You limited your search to:

 Country: United States
 Decade: 2010-2019
 Collection: Congressional Research Service Reports
FBI Director: Appointment and Tenure
Report that first reviews the legislative history surrounding the enactment of the 1968 and 1976 amendments to the appointment of the FBI Director, as well as information on the nominees to the FBI Directorship since 1972. The report also provides a legal overview of the extension of a Director's tenure. digital.library.unt.edu/ark:/67531/metadc227722/
FBI Director: Appointment and Tenure
This report reviews the legislative history surrounding the enactment of the 1968 and 1976 amendments to the appointment of the FBI Director, as well as information on the nominees to the FBI Directorship since 1972. It also provides a legal overview of the extension of a Director's tenure. digital.library.unt.edu/ark:/67531/metadc282283/
Perjury Under Federal Law: A Brief Overview
This report describes perjury under federal law, including a definition as well as in-depth explorations of the three general federal perjury laws. This report is available in abbreviated form - without footnotes, quotations, or citations - as CRS Report 98-807, Perjury Under Federal Law: A Sketch of the Elements. digital.library.unt.edu/ark:/67531/metadc29557/
Perjury Under Federal Law: A Sketch of the Elements
This report discusses the three general federal perjury laws. This report is an abbreviated version of CRS Report 98-808, Perjury Under Federal Law: A Brief Overview, by Charles Doyle, stripped of most footnotes, quotations, citations, and bibliography. digital.library.unt.edu/ark:/67531/metadc29556/
Internet Firearm and Ammunition Sales
This report discusses the sale of firearms and ammunition over the Internet, with a focus on the extent to which federal law regulates such activity. digital.library.unt.edu/ark:/67531/metadc122247/
Perjury Under Federal Law: A Brief Overview
This report discusses the three general federal perjury laws. It is an abbreviated version of CRS Report 98-808, Perjury Under Federal Law: A Brief Overview, by Charles Doyle, stripped of most footnotes, quotations, citations, and bibliography. digital.library.unt.edu/ark:/67531/metadc287926/
Perjury Under Federal Law: A Sketch of the Elements
This report discusses the three general federal perjury laws. It is an abbreviated version of CRS Report 98-808, Perjury Under Federal Law: A Brief Overview, by Charles Doyle, stripped of most footnotes, quotations, citations, and bibliography. digital.library.unt.edu/ark:/67531/metadc287900/
FBI Directorship: History and Congressional Action
This report first provides some legislative history surrounding the enactment of the 1968 and 1976 amendments to the appointment of the FBI Director, as well as information on the nominees to the FBI Directorship since 1972. The report then discusses precedent for lengthening the tenure of an office and the constitutionality of extending the tenure of the Directorship for the current incumbent, and addresses whether it would be necessary for Mr. Mueller to be appointed a second time. digital.library.unt.edu/ark:/67531/metadc93878/
In Re Terrorist Attacks on September 11, 2001: Claims Against Saudi Defendants Under the Foreign Sovereign Immunities Act (FSIA)
This report summarizes the Foreign Sovereign Immunities Act (FSIA) and jurisdiction in cases against foreign defendants and analyzes the court of appeals decision. It also discusses legislative efforts to address these issues(S. 1535 and H.R. 3143). digital.library.unt.edu/ark:/67531/metadc272117/
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime. digital.library.unt.edu/ark:/67531/metadc87232/
Terrorist Watch List Screening and Brady Background Checks for Firearms
The November 2009 shooting at Fort Hood, TX, renewed interest in terrorist watchlist screening and Brady background checks for firearms through the National Instant Criminal Background Check System (NICS). In the 110th Congress, Senator Frank Lautenberg and Representative Peter King introduced a bill based on a legislative proposal developed by DOJ that would have authorized the Attorney General to deny the transfer of firearms or the issuance of firearms (and explosives) licenses/permits to "dangerous terrorists." They reintroduced this proposal in the 111th Congress and supporters dubbed it the "Terror Gap" proposal. It was reintroduced once again in the 112th Congress. The Terror Gap proposal raises several potential issues for Congress, which are discussed in this report. digital.library.unt.edu/ark:/67531/metadc87202/
Comparison of the World Trade Center Medical Monitoring and Treatment Program and the World Trade Center Health Program Created by Title I of P.L. 111-347, the James Zadroga 9/11 Health and Compensation Act of 2010
