You limited your search to:

 Decade: 2010-2019
 Collection: Congressional Research Service Reports
Comparison of the World Trade Center Medical Monitoring and Treatment Program and the World Trade Center Health Program Created by Title I of P.L. 111-347, the James Zadroga 9/11 Health and Compensation Act of 2010

Comparison of the World Trade Center Medical Monitoring and Treatment Program and the World Trade Center Health Program Created by Title I of P.L. 111-347, the James Zadroga 9/11 Health and Compensation Act of 2010

Date: January 25, 2011
Creator: Szymendera, Scott & Lister, Sarah A.
Description: This report compares the current federally-supported medical screening and treatment program offered to various persons affected by the terrorist attacks of September 11, 2001, with the federal program established by Title I of P.L. 111-347, the James Zadroga 9/11 Health and Compensation Act of 2010.
Contributing Partner: UNT Libraries Government Documents Department
Crime and Forfeiture

Crime and Forfeiture

Date: May 13, 2013
Creator: Doyle, Charles
Description: This report provides an overview of federal forfeiture law. It sketches the origins and general attributes of forfeiture, describes the distribution of the hundreds of millions of dollars it generates, and identifies some of the related constitutional issues.
Contributing Partner: UNT Libraries Government Documents Department
Crime and Forfeiture

Crime and Forfeiture

Date: January 22, 2015
Creator: Doyle, Charles
Description: This report provides an overview of federal forfeiture law. It sketches the origins and general attributes of forfeiture, describes the distribution of the hundreds of millions of dollars it generates, and identifies some of the related constitutional issues.
Contributing Partner: UNT Libraries Government Documents Department
Crime and Forfeiture: In Short

Crime and Forfeiture: In Short

Date: January 22, 2015
Creator: Doyle, Charles
Description: This report provides a brief background information on property and trigger crimes and discusses civil forfeiture, criminal forfeiture, disposition of forfeited assets and constitutional considerations.
Contributing Partner: UNT Libraries Government Documents Department
The Crime Victims Fund: Federal Support for Victims of Crime

The Crime Victims Fund: Federal Support for Victims of Crime

Date: August 22, 2012
Creator: Sacco, Lisa N.
Description: Report that provides background and funding information for Victims of Crime Act (VOCA) programs and the Crime Victims Fund (CVF). It describes the process through which CVF funds are allocated and explains how the CVF impacts the annual budget for Department of Justice (DOJ).
Contributing Partner: UNT Libraries Government Documents Department
The Crime Victims Fund: Federal Support for Victims of Crime

The Crime Victims Fund: Federal Support for Victims of Crime

Date: October 27, 2015
Creator: Sacco, Lisa N.
Description: This report provides background and funding information for Victims of Crime Act (VOCA) programs and the Crime Victims Fund (CVF). It describes the process through which CVF funds are allocated and explains how the CVF impacts the annual budget for DOJ. It then provides an analysis of selected issues that Congress may consider regarding the CVF and the federal budget.
Contributing Partner: UNT Libraries Government Documents Department
Crime Victims' Rights Act: A Summary and Legal Analysis of 18 U.S.C. 3771

Crime Victims' Rights Act: A Summary and Legal Analysis of 18 U.S.C. 3771

Date: April 24, 2012
Creator: Doyle, Charles
Description: An overview of rights afforded to federal crime victims. The report describes who qualifies for these rights and follows with a description of the rights.
Contributing Partner: UNT Libraries Government Documents Department
Crimes of Violence Committed Against Federal Officials or Employees: A Brief Overview of Federal Criminal Law

Crimes of Violence Committed Against Federal Officials or Employees: A Brief Overview of Federal Criminal Law

Date: January 11, 2011
Creator: Doyle, Charles
Description: This report discusses dozens of federal statutes that outlaw homicide, assault, and threats under varying jurisdictional circumstances.
Contributing Partner: UNT Libraries Government Documents Department
Criminal Justice Reform: One Judge's View

Criminal Justice Reform: One Judge's View

Date: January 1, 2016
Creator: unknown
Description: This report briefly provides highlights from an article written by Judge Alex Kozinski of the United States Court of Appeals for the Ninth Circuit, in which he recommended 26 changes in the U.S. criminal justice system, federal and state.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Date: October 15, 2014
Creator: Doyle, Charles
Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Date: December 27, 2010
Creator: Doyle, Charles
Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Date: January 15, 2015
Creator: Finklea, Kristin & Theohary, Catherine A.
Description: This report discusses the concept of cybercrime and related cyber threats such as cyber espionage and cyber warfare, and questions whether--and under what circumstances--clear distinctions between the various threats should be delineated. It also outlines how current federal strategies may address cybercrime, including issues surrounding the measurement and tracking of cybercrime.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Date: May 23, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Date: July 20, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: March 8, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: March 20, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: May 22, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: January 17, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: April 17, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: May 24, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: April 26, 2012
Creator: Tehan, Rita
Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: July 24, 2012
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: May 2, 2012
Creator: Tehan, Rita
Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: July 25, 2013
Creator: Tehan, Rita
Description: Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Contributing Partner: UNT Libraries Government Documents Department