as a result of congressional action. The various positions in the debate also are summarized.
Electronic Congress: Proposals and Issues
The events of September 11, 2001, and the subsequent anthrax incidents have prompted some observers to suggest creating a capability for a virtual or electronic Congress (e-Congress) that could function in the event of an emergency. Currently, it is unclear exactly how an e-Congress would be constituted and operated; however, a proposal (H.R. 3481) has been introduced to require the National Institute of Standards and Technology (NIST) to investigate the feasibility and costs of implementing a computer system for remote voting and communication for Congress to ensure business continuity for congressional operations.
Electronic Congress: Proposals and Issues
The events of September 11, 2001, and the subsequent anthrax incidents have prompted some observers to suggest creating a capability for a virtual or electronic Congress (e-Congress) that could function in the event of an emergency. Currently, it is unclear exactly how an e-Congress would be constituted and operated; however, a proposal (H.R. 3481) has been introduced to require the National Institute of Standards and Technology (NIST) to investigate the feasibility and costs of implementing a computer system for remote voting and communication for Congress to ensure business continuity for congressional operations.
Emergency Electronic Communications in Congress: Proposals and Issues
The events of September 11, 2001, and the subsequent anthrax incidents have prompted some observers to suggest creating an emergency electronic communications system for Congress to ensure continuity of its operations. On July 25, 2003, Representative James R. Langevin introduced H.R. 2948. The bill would direct the Comptroller General of the United States to enter into arrangements with the National Academy of Sciences (NAS) and the Librarian of Congress for conducting a study on the feasibility and costs of implementing such a system for Congress to use during an emergency.
Emergency Communications: The Emergency Alert System (EAS) and All-Hazard Warnings
The Emergency Alert System (EAS) is one of several federally managed warning systems. The Federal Emergency Management Agency (FEMA) jointly administers EAS with the Federal Communications Commission (FCC), in cooperation with the National Weather Service (NWS), an organization within the National Oceanic and Atmospheric Administration (NOAA). The NOAA/NWS weather radio system has been upgraded to an all-hazard warning capability. This report summarizes the technology and administration of EAS and the NOAA/NWS all-hazard network, and some of the key proposals for change.
Emergency Communications: The Emergency Alert System (EAS) and All-Hazard Warnings
The Emergency Alert System (EAS) is one of several federally managed warning systems. The Federal Emergency Management Agency (FEMA) jointly administers EAS with the Federal Communications Commission (FCC), in cooperation with the National Weather Service (NWS), an organization within the National Oceanic and Atmospheric Administration (NOAA). The NOAA/NWS weather radio system has been upgraded to an all-hazard warning capability. This report summarizes the technology and administration of EAS and the NOAA/NWS all-hazard network, and some of the key proposals for change
Tsunamis: Monitoring, Detection, and Early Warning Systems
This report discusses proposals for international tsunami early warning systems and examines U.S. policy regarding tsunamis.
Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs
No Description Available.
Military Space Programs: Issues Concerning DOD's SBIRS and STSS Programs
No Description Available.
Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview
This report assesses the impact of September 11, 2001 attack on public and private information infrastructures in the context of critical infrastructure protection,continuity of operation (COP) and homeland security.
Military Role in Space Control: A Primer
No Description Available.
Satellite Television: Provisions of SHVIA and LOCAL, and Continuing Issues
No Description Available.
Satellite Television: Provisions of SHVIA and LOCAL, and Continuing Issues
No Description Available.
Satellite Television: Provisions of SHVIA and LOCAL, and Continuing Issues
No Description Available.
Satellite Television: Provisions of SHVIA and LOCAL, and Continuing Issues
No Description Available.
Satellite Television: Provisions of SHVIA and LOCAL, and Continuing Issues
No Description Available.
Satellite Television: Provisions of SHVIA and LOCAL, and Continuing Issues
No Description Available.
Emergency Communications: Meeting Public Safety Spectrum Needs
This report has two main sections. In the first section “Identifying Public Safety Needs,” some of the organizations involved with public safety telecommunications are introduced, and key activities dealing with wireless and spectrum issues are summarized. The second main section, “Spectrum for Public Safety,” is organized by the major spectrum bands where public safety wireless communications are in use or planned. These are at: 100-512 MHz; 700 MHz; 800 MHz; 900 MHz and 4.9 GHz. Ultra-wide band (UWB), that broadcasts across a broad range of frequencies, is also discussed. The final section of this report recaps recent activities and legislation in the 107th and 108th Congresses regarding public safety and spectrum use.
Emergency Communications: Meeting Public Safety Spectrum Needs
This report has two main sections. In the first section “Identifying Public Safety Needs,” some of the organizations involved with public safety telecommunications are introduced, and key activities dealing with wireless and spectrum issues are summarized. The second main section, “Spectrum for Public Safety,” is organized by the major spectrum bands where public safety wireless communications are in use or planned. These are at: 100-512 MHz; 700 MHz; 800 MHz; 900 MHz and 4.9 GHz. Ultra-wide band (UWB), that broadcasts across a broad range of frequencies, is also discussed. The final section of this report recaps recent activities and legislation in the 107th and 108th Congresses regarding public safety and spectrum use.
