You limited your search to:

 Decade: 2010-2019
 Collection: Congressional Research Service Reports
The "Militarization" of Law Enforcement and the Department of Defense's "1033 Program"

The "Militarization" of Law Enforcement and the Department of Defense's "1033 Program"

Date: August 20, 2014
Creator: James, Nathan & Else, Daniel H.
Description: This report gives an overview of the history of Special Weapons and Tactics teams, which are estimated to be deployed 45,000 times each year in the U.S. The report also discusses the "1033 Program" which authorizes federal and state law enforcement agencies to receive excess materials from Department of Defense stocks for use in counter-drug or counter-terrorism activities.
Contributing Partner: UNT Libraries Government Documents Department
The Elder Justice Act: Background and Issues for Congress

The Elder Justice Act: Background and Issues for Congress

Date: September 3, 2014
Creator: Colello, Kirsten J.
Description: This report provides a brief legislative history of the Elder Justice Act, summarizes elder justice provisions enacted as part of ACA, and administrative efforts related to implementation and funding. The report then describes several issues for Congress with respect to the act's reauthorization.
Contributing Partner: UNT Libraries Government Documents Department
Reauthorizing the Office of National Drug Control Policy: Issues for Consideration

Reauthorizing the Office of National Drug Control Policy: Issues for Consideration

Date: September 30, 2014
Creator: Sacco, Lisa N. & Finklea, Kristin
Description: This report provides a discussion of the National Drug Control Strategy, the National Drug Control Budget, and Office of National Drug Control Policy (ONDCP) evaluation of the National Drug Control Strategy implementation. It then provides an analysis of selected legislative and oversight issues that Congress may consider when debating the reauthorization of ONDCP.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis

Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis

Date: January 28, 2013
Creator: Doyle, Charles
Description: This report discusses the Cyber Crime Protection Security Act (S. 2111) that would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Contributing Partner: UNT Libraries Government Documents Department
Gangs in Central America

Gangs in Central America

Date: January 28, 2013
Creator: Seelke, Clare Ribando
Description: This report describes the gang problem in Central America, discusses country approaches to deal with the gangs, and analyzes U.S. policy with respect to gangs in Central America. It concludes with possible questions for oversight that Congress may consider.
Contributing Partner: UNT Libraries Government Documents Department
Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Date: August 28, 2014
Creator: James, Nathan
Description: This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs.
Contributing Partner: UNT Libraries Government Documents Department
Ricin: Technical Background and Potential Role in Terrorism

Ricin: Technical Background and Potential Role in Terrorism

Date: April 18, 2013
Creator: Shea, Dana A. & Gottron, Frank
Description: This report provides general information about ricin, identifies historical examples of its use, discusses its potential as a bioterror weapon, and summarizes how its possession is currently regulated.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: March 8, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: March 20, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources

Date: May 22, 2013
Creator: Tehan, Rita
Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Contributing Partner: UNT Libraries Government Documents Department