Science & Technology |
![](images/spacer.gif) Mathematical, Computer, & Physical Sciences |
![](images/spacer.gif) Computer Sciences |
|
Document Name
![Sort descending alphabetically](images/button_z.gif) |
|
Date ![Sort descending](images/button_down.gif) |
Document Type ![Sort by document type](images/button_doctype.gif) |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | 2000 Legislative Summary: H-1B Visas | | 2000 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | 2020 Legislative Preview: Modernization of Congress | | Jan. 13, 2020 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | 2021 Budget: Cybersecurity | | Mar. 16, 2020 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | A Giant, Armed for Cyberwarfare | | May 4, 2009 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Alternate Database Bill Approved by House Panel | | Mar. 6, 2004 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | America, Spooked | | Jun. 17, 2013 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Artificial Intelligence Commission Sued for Lack of Transparency | | Oct. 15, 2019 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Battle Lines Not So Clear In 'File-Sharing' Debate | | Mar. 7, 2005 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Big Tech Gets Big Help from Climate Change Skeptics | | Jun. 24, 2019 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Civil Liberties Advocates Oppose Democrats' 'Technological Wall' | | Jan. 22, 2019 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Computer Hackers, 1995-1996 Legislative Chronology | | 1995 - 1996 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Computer Hacking | | Sep. 16, 2011 | ![An in-depth report on a political or social issue.](/xsite/images/icon_res.gif) | CQ Researcher |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Computer Safeguards, 1987-1988 Legislative Chronology | | 1987 - 1988 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Computer Security Given Low Marks | | 2000 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Computer Security, 1987-1988 Legislative Chronology | | 1987 - 1988 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Computer Software, 1989-1990 Legislative Chronology | | 1990 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Congress Steps Into Clash Of Copyrights, Consumer Rights | | 2001 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Congress Unleashes the Drones | | Oct. 15, 2018 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Congressional 'Spyware' Fix Likely to Prove Elusive | | Oct. 9, 2004 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Congressional Testimony by J.C. Willemssen of the General Accounting Office (GAO) on Year 2000 Computer Conversion, 1997 | | Jul. 10, 1997 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Congressional Testimony by J.C. Willemssen of the General Accounting Office on Year 2000 Computer Conversion, 1998 | | Aug. 13, 1998 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Copyright Law Overhaul, 1998 Legislative Chronology | | 1998 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Coronavirus Crisis: Cybersecurity | | Mar. 23, 2020 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Cyberpolitics | | Sep. 17, 2004 | ![An in-depth report on a political or social issue.](/xsite/images/icon_res.gif) | CQ Researcher |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Cybersecurity a Weak Link In Homeland's Armor | | Feb. 14, 2005 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Cybersecurity: Hacking to Be Targeted | | Jan. 9, 2017 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Cybersecurity: Learning To Share | | Aug. 2, 2010 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Deeper Ad Probes Sound Web Alarm | | May 11, 2009 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Diamond v. Diehr (450 U.S. 175): Brief Summary | | Mar. 3, 1981 | ![Summary and analysis of major Supreme Court decisions.](/xsite/images/icon_case.gif) | Case Summary |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Digital Dilemmas | | 2001 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Encryption Controls, 1999 Legislative Chronology | | 1999 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Encryption Export Restrictions, 1997 Legislative Chronology | | 1997 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Encryption Export Restrictions, 1998 Legislative Chronology | | 1998 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Exposing 'Deepfakes' is a High-Tech Challenge | | Oct. 21, 2019 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Fall Agenda: Spam Limits | | Aug. 30, 2003 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Final Communiqui of the Summit Meeting of the Group of Eight Industrialized Nations, U.S., Japan, Germany, Britain, France, Canada, Italy | | Jul. 23, 2000 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Firms' Liability from Y2K-Related Computer Glitches, 1999 Legislative Chronology | | | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Free Wi-Fi Likely to Be Pie in the Sky | | Feb. 18, 2013 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Future of Computers | | May 26, 2000 | ![An in-depth report on a political or social issue.](/xsite/images/icon_res.gif) | CQ Researcher |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Futurist: Pulling the plug on wi-fi | | May 26, 2008 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | GOP Net Neutrality Plan in the Works | | Dec. 4, 2017 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Gottschalk v. Benson: Brief Summary | | Nov. 20, 1972 | ![Summary and analysis of major Supreme Court decisions.](/xsite/images/icon_case.gif) | Case Summary |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Governing the Internet | | | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Government Cybersecurity Teams Hurt by Outdated Recruiting Approach | | Jun. 24, 2019 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Government Struggles to Rein In Artificial Intelligence Programs | | Jun. 3, 2019 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | High-Speed Computer Network, 1991-1992 Legislative Chronology | | 1992 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | High-Speed Internet Access Bill Emerges From House Commerce Panel With Less Momentum Than Tauzin Hoped | | 2001 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | High-Speed Internet: Who Gets Waved Into the Fast Lane? | | Jul. 7, 2008 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | High-Tech Competitiveness, 1993-1994 Legislative Chronology | | 1993 - 1994 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | High-Tech Small Business, 1991-1992 Legislative Chronology | | 1992 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | High-Tech Training, 1991-1992 Legislative Chronology | | 1992 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | House Caucus Aims to Solve Cybersecurity Issues With 'Blockchain' | | May 21, 2018 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | House Panel Approves Bill Combating Database Piracy | | Feb. 28, 2004 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Internet Copyright Law Amendment Gets Noisy Support from Librarians | | 2001 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Internet Tax Moratorium Extension Clears After Senate Rejects Plan For Multistate 'Compact' | | Nov. 17, 2001 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Internet Tax Moratorium, 1998 Legislative Chronology | | 1998 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Internet Taxation, 1997 Legislative Chronology | | 1997 