This report compares the current federally-supported medical screening and treatment program offered to various persons affected by the terrorist attacks of September 11, 2001, with the federal program established by Title I of P.L. 111-347, the James Zadroga 9/11 Health and Compensation Act of 2010. digital.library.unt.edu/ark:/67531/metadc103098/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc99065/
Cybersecurity: Authoritative Reports and Resources
Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc227761/
Cybersecurity: Authoritative Reports and Resources
Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc227759/
Cybersecurity: Authoritative Reports and Resources
This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports. digital.library.unt.edu/ark:/67531/metadc227760/
Cybersecurity: Authoritative Reports and Resources
Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc227758/
Identity Theft: Trends and Issues
In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud—the highest level since 2007. Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation's economy but its security. Consequently, in securing the nation and its economic health, policy makers are also tasked with reducing identity theft and its impact. digital.library.unt.edu/ark:/67531/metadc86550/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc122226/
Obstruction of Justice: An Overview of Some of the Federal Statutes That Prohibit Interference with Judicial, Executive, or Legislative Activities
This report discusses obstruction of justice, which is is a federal crime. It describes specific kinds of obstruction, organized by type, and references various relevant laws that have provisions against obstruction. digital.library.unt.edu/ark:/67531/metadc287910/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc93941/
Crime and Forfeiture
This report provides an overview of federal forfeiture law. It sketches the origins and general attributes of forfeiture, describes the distribution of the hundreds of millions of dollars it generates, and identifies some of the related constitutional issues. digital.library.unt.edu/ark:/67531/metadc282308/
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime. digital.library.unt.edu/ark:/67531/metadc98020/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc98018/
Body Armor for Law Enforcement Officers: In Brief
This report contains an overview of the Matching Grant Program for Law Enforcement Armor Vests (BPV program). It also provides a discussion of data on law enforcement agencies that require their officers to wear armor vests while on duty, research on why officers may choose to wear armor vests, research on the life cycle for armor vests, data on the use of body armor by law enforcement officers who were killed with a firearm, and research on the effectiveness of armor vests. digital.library.unt.edu/ark:/67531/metadc306444/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cyber security issues, including: legislation, hearings in the 112th Congress, data and statistics, and cyber security glossaries. digital.library.unt.edu/ark:/67531/metadc93928/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc93929/
Latin America: Terrorism Issues
U.S. attention to terrorism in Latin America intensified in the aftermath of the September 2001 terrorist attacks on New York and Washington, with an increase in bilateral and regional cooperation. Over the past several years, policymakers have been concerned about Iran's increasing activities in Latin America, particularly its relations with Venezuela, although there has been disagreement over the extent and significance of Iran's relations with the region. In the 112th Congress, several initiatives have been introduced related to terrorism issues in the Western Hemisphere regarding Mexico, Venezuela, and the activities of Iran and Hezbollah, and several oversight hearings have been held. digital.library.unt.edu/ark:/67531/metadc87366/
Smart Meter Data: Privacy and Cybersecurity
Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. Smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. Detailed electricity usage data offers a window into the lives of people inside of a home by revealing what individual appliances they are using, and the transmission of the data potentially subjects this information to interception or theft by unauthorized third parties or hackers. Unforeseen consequences under federal law may result from the installation of smart meters and the communications technologies that accompany them. This report examines federal privacy and cybersecurity laws that may apply to consumer data collected by residential smart meters. digital.library.unt.edu/ark:/67531/metadc87204/
Organized Crime: An Evolving Challenge for U.S. Law Enforcement
