You limited your search to:

 Decade: 2010-2019
 Year: 2012
 Collection: Congressional Research Service Reports
In Re Terrorist Attacks on September 11, 2001: Dismissals of Claims Against Saudi Defendants Under the Foreign Sovereign Immunities Act (FSIA)

In Re Terrorist Attacks on September 11, 2001: Dismissals of Claims Against Saudi Defendants Under the Foreign Sovereign Immunities Act (FSIA)

Date: December 20, 2012
Creator: Elsea, Jennifer K.
Description: This report summarizes the Foreign Sovereign Immunities Act (FSIA) and jurisdiction in cases against foreign defendants and analyzes the recent court of appeals decision.
Contributing Partner: UNT Libraries Government Documents Department
Internet Firearm and Ammunition Sales

Internet Firearm and Ammunition Sales

Date: August 28, 2012
Creator: Chu, Vivian S.
Description: This report discusses the sale of firearms and ammunition over the Internet, with a focus on the extent to which federal law regulates such activity.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: February 15, 2012
Creator: Finklea, Kristin M.
Description: In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud—the highest level since 2007. Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation's economy but its security. Consequently, in securing the nation and its economic health, policy makers are also tasked with reducing identity theft and its impact.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Date: May 23, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Date: July 20, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: July 24, 2012
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: July 24, 2012
Creator: Tehan, Rita
Description: Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: September 11, 2012
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: July 3, 2012
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: July 24, 2012
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: April 26, 2012
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cyber security issues, including: legislation, hearings in the 112th Congress, data and statistics, and cyber security glossaries.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: June 8, 2012
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: September 11, 2012
Creator: Tehan, Rita
Description: Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Watch List Screening and Brady Background Checks for Firearms

Terrorist Watch List Screening and Brady Background Checks for Firearms

Date: February 1, 2012
Creator: Krouse, William J.
Description: The November 2009 shooting at Fort Hood, TX, renewed interest in terrorist watchlist screening and Brady background checks for firearms through the National Instant Criminal Background Check System (NICS). In the 110th Congress, Senator Frank Lautenberg and Representative Peter King introduced a bill based on a legislative proposal developed by DOJ that would have authorized the Attorney General to deny the transfer of firearms or the issuance of firearms (and explosives) licenses/permits to "dangerous terrorists." They reintroduced this proposal in the 111th Congress and supporters dubbed it the "Terror Gap" proposal. It was reintroduced once again in the 112th Congress. The Terror Gap proposal raises several potential issues for Congress, which are discussed in this report.
Contributing Partner: UNT Libraries Government Documents Department
DNA Testing in Criminal Justice: Background, Current Law, Grants, and Issues

DNA Testing in Criminal Justice: Background, Current Law, Grants, and Issues

Date: December 6, 2012
Creator: James, Nathan
Description: This report provides an overview of how DNA is used to investigate crimes and help protect the innocent. It also reviews current statutory law on collecting DNA samples, sharing DNA profiles generated from those samples, and providing access to post-conviction DNA testing. The report also includes a summary of grant programs authorized by Congress to assist state and local governments with reducing DNA backlogs, provide post-conviction DNA testing, and promote new technology in the field.
Contributing Partner: UNT Libraries Government Documents Department
Failure to Register as a Sex Offender: An Abridged Legal Analysis of 18 U.S.C. 2250

Failure to Register as a Sex Offender: An Abridged Legal Analysis of 18 U.S.C. 2250

Date: August 30, 2012
Creator: Doyle, Charles
Description: Report that describes 18 U.S.C. 2250, which outlaws any individual convicted of a sex offense from not registering themselves in a jurisdiction which they live, work, or go to school. It describes elements of the law, and consequences for not following it.
Contributing Partner: UNT Libraries Government Documents Department
Failure to Register as a Sex Offender: An Abridged Legal Analysis of 18 U.S.C. 2250

Failure to Register as a Sex Offender: An Abridged Legal Analysis of 18 U.S.C. 2250

Date: August 30, 2012
Creator: Doyle, Charles
Description: Report that describes 18 U.S.C. 2250, which outlaws any individual convicted of a sex offense from not registering themselves in a jurisdiction which they live, work, or go to school. It describes elements of the law, and consequences for not following it.
Contributing Partner: UNT Libraries Government Documents Department
Latin America: Terrorism Issues

Latin America: Terrorism Issues

Date: March 2, 2012
Creator: Sullivan, Mark P.
Description: U.S. attention to terrorism in Latin America intensified in the aftermath of the September 2001 terrorist attacks on New York and Washington, with an increase in bilateral and regional cooperation. Over the past several years, policymakers have been concerned about Iran's increasing activities in Latin America, particularly its relations with Venezuela, although there has been disagreement over the extent and significance of Iran's relations with the region. In the 112th Congress, several initiatives have been introduced related to terrorism issues in the Western Hemisphere regarding Mexico, Venezuela, and the activities of Iran and Hezbollah, and several oversight hearings have been held.
Contributing Partner: UNT Libraries Government Documents Department
Money Laundering: An Abridged Overview of 18 U.S.C. 1956 and Related Federal Criminal Law

Money Laundering: An Abridged Overview of 18 U.S.C. 1956 and Related Federal Criminal Law

Date: February 8, 2012
Creator: Doyle, Charles
Description: This is an overview of the elements of federal criminal money laundering statutes and the sanctions imposed for their violation.
Contributing Partner: UNT Libraries Government Documents Department
Smart Meter Data: Privacy and Cybersecurity

Smart Meter Data: Privacy and Cybersecurity

Date: February 3, 2012
Creator: Murrill, Brandon J.; Liu, Edward, C. & Thompson, Richard M., II
Description: Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. Smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. Detailed electricity usage data offers a window into the lives of people inside of a home by revealing what individual appliances they are using, and the transmission of the data potentially subjects this information to interception or theft by unauthorized third parties or hackers. Unforeseen consequences under federal law may result from the installation of smart meters and the communications technologies that accompany them. This report examines federal privacy and cybersecurity laws that may apply to consumer data collected by residential smart meters.
Contributing Partner: UNT Libraries Government Documents Department
Search and Seizure Cases in the October 2012 Term of the Supreme Court

Search and Seizure Cases in the October 2012 Term of the Supreme Court

Date: September 4, 2012
Creator: Doyle, Charles
Description: Report that looks at three search and seizure cases heard during its October 2012 term.
Contributing Partner: UNT Libraries Government Documents Department
Latin America: Terrorism Issues

Latin America: Terrorism Issues

Date: January 5, 2012
Creator: Sullivan, Mark P.
Description: U.S. attention to terrorism in Latin America intensified in the aftermath of the September 2001 terrorist attacks on New York and Washington, with an increase in bilateral and regional cooperation. Over the past several years, policymakers have been concerned about Iran's increasing activities in Latin America, particularly its relations with Venezuela, although there has been disagreement over the extent and significance of Iran's relations with the region. In the 112th Congress, several initiatives have been introduced related to terrorism issues in the Western Hemisphere regarding Mexico, Venezuela, and the activities of Iran and Hezbollah, and several oversight hearings have been held.
Contributing Partner: UNT Libraries Government Documents Department
Crime Victims' Rights Act: A Summary and Legal Analysis of 18 U.S.C. 3771

Crime Victims' Rights Act: A Summary and Legal Analysis of 18 U.S.C. 3771

Date: April 24, 2012
Creator: Doyle, Charles
Description: An overview of rights afforded to federal crime victims. The report describes who qualifies for these rights and follows with a description of the rights.
Contributing Partner: UNT Libraries Government Documents Department
Organized Crime: An Evolving Challenge for U.S. Law Enforcement

Organized Crime: An Evolving Challenge for U.S. Law Enforcement

Date: January 6, 2012
Creator: Bjelopera, Jerome P. & Finklea, Kristin M.
Description: In the last two decades, organized crime has grown more complex, posing evolving challenges for U.S. federal law enforcement. These criminals have transformed their operations in ways that broaden their reach and make it harder for law enforcement to combat them. They have adopted more-networked structural models, internationalized their operations, and grown more tech savvy. They are a significant challenge to U.S. law enforcement. There still is no single agency charged with investigating organized crime in the way the Federal Bureau of Investigation (FBI) has been designated the lead investigative agency for terrorism. Further, resources to tackle this issue are divided among many federal agencies. As such, Congress may exert its oversight authority regarding the federal coordination of organized crime investigations via the 2011 strategy. Policymakers may also debate the efficacy of current resources appropriated to combat organized crime.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 3 NEXT LAST