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Lawmakers Look Carefully at Artificial Intelligence | | Jan. 16, 2018 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Lawmakers, Industry Debate How to Tackle | | | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Lotus Development Corp. v. Borland International, Inc.: Brief Summary | | Jan. 16, 1996 | ![Summary and analysis of major Supreme Court decisions.](/xsite/images/icon_case.gif) | Case Summary |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd. | | Jun. 27, 2005 | ![Summary and analysis of major Supreme Court decisions.](/xsite/images/icon_case.gif) | Case Summary |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Mixed Signals on Cellphone Unlocking Rule | | Mar. 11, 2013 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Most of the Federal Government Is Ripe for a Cyberattack | | Jun. 11, 2018 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Napster and Other Entertainment Sites Urge Creation of Licensing System To Distribute Music Online | | 2001 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | National Information Infrastructure, 1993-1994 Legislative Chronology | | 1993 - 1994 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Networking the Classroom | | Oct. 20, 1995 | ![An in-depth report on a political or social issue.](/xsite/images/icon_res.gif) | CQ Researcher |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | News Conference on Year 2000 Conversions with J.A. Koskinen and Results from "The Journey to Y2K: Final Report of the President's Council on Year 2000 Conversion" | | Jan. 2, 2000 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Next Generation Internet, 1997-1998 Legislative Chronology | | 1997 - 1998 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Political Economy: Y2K Bug Bite Still Itches | | Feb. 7, 2005 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Privacy Erosion: A 'Net Loss | | Feb. 20, 2006 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Report of the General Accounting Office (GAO): "Information Security: Computer Attacks at Department of Defense Pose Increasing Risks" | | May 22, 1996 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Report of the National Telecommunications and Information Administration on Access to Computers: "Falling Through the Net: Defining the Digital Divide" | | Jul. 9, 1999 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Report of the President's Commission on Critical Infrastructure Protection: "Critical Foundations: Protecting America's Infrastructures" | | Oct. 27, 1997 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Report of the U.S. Commerce Department: "America's New Deficit: The Shortage of Information Technology Workers" | | Sep. 29, 1997 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Report of the U.S. Department of Commerce on Y2K Preparations: "The Economics of Y2K and the Impact on the United States" | | Nov. 17, 1999 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Report of the U.S. Department of Commerce: "Digital Economy 2000" | | Jun. 5, 2000 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Report of the United States Commission on National Security/21st Century: "New World Coming: American Security in the 21st Century" | | Sep. 15, 1999 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Report on Chess Victory by "Deep Blue" Computer over Chess Champion G. Kasparov Issued by IBM Corporation on the World Wide Web | | May 11, 1997 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Report to Congress of the General Accounting Office (GAO) on Protecting Computer Security: "Information Security: Serious Weaknesses Place Critical Federal Operations and Assets at Risk" | | Sep. 23, 1998 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Rise of the Machines: Artificial Intelligence Challenges Pentagon | | May 14, 2018 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Selling a Security Risk | | Nov. 28, 2011 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Semiconductor Chips, 1984 Legislative Chronology | | 1984 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Semiconductor Chips, 1991-1992 Legislative Chronology | | 1991 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Semiconductor-Chip Protection, 1987-1988 Legislative Chronology | | 1987 - 1988 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Senate Panel Approves 'Spyware' Bill | | Sep. 25, 2004 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Softened by Exemptions, Database Protection Bill Still Stands Little Chance | | Jan. 24, 2004 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Some Progress Against Cyber Threats | | Jun. 24, 2019 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Something From Nothing: The Value of White Space | | Sep. 22, 2008 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | 'Spyware' Legislation Falters Again | | 2005 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | State of the Union Address of President B. Clinton and Republican Response by Senate Majority Leader T. Lott of Mississippi, 1998 | | Jan. 27, 1998 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | State of the Union Address of President B. Clinton and Republican Responses by J. Dunn of Washington and S. Largent of Oklahoma, 1999 | | Jan. 19, 1999 | ![Full-text or excerpts of primary source material.](/xsite/images/icon_prime.gif) | Primary Source |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | States Diverge on Virtual Currency Regulation | | Feb. 19, 2019 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | States Suspicious of Feds' Interest in Securing Voting Systems | | Oct. 16, 2017 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Supercomputers, 1991-1992 Legislative Chronology | | 1991 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Taming a Brave, New Wireless World | | May 17, 2010 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Technology Programs, 1991-1992 Legislative Chronology | | 1992 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | The GOP Turnabout on the Internet Transition | | Sep. 26, 2016 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | The Mechanics of Threat Intelligence | | Oct. 22, 2018 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | The Medium, Or the Message? | | May 10, 2010 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | The Rise of the Private Cyber Corps | | Oct. 22, 2018 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Top Computer Cop Hones Diplomat Skills | | Dec. 4, 2006 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Trump Promises Cyberwar if Attacks Continue | | Nov. 13, 2017 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Trump's Cyber Executive Order is More Study than Action | | May 22, 2017 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Turf Battles, Lobbying Blitz Roil | | 2001 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | U.S. is Woefully Unprepared for Cyber-Warfare | | Jun. 24, 2019 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Unauthorized Switching of Long-Distance Carriers, 1998 Legislative Chronology | | 1998 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Warren's Tech Breakup Proposal Isn't Hurting Her Campaign Fundraising | | May 13, 2019 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | What Is Artificial Intelligence? | | Jun. 3, 2019 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |
![](images/spacer_grey.gif) |
![](images/g_link.gif) | Year 2000 Computer Glitch, 1998 Legislative Chronology | | 1998 | ![Reporting and analysis of legislation.](/xsite/images/icon_leghist.gif) | Legislative Analysis |