In the last two decades, organized crime has grown more complex, posing evolving challenges for U.S. federal law enforcement. These criminals have transformed their operations in ways that broaden their reach and make it harder for law enforcement to combat them. They have adopted more-networked structural models, internationalized their operations, and grown more tech savvy. They are a significant challenge to U.S. law enforcement. There still is no single agency charged with investigating organized crime in the way the Federal Bureau of Investigation (FBI) has been designated the lead investigative agency for terrorism. Further, resources to tackle this issue are divided among many federal agencies. As such, Congress may exert its oversight authority regarding the federal coordination of organized crime investigations via the 2011 strategy. Policymakers may also debate the efficacy of current resources appropriated to combat organized crime. digital.library.unt.edu/ark:/67531/metadc87162/
Length of Time from Nomination to Confirmation for U.S. Circuit and District Court Nominees: Overview and Policy Options to Shorten the Process
This report seeks to inform the current debate over the nomination and confirmation for U.S. circuit and district court nominees in three ways: first, by providing an overview of the time taken by the Senate during recent presidencies to confirm U.S. circuit and district court nominees; second, by identifying potential consequences of a protracted confirmation process for such nominees; and third, by identifying policy options the Senate might consider to shorten the length of time from nomination to confirmation for U.S. circuit and district court nominees. digital.library.unt.edu/ark:/67531/metadc272061/
Federal Efforts to Address the Threat of Bioterrorism: Selected Issues and Options for Congress
This report focuses on four areas under congressional consideration deemed critical to the success of the biodefense enterprise: strategic planning; risk assessment; surveillance; and the development, procurement, and distribution of medical countermeasures. This report also discusses the effectiveness and sufficiency of programs implementing these aspects of the federal biodefense efforts, outside analysts' suggestions for improving the government's efforts, and current issues under congressional consideration. digital.library.unt.edu/ark:/67531/metadc103084/
Davis v. United States: Retroactivity and the Good-Faith Exception to the Exclusionary Rule
This report covers the legal causes and implications of Davis v. United States. The Supreme Court will consider whether evidence that was seized in violation of the defendant’s Fourth Amendment rights is admissible at trial because the police seized the evidence in good-faith reliance on then-controlling case law. digital.library.unt.edu/ark:/67531/metadc99064/
Failure to Register as a Sex Offender: An Abridged Legal Analysis of 18 U.S.C. 2250
Report that describes 18 U.S.C. 2250, which outlaws any individual convicted of a sex offense from not registering themselves in a jurisdiction which they live, work, or go to school. It describes elements of the law, and consequences for not following it. digital.library.unt.edu/ark:/67531/metadc227790/
Failure to Register as a Sex Offender: An Abridged Legal Analysis of 18 U.S.C. 2250
Report that describes 18 U.S.C. 2250, which outlaws any individual convicted of a sex offense from not registering themselves in a jurisdiction which they live, work, or go to school. It describes elements of the law, and consequences for not following it. digital.library.unt.edu/ark:/67531/metadc227789/
Search and Seizure Cases in the October 2012 Term of the Supreme Court
Report that looks at three search and seizure cases heard during its October 2012 term. digital.library.unt.edu/ark:/67531/metadc227796/
Murder or Attempted Murder of a Member of Congress and Other Federal Officials and Employees: Implications in Federal Criminal Law and Procedure of Events in Tucson
Report describing the federal procedures and attendant legal provisions generally associated with the prosecution of cases regarding the killing and attempted killing of federal officers and employees in the performance of their official duties. digital.library.unt.edu/ark:/67531/metadc227706/
Money Laundering: An Abridged Overview of 18 U.S.C. 1956 and Related Federal Criminal Law
This is an overview of the elements of federal criminal money laundering statutes and the sanctions imposed for their violation. digital.library.unt.edu/ark:/67531/metadc94222/
Domestic Human Trafficking Legislation in the 113th Congress
This report discusses domestic human-trafficking-related issues that have received legislative action or are of significant congressional interest in the 113th Congress. digital.library.unt.edu/ark:/67531/metadc332948/
Domestic Human Trafficking Legislation in the 113th Congress
This report discusses domestic human-trafficking-related issues that have received legislative action or are of significant congressional interest in the 113th Congress. digital.library.unt.edu/ark:/67531/metadc332989/
