You limited your search to:

 Decade: 2010-2019
 Collection: Congressional Research Service Reports
Comparison of the World Trade Center Medical Monitoring and Treatment Program and the World Trade Center Health Program Created by Title I of P.L. 111-347, the James Zadroga 9/11 Health and Compensation Act of 2010

Comparison of the World Trade Center Medical Monitoring and Treatment Program and the World Trade Center Health Program Created by Title I of P.L. 111-347, the James Zadroga 9/11 Health and Compensation Act of 2010

Date: January 25, 2011
Creator: Szymendera, Scott & Lister, Sarah A.
Description: This report compares the current federally-supported medical screening and treatment program offered to various persons affected by the terrorist attacks of September 11, 2001, with the federal program established by Title I of P.L. 111-347, the James Zadroga 9/11 Health and Compensation Act of 2010.
Contributing Partner: UNT Libraries Government Documents Department
Crime and Forfeiture

Crime and Forfeiture

Date: May 13, 2013
Creator: Doyle, Charles
Description: This report provides an overview of federal forfeiture law. It sketches the origins and general attributes of forfeiture, describes the distribution of the hundreds of millions of dollars it generates, and identifies some of the related constitutional issues.
Contributing Partner: UNT Libraries Government Documents Department
Crime and Forfeiture

Crime and Forfeiture

Date: January 22, 2015
Creator: Doyle, Charles
Description: This report provides an overview of federal forfeiture law. It sketches the origins and general attributes of forfeiture, describes the distribution of the hundreds of millions of dollars it generates, and identifies some of the related constitutional issues.
Contributing Partner: UNT Libraries Government Documents Department
Crime and Forfeiture: In Short

Crime and Forfeiture: In Short

Date: January 22, 2015
Creator: Doyle, Charles
Description: This report provides a brief background information on property and trigger crimes and discusses civil forfeiture, criminal forfeiture, disposition of forfeited assets and constitutional considerations.
Contributing Partner: UNT Libraries Government Documents Department
The Crime Victims Fund: Federal Support for Victims of Crime

The Crime Victims Fund: Federal Support for Victims of Crime

Date: August 22, 2012
Creator: Sacco, Lisa N.
Description: Report that provides background and funding information for Victims of Crime Act (VOCA) programs and the Crime Victims Fund (CVF). It describes the process through which CVF funds are allocated and explains how the CVF impacts the annual budget for Department of Justice (DOJ).
Contributing Partner: UNT Libraries Government Documents Department
Crimes of Violence Committed Against Federal Officials or Employees: A Brief Overview of Federal Criminal Law

Crimes of Violence Committed Against Federal Officials or Employees: A Brief Overview of Federal Criminal Law

Date: January 11, 2011
Creator: Doyle, Charles
Description: This report discusses dozens of federal statutes that outlaw homicide, assault, and threats under varying jurisdictional circumstances.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Date: October 15, 2014
Creator: Doyle, Charles
Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Date: December 27, 2010
Creator: Doyle, Charles
Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Date: May 23, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Date: July 20, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Contributing Partner: UNT Libraries Government Documents Department