You limited your search to:

 Decade: 2010-2019
 Collection: Congressional Research Service Reports
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: May 22, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: May 2, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Family Violence Prevention and Services Act (FVPSA): Background and Funding

Family Violence Prevention and Services Act (FVPSA): Background and Funding

Date: February 25, 2014
Creator: Fernandes-Alcantara, Adrienne L.
Description: The focus of this report is on the federal response to domestic violence under the Family Violence Prevention and Services Act (FVPSA). "Domestic violence" is used in the report to describe violence among intimate partners, including those involved in dating relationships.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: April 3, 2014
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
The Domestic Terrorist Threat: Background and Issues for Congress

The Domestic Terrorist Threat: Background and Issues for Congress

Date: February 19, 2014
Creator: Bjelopera, Jerome P.
Description: This report focuses on how domestic terrorism is conceptualized by the federal government and issues involved in assessing this threat's significance.
Contributing Partner: UNT Libraries Government Documents Department
Offender Reentry: Correctional Statistics, Reintegration into the