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act. digital.library.unt.edu/ark:/67531/metadc83829/
DNA Testing in Criminal Justice: Background, Current Law, Grants, and Issues
This report provides an overview of how DNA is used to investigate crimes and help protect the innocent. It also reviews current statutory law on collecting DNA samples, sharing DNA profiles generated from those samples, and providing access to post-conviction DNA testing. The report also includes a summary of grant programs authorized by Congress to assist state and local governments with reducing DNA backlogs, provide post-conviction DNA testing, and promote new technology in the field. It also reviews select issues Congress might consider should it legislate or conduct oversight in this area. digital.library.unt.edu/ark:/67531/metadc40144/
International Parental Child Abductions
International child custody disputes are likely to increase in frequency as the global society becomes more integrated and mobile. Since 1988, the Hague Convention on the Civil Aspects of International Child Abduction ("Hague Convention" or "Convention") has been the principal mechanism for enforcing the return of abducted children to the United States. This report will discuss the applicability of the Hague Convention and current U.S. laws, both civil and criminal, which seek to address the quandary of children abducted by parents to foreign nations. In addition, pending legislation, including H.R. 3240 and H.R. 3487, is discussed. digital.library.unt.edu/ark:/67531/metadc31443/
Authority of State and Local Police to Enforce Federal Immigration Law
This report discusses the authority of state and local law enforcement to assist in the enforcement of federal immigration law through the investigation and arrest of persons believed to have violated such laws. It describes current provisions in federal law that permit state and local police to enforce immigration law directly, analyzes major cases concerning the ability of states and localities to assist in immigration enforcement, and briefly examines opinions on the issue by the Office of Legal Counsel (OLC) within the Department of Justice. digital.library.unt.edu/ark:/67531/metadc31375/
Guantanamo Detention Center: Legislative Activity in the 111th Congress
This report analyzes relevant provisions in enacted legislation and selected pending bills relating to teh U.S. Naval Station in Guantanamo Bay, Cuba, a facility in which alleged enemy belligerents are detained. digital.library.unt.edu/ark:/67531/metadc29573/
Gun Control Legislation
In the wake of the tragic shootings in Tuscon, AZ, which resulted in the hospitalization of Representative Gabrielle Giffords, as well as 6 fatalities and 13 wounded, the 112th Congress could reexamine certain issues and legislation related to gun control and firearms. This report provides basic firearms-related statistics, an overview of federal firearms law, and a summary of legislative action in the 111th Congress. digital.library.unt.edu/ark:/67531/metadc40199/
Armed Career Criminal Act (18 U.S.C. 924(e)): An Overview
This report briefly explores the Armed Career Criminal Act (ACCA), 18 U.S.C. 924(e), which requires imposition of a minimum 15-year term of imprisonment for recidivists convicted of unlawful possession of a firearm under 18 U.S.C. 922(g). Section 924(e) applies only to those defendants who have three prior state or federal convictions for violent felonies or serious drug offenses. The report includes descriptions of constitutional challenges to the application of section 924(e), which have been generally unsuccessful. digital.library.unt.edu/ark:/67531/metadc29614/
The Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF): Budget and Operations for FY2011
This report provides an overview of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) budget and operations. This report chronicles congressional action on the FY2011 Commerce, Justice, Science (CJS), and Related Agencies Appropriations bills, as well as any FY2010 supplemental appropriations bills, that provide funding for ATF. digital.library.unt.edu/ark:/67531/metadc31468/
Cybersecurity: Authoritative Reports and Resources
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed. digital.library.unt.edu/ark:/67531/metadc87226/
Offender Reentry: Correctional Statistics, Reintegration into the Community, and Recidivism
This report provides background information regarding the prison population in the United States that has been growing steadily for more than 30 years. The report presents correctional system statistics and discusses the federal government's involvement in offender reentry programs and the Second Chance Act (P.L. 110-199) that was enacted on April 9, 2008. digital.library.unt.edu/ark:/67531/metadc276908/
FIRST PREV 1 2 3 NEXT LAST