You limited your search to:

 Decade: 2010-2019
 Collection: Congressional Research Service Reports
Judicial Activity Concerning Enemy Combatant Detainees: Major Court Rulings

Judicial Activity Concerning Enemy Combatant Detainees: Major Court Rulings

Date: April 6, 2012
Creator: Elsea, Jennifer K. & Garcia, Michael John
Description: This report discusses major judicial opinions concerning suspected enemy belligerents detained in the conflict with Al Qaeda and the Taliban. The report addresses all Supreme Court decisions concerning enemy combatants. It also discusses notable circuit court opinions addressing issues of ongoing relevance.
Contributing Partner: UNT Libraries Government Documents Department
Comparison of Rights in Military Commission Trials and Trials in Federal Criminal Court

Comparison of Rights in Military Commission Trials and Trials in Federal Criminal Court

Date: May 9, 2012
Creator: Elsea, Jennifer K.
Description: The initiation of military commission proceedings against Khalid Sheik Mohammad and four others for their alleged involvement in the 9/11 terrorist attacks has focused renewed attention on the differences between trials in federal court and those conducted by military commission. This report provides a brief summary of legal issues raised by the choice of forum for trying accused terrorists and a chart comparing selected military commissions rules under the Military Commissions Act, as amended, to the corresponding rules that apply in federal court.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: May 2, 2012
Creator: Tehan, Rita
Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed.
Contributing Partner: UNT Libraries Government Documents Department
The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Date: February 15, 2012
Creator: Finklea, Kristin M.
Description: Globalization and technological innovation have fostered the expansion of both legitimate and criminal operations across physical borders as well as throughout cyberspace. U.S. law enforcement has increasingly relied on intelligence-led policing, enhanced interagency cooperation, and technological implementation to confront 21st century crime. Issues for Congress are how it can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime. It may also examine whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: February 15, 2012
Creator: Finklea, Kristin M.
Description: In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud—the highest level since 2007. Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation's economy but its security. Consequently, in securing the nation and its economic health, policy makers are also tasked with reducing identity theft and its impact.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis

Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis

Date: March 12, 2012
Creator: Doyle, Charles
Description: The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Contributing Partner: UNT Libraries Government Documents Department
Community Oriented Policing Services (COPS): Background and Funding

Community Oriented Policing Services (COPS): Background and Funding

Date: June 2, 2011
Creator: James, Nathan
Description: The Community Oriented Policing Services (COPS) program was created by Title I of the Violent Crime Control and Law Enforcement Act of 1994 (P.L. 103-322). The mission of the COPS program is to advance community policing in all jurisdictions across the United States. Legislation introduced in the 111th Congress would reauthorize the COPS program through FY2014 and reestablish COPS as a multi-grant program. This report provides an overview and analysis of issues Congress might choose to consider when taking up legislation to reauthorize the COPS program.
Contributing Partner: UNT Libraries Government Documents Department
Latin America: Terrorism Issues

Latin America: Terrorism Issues

Date: January 5, 2012
Creator: Sullivan, Mark P.
Description: U.S. attention to terrorism in Latin America intensified in the aftermath of the September 2001 terrorist attacks on New York and Washington, with an increase in bilateral and regional cooperation. Over the past several years, policymakers have been concerned about Iran's increasing activities in Latin America, particularly its relations with Venezuela, although there has been disagreement over the extent and significance of Iran's relations with the region. In the 112th Congress, several initiatives have been introduced related to terrorism issues in the Western Hemisphere regarding Mexico, Venezuela, and the activities of Iran and Hezbollah, and several oversight hearings have been held.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: April 26, 2012
Creator: Tehan, Rita
Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed.
Contributing Partner: UNT Libraries Government Documents Department
Smart Meter Data: Privacy and Cybersecurity

Smart Meter Data: Privacy and Cybersecurity

Date: February 3, 2012
Creator: Murrill, Brandon J.; Liu, Edward, C. & Thompson, Richard M., II
Description: Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. Smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. Detailed electricity usage data offers a window into the lives of people inside of a home by revealing what individual appliances they are using, and the transmission of the data potentially subjects this information to interception or theft by unauthorized third parties or hackers. Unforeseen consequences under federal law may result from the installation of smart meters and the communications technologies that accompany them. This report examines federal privacy and cybersecurity laws that may apply to consumer data collected by residential smart meters.
Contributing Partner: UNT Libraries Government Documents Department