Search Results

open access

Protecting Classified Information and the Rights of Criminal Defendants: The Classified Information Procedures Act

Description: A criminal prosecution involving classified information may cause tension between the government's interest in protecting classified information and the criminal defendant's right to a constitutionally valid trial. In some cases, a defendant may threaten to disclose classified information in an effort to gain leverage. Concerns about this practice, referred to as "graymail," led the 96th Congress to enact the Classified Information Procedures Act to provide uniform procedures for prosecutions i… more
Date: April 2, 2012
Creator: Liu, Edward C. & Garvey, Todd
Partner: UNT Libraries Government Documents Department
open access

Extraterritorial Application of American Criminal Law

Description: Crime is ordinarily proscribed, tried, and punished according to the laws of the place where it occurs. American criminal law applies beyond the geographical confines of the United States, however, under certain limited circumstances. A surprising number of federal criminal statutes have extraterritorial application, but prosecutions have been few. This may be because when extraterritorial criminal jurisdiction does exist, practical and legal complications, and sometimes diplomatic consideratio… more
Date: February 15, 2012
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketc… more
Date: December 27, 2010
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Trafficking in Persons: International Dimensions and Foreign Policy Issues for Congress

Description: This report explores current foreign policy issues confronting U.S. efforts to combat human trafficking, the interrelationship among existing polices, and the historical and current role of Congress in such efforts. The 112th Congress has introduced and taken action on several bills related to human trafficking. Given recent challenges in balancing budget priorities, the 112th Congress may choose to consider certain aspects of this issue further, including the effectiveness of international an… more
Date: April 20, 2012
Creator: Wyler, Liana Sun
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issu… more
Date: May 2, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

The Domestic Terrorist Threat: Background and Issues for Congress

Description: In the last decade, domestic terrorists-people who commit crimes within the homeland and draw inspiration from U.S.-based extremist ideologies and movements-have killed American citizens and damaged property across the country. Not all of these criminals have been prosecuted under terrorism statutes. This report discusses domestic terrorism's significance to policymakers per five topics: level of activity, use of nontraditional tactics, exploitation of the internet, decentralized nature of the … more
Date: May 15, 2012
Creator: Bjelopera, Jerome P.
Partner: UNT Libraries Government Documents Department
open access

Gun Control Legislation

Description: A look at past gun control legislation and also how recent events (such as the shooting in Tucson, AZ on January 8, 2011 which notably wounded Rep. Gabrielle Giffords) have influenced current legislation. This report concludes with discussion of other salient and recurring gun control issues that have generated past congressional interest.
Date: March 2, 2012
Creator: Krouse, William J.
Partner: UNT Libraries Government Documents Department
open access

Comparison of Rights in Military Commission Trials and Trials in Federal Criminal Court

Description: The initiation of military commission proceedings against Khalid Sheik Mohammad and four others for their alleged involvement in the 9/11 terrorist attacks has focused renewed attention on the differences between trials in federal court and those conducted by military commission. This report provides a brief summary of legal issues raised by the choice of forum for trying accused terrorists and a chart comparing selected military commissions rules under the Military Commissions Act, as amended,… more
Date: May 9, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Judicial Activity Concerning Enemy Combatant Detainees: Major Court Rulings

Description: This report discusses major judicial opinions concerning suspected enemy belligerents detained in the conflict with Al Qaeda and the Taliban. The report addresses all Supreme Court decisions concerning enemy combatants. It also discusses notable circuit court opinions addressing issues of ongoing relevance.
Date: April 6, 2012
Creator: Elsea, Jennifer K. & Garcia, Michael John
Partner: UNT Libraries Government Documents Department
open access

Identity Theft: Trends and Issues

Description: In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud—the highest level since 2007. Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation's economy but its security. Consequently, in securing the nation and its economic health, policy makers are also tasked wit… more
Date: February 15, 2012
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Description: Globalization and technological innovation have fostered the expansion of both legitimate and criminal operations across physical borders as well as throughout cyberspace. U.S. law enforcement has increasingly relied on intelligence-led policing, enhanced interagency cooperation, and technological implementation to confront 21st century crime. Issues for Congress are how it can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime… more
Date: February 15, 2012
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis

Description: The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Date: March 12, 2012
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues.
Date: April 26, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Terrorist Watch List Screening and Brady Background Checks for Firearms

Description: The November 2009 shooting at Fort Hood, TX, renewed interest in terrorist watchlist screening and Brady background checks for firearms through the National Instant Criminal Background Check System (NICS). In the 110th Congress, Senator Frank Lautenberg and Representative Peter King introduced a bill based on a legislative proposal developed by DOJ that would have authorized the Attorney General to deny the transfer of firearms or the issuance of firearms (and explosives) licenses/permits to "d… more
Date: February 1, 2012
Creator: Krouse, William J.
Partner: UNT Libraries Government Documents Department
open access

Detention of U.S. Persons as Enemy Belligerents

Description: The detainee provisions passed as part of the National Defense Authorization Act for FY2012 affirm that the Authorization for Use of Military Force in response to the terrorist attacks of September 11, 2001, authorizes the detention of persons captured in connection with hostilities. This report provides a background to the legal issues presented, followed by a brief introduction to the law of war pertinent to the detention of different categories of individuals. An overview of U.S. practice du… more
Date: February 1, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Smart Meter Data: Privacy and Cybersecurity

Description: Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. Smart meters must record near-real time data on consumer electricity usage and transmit the data t… more
Date: February 3, 2012
Creator: Murrill, Brandon J.; Liu, Edward C. & Thompson, Richard M., II
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity iss… more
Date: April 26, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: May 23, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Community Oriented Policing Services (COPS): Background and Funding

Description: The Community Oriented Policing Services (COPS) program was created by Title I of the Violent Crime Control and Law Enforcement Act of 1994 (P.L. 103-322). The mission of the COPS program is to advance community policing in all jurisdictions across the United States. Legislation introduced in the 111th Congress would reauthorize the COPS program through FY2014 and reestablish COPS as a multi-grant program. This report provides an overview and analysis of issues Congress might choose to consider… more
Date: June 2, 2011
Creator: James, Nathan
Partner: UNT Libraries Government Documents Department
open access

Trafficking in Persons: U.S. Policy and Issues for Congress

Description: Trafficking in persons (TIP) for the purposes of exploitation is believed to be one of the most prolific areas of international criminal activity and is of significant concern to the United States and the international community. This report discusses the global and ongoing problem of TIP in detail, as well as anti-TIP programs and U.S. and international efforts to combat TIP.
Date: January 12, 2012
Creator: Siskin, Alison & Wyler, Liana Sun
Partner: UNT Libraries Government Documents Department
open access

Latin America: Terrorism Issues

Description: U.S. attention to terrorism in Latin America intensified in the aftermath of the September 2001 terrorist attacks on New York and Washington, with an increase in bilateral and regional cooperation. Over the past several years, policymakers have been concerned about Iran's increasing activities in Latin America, particularly its relations with Venezuela, although there has been disagreement over the extent and significance of Iran's relations with the region. In the 112th Congress, several initi… more
Date: January 5, 2012
Creator: Sullivan, Mark P.
Partner: UNT Libraries Government Documents Department
open access

Organized Crime: An Evolving Challenge for U.S. Law Enforcement

Description: In the last two decades, organized crime has grown more complex, posing evolving challenges for U.S. federal law enforcement. These criminals have transformed their operations in ways that broaden their reach and make it harder for law enforcement to combat them. They have adopted more-networked structural models, internationalized their operations, and grown more tech savvy. They are a significant challenge to U.S. law enforcement. There still is no single agency charged with investigating org… more
Date: January 6, 2012
Creator: Bjelopera, Jerome P. & Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

Detention of U.S. Persons as Enemy Belligerents

Description: This report provides a background to the National Defense Authorization Act for FY2012, the Authorization to use Military Force act, and the President's power to detain "enemy combatants." It then gives a brief introduction to the law of war pertinent to the detention of different categories of individuals and an overview of U.S. practice during wartime to detain persons deemed dangerous to national security. It concludes by discussion Congress's role in prescribing rules for wartime detention … more
Date: February 1, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen