132 Matching Results

Search Results

Advanced search parameters have been applied.

Dark Web

Description: This report illuminates information on the various layers of the Internet, with a particular focus on the Dark Web. It discusses both legitimate and illicit uses of the Dark Web, including how the government may rely upon it. Throughout, the report raises issues that policy makers may consider as they explore means to curb malicious activity online.
Date: March 10, 2017
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

Information Warfare: Russian Activities

Description: This report discusses Russia's engagement in activities that some may describe as Information Warfare (IW): the range of military and government operations to protect and exploit the information environment.
Date: unknown
Creator: Theohary, Catherine A. & McInnis, Kathleen J.
Partner: UNT Libraries Government Documents Department

Information Warfare: The Role of Social Media in Conflict

Description: This report briefly discusses the use if social media as a tool of information warfare. The ability to rapidly disseminate graphic images and ideas to shape the public narrative transforms social media into a strategic weapon in the hands of terrorists, insurgent groups, or governments engaged in conflict.
Date: March 4, 2015
Creator: Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Dark Web

Description: This report illuminates information on the various layers of the Internet, with a particular focus on the Dark Web. It discusses both legitimate and illicit uses of the Dark Web, including how the government may rely upon it. Throughout, the report raises issues that policy makers may consider as they explore means to curb malicious activity online.
Date: July 7, 2015
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

U.S.-China Cyber Agreement

Description: During the state visit on September 24-25, 2015, President Xi Jinping of China and President Barack Obama reached a Cyber Agreement. This report briefly discusses that agreement.
Date: October 16, 2015
Creator: Rollins, John W.; Lawrence, Susan V.; Rennack, Dianne E. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

The Advocacy of Terrorism on the Internet: Freedom of Speech Issues and the Material Support Statutes

Description: This report discusses relevant precedent concerning the extent to which advocacy of terrorism may be restricted in a manner consistent with the First Amendment's Freedom of Speech Clause. The report also discusses the potential application of the federal ban on the provision of material support to foreign terrorist organizations (FTOs) to the advocacy of terrorism, including as it relates to the dissemination of such advocacy via online services like Twitter or Facebook.
Date: September 8, 2016
Creator: Ruane, Kathleen Ann
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.
Date: August 16, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report discusses the concept of cybercrime and related cyber threats such as cyber espionage and cyber warfare, and questions whether--and under what circumstances--clear distinctions between the various threats should be delineated. It also outlines how current federal strategies may address cybercrime, including issues surrounding the measurement and tracking of cybercrime.
Date: January 15, 2015
Creator: Finklea, Kristin & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

Description: This report provides background information regarding the threats and consequences of cybersecurity. The federal legislative framework for cybersecurity is complex, with more than 50 statutes addressing various aspects of it either directly or indirectly.
Date: November 8, 2013
Creator: Fischer, Eric A.; Liu, Edward C.; Rollins, John W. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

Description: This report provides background information regarding the threats and consequences of cybersecurity. The federal legislative framework for cybersecurity is complex, with more than 50 statutes addressing various aspects of it either directly or indirectly.
Date: March 1, 2013
Creator: Fischer, Eric A.; Liu, Edward C.; Rollins, John W. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: July 20, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: May 23, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Description: This report examines possible terrorists' objectives and computer vulnerabilities that might lead to an attempted cyberattack against the critical infrastructure of the U.S. homeland, and also discusses the emerging computer and other technical skills of terrorists and extremists. Policy issues include exploring ways to improve technology for cybersecurity, or whether U.S. counterterrorism efforts should be linked more closely to international efforts to prevent cybercrime.
Date: January 22, 2007
Creator: Rollins, John & Wilson, Clay
Partner: UNT Libraries Government Documents Department

Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Description: This report provides an overview of the perennial issue involving technology outpacing law enforcement and discusses how policy makers and law enforcement officials have dealt with this issue in the past. It also outlines the current debate surrounding smartphone data encryption and how this may impact U.S. law enforcement operations, as well as existing law enforcement capabilities, the debate over whether law enforcement is "going dark" because of rapid technological advances, and resulting issues that policy makers may consider.
Date: February 18, 2016
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department