Meeting Public Safety Spectrum Needs
No Description Available.
Meeting Public Safety Spectrum Needs
No Description Available.
Meeting Public Safety Spectrum Needs
No Description Available.
Telephone Excise Tax
No Description Available.
The Telephone Excise Tax: Revenues, Effects, and Repeal Proposals
No Description Available.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. While 33 states have anti-spam laws, there is no federal law. Six bills addressing the spam issue are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), and S. 1231 (Schumer). Spam on wireless devices such as cell phones is discussed in CRS Report RL31636, Wireless Privacy: Availability of Location Information for Telemarketing.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. While 34 states have anti-spam laws, there is no federal law specifically concerning spam. Nine “antispam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), H.R. 2515 (Wilson), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327 (Corzine). Tables providing brief “side-by-side” comparisons of the bills are included in this report.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. While 34 states have anti-spam laws, there is no federal law specifically concerning spam. Nine “antispam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), H.R. 2515 (Wilson), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327 (Corzine). Tables providing brief “side-by-side” comparisons of the bills are included at the end of this report.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
No Description Available.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. While 36 states have anti-spam laws, there is no federal law specifically concerning spam. Nine “antispam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), H.R. 2515 (Wilson-Green), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327 (Corzine). Two (S. 877 and S. 1293) have been reported from committee. Tables providing brief “side-by-side” comparisons of the bills are included at the end of this report.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. On December 16, President Bush signed into law S. 877, the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act. The law, P.L. 108-187, went into effect on January 1, 2004.
"Spam": An Overview of Issues Concerning Commercial Electronic Mail
Spam, also called unsolicited commercial email (UCE) or “junk email,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment, and that some consumers want to receive such solicitations. This report discusses this issue in detail, as well as related legislation.
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Network Centric Warfare: Background and Oversight Issues for Congress
No Description Available.
The Multi-State Anti-Terrorism Information Exchange (MATRIX) Pilot Project
No Description Available.
Creating a National Framework for Cybersecurity: An Analysis of Issues and Options
Cyber- security refers to three things: measures to protect information technology; the information it contains, processes, and transmits, and associated physical and virtual elements (which together comprise cyberspace); the degree of protection resulting from application of those measures; and the associated field of professional endeavor. This report aims to examine what kind of national cyber-security framework may be needed and how it might be implemented, and it addresses three questions: 1. Where are the major cyber-security weaknesses currently, and where might weaknesses be anticipated in the future? What are the major means of leverage for addressing those weaknesses? What roles should government and the private sector play in the use of those means of leverage to address current and potential future weaknesses?
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last two Congresses, but no bill cleared Congress. Several bills have been introduced in the 107th Congress. H.R. 718 was reported from the House Energy and Commerce Committee and the House Judiciary Committee (H. Rept. 107-41, Parts 1 and 2). The two versions are quite different. S. 630 was ordered reported from the Senate Commerce Committee.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last two Congresses, but no bill cleared Congress. Several bills have been introduced in the 107th Congress. H.R. 718 was reported from the House Energy and Commerce Committee and the House Judiciary Committee (H. Rept. 107-41, Parts 1 and 2). The two versions are quite different. S. 630 was ordered reported from the Senate Commerce Committee.
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last three Congresses (105th-107th), but no federal law was enacted (27 states have anti-spam laws, however). Two bills have been introduced in the 108th Congress: S. 563 (Dayton) and S. 877 (Burns).
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of spam insist it is a legitimate marketing technique and protected by the First Amendment. While 27 states have anti-spam laws, there is no federal law. Four bills are pending in the 108th Congress: H.R. 1933, S. 563, S. 877, and S. 1052. (Spam on wireless devices such as cell phones is discussed in CRS Report RL31636.)
Third Generation ("3G") Mobile Wireless Technologies and Services
No Description Available.
V-Chip and TV Ratings: Helping Parents Supervise Their Children's Television Viewing
No Description Available.
V-Chip and TV Ratings: Helping Parents Supervise Their Children's Television Viewing
No Description Available.
E-Rate for Schools: Background on Telecommunications Discounts Through the Universal Service Fund
Congressional Research Service (CRS) report entailing information about telecommunications discounts through the Universal Service Fund, in regards to E-rate for schools. Topics include, impacts on education, current level of access, available federal assistance, application and award process, etc..
Slamming: The Unauthorized Change of a Consumer's Telephone Service Provider
No Description Available.
Slamming: The Unauthorized Change of a Consumer's Telephone Service Provider
No Description Available.
Slamming: The Unauthorized Change of a Consumer's Telephone Service Provider
No Description Available.
Slamming: The Unauthorized Change of a Consumer's Telephone Service Provider
No Description Available.
Slamming: The Unauthorized Change of a Consumer's Telephone Service Provider
No Description Available.
Back to Top of Screen