Wednesday, July 31, 2013
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
Lennard G. Kruger
Specialist in Science and Technology Policy
Angele A. Gilroy
Specialist in Telecommunications Policy
The “digital divide” is a term that has been used to characterize a gap between “information haves and have-nots,” or in other words, between those Americans who use or have access to telecommunications and information technologies and those who do not. One important subset of the digital divide debate concerns high-speed Internet access and advanced telecommunications services, also known as broadband. Broadband is provided by a series of technologies (e.g., cable, telephone wire, fiber, satellite, wireless) that give users the ability to send and receive data at volumes and speeds far greater than traditional “dial-up” Internet access over telephone lines.
Broadband technologies are currently being deployed primarily by the private sector throughout the United States. While the numbers of new broadband subscribers continue to grow, studies and data suggest that the rate of broadband deployment in urban/suburban and high income areas is outpacing deployment in rural and low-income areas. Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a “digital divide” in broadband access.
With the conclusion of the grant and loan awards established by the American Recovery and Reinvestment Act of 2009 (P.L. 111-5), there remain two ongoing federal vehicles which direct federal money to fund broadband infrastructure: the broadband and telecommunications programs at the Rural Utilities Service (RUS) of the U.S. Department of Agriculture and the Universal Service Fund (USF) programs under the Federal Communications Commission (FCC). Although the USF’s High Cost Program does not explicitly fund broadband infrastructure, subsidies are used, in many cases, to upgrade existing telephone networks so that they are capable of delivering high-speed services. Additionally, subsidies provided by USF’s Schools and Libraries Program and Rural Health Care Program are used for a variety of telecommunications services, including broadband access. Currently the USF is undergoing a major transition to the Connect America Fund, which is targeted to the deployment, adoption, and utilization of both fixed and mobile broadband.
To the extent that the 113th Congress may consider various options for further encouraging broadband deployment and adoption, a key issue is how to strike a balance between providing federal assistance for unserved and underserved areas where the private sector may not be providing acceptable levels of broadband service, while at the same time minimizing any deleterious effects that government intervention in the marketplace may have on competition and private sector investment.
Date of Report: July 17, 2013
Number of Pages: 31
Order Number: RL30719
Price: $29.95
To Order:
RL30719.pdf to use the SECURE SHOPPING CART
e-mail congress@pennyhill.com
Phone 301-253-0881
For email and phone orders, provide a Visa, MasterCard, American Express, or Discover card number, expiration date, and name on the card. Indicate whether you want e-mail or postal delivery. Phone orders are preferred and receive priority processing.
Friday, July 26, 2013
Cybersecurity: Authoritative Reports and Resources
Rita Tehan
Information Specialist
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic.
Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics.
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on
Information Specialist
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic.
Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics.
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on
- “Legislation”
- “Executive Orders and Presidential Directives”
- “Data and Statistics”
- “Cybersecurity Glossaries”
- “Reports by Topic”
- Government Accountability Office (GAO) reports
- White House/Office of Management and Budget reports
- Military/DOD
- Cloud Computing
- Critical Infrastructure
- National Strategy for Trusted Identities in Cyberspace (NSTIC)
- Cybercrime/Cyberwar
- International
- Education/Training/Workforce
- Research and Development (R&D)
- “Related Resources: Other Websites”
Date of Report: July 11, 2013
Number of Pages: 104
Order Number: R42507
Price: $29.95
To Order:
R42507.pdf to use the SECURE SHOPPING CART
e-mail congress@pennyhill.com
Phone 301-253-0881
For email and phone orders, provide a Visa, MasterCard, American Express, or Discover card number, expiration date, and name on the card. Indicate whether you want e-mail or postal delivery. Phone orders are preferred and receive priority processing.
Wednesday, July 17, 2013
Rural Broadband: The Roles of the Rural Utilities Service and the Universal Service Fund
Angele A. Gilroy
Specialist in Telecommunications Policy
Lennard G. Kruger
Specialist in Science and Technology Policy
Since the initial deployment of broadband in the late 1990s, Congress has viewed broadband infrastructure deployment as a means towards improving regional economic development, and in the long term, to create jobs. According to the National Broadband Plan, the lack of adequate broadband infrastructure is most pressing in rural America, where the costs of serving large geographical areas, coupled with low population densities, often reduce economic incentives for telecommunications providers to invest in and maintain broadband infrastructure and service.
Historically, the federal government has provided financial assistance to give telecommunications providers the capital to invest in rural telecommunications infrastructure and to maintain an adequate return on their investment. Currently, there are two ongoing federal vehicles which direct money to fund broadband in rural areas: the broadband and telecommunications programs at the Rural Utilities Service (RUS) of the U.S. Department of Agriculture, and the Universal Service Fund (USF) programs under the Federal Communications Commission (FCC).
While both the RUS and USF programs share some of the same goals (e.g., improving broadband availability and adoption in rural areas), the two programs are different with respect to their funding mechanism, scope, and emphasis. For example, RUS grants and loans are used as upfront capital to invest in broadband infrastructure, while the USF provides ongoing subsidies to keep the operation of telecommunications and broadband networks in high cost areas economically viable for providers. Another key difference is that the RUS programs are funded through annual appropriations, while USF is funded through mandatory contributions from telecommunications carriers that provide interstate service, and is not subject to the annual congressional budget process.
Both programs are at a pivotal point in the 113th Congress. The statute authorizing the Rural Broadband Loan and Loan Guarantee program was significantly modified in the 2008 farm bill, and is being addressed once more in the 2013 farm bill. Meanwhile, the USF is undergoing a major and unprecedented transition through a series of reforms being developed by the FCC, and Congress has adopted an oversight role with respect to those reforms. In shaping and monitoring the future evolution of these programs, Congress is assessing how best to leverage these programs to ensure that the goals of the National Broadband Plan—including universal broadband service by 2020—are met to the greatest extent possible.
Date of Report: June 25, 2013
Number of Pages: 25
Order Number: R42524
Price: $29.95
To Order:
R42524.pdf to use the SECURE SHOPPING CART
e-mail congress@pennyhill.com
Phone 301-253-0881
For email and phone orders, provide a Visa, MasterCard, American Express, or Discover card number, expiration date, and name on the card. Indicate whether you want e-mail or postal delivery. Phone orders are preferred and receive priority processing.
Cybersecurity: Authoritative Reports and Resources
Rita Tehan
Information Research Specialist
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic.
Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics.
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on
- “Legislation”
- “Executive Orders and Presidential Directives”
- “Data and Statistics”
- “Cybersecurity Glossaries”
- “Reports by Topic”
- Government Accountability Office (GAO) reports
- White House/Office of Management and Budget reports
- Military/DOD
- Cloud Computing
- Critical Infrastructure
- National Strategy for Trusted Identities in Cyberspace (NSTIC)
- Cybercrime/Cyberwar
- International
- Education/Training/Workforce
- Research and Development (R&D)
- “Related Resources: Other Websites”
Date of Report: July 5, 2013
Number of Pages: 104
Order Number: R42507
Price: $29.95
To Order:
R42507.pdf to use the SECURE SHOPPING CART
e-mail congress@pennyhill.com
Phone 301-253-0881
For email and phone orders, provide a Visa, MasterCard, American Express, or Discover card number, expiration date, and name on the card. Indicate whether you want e-mail or postal delivery. Phone orders are preferred and receive priority processing.
Subscribe to:
Posts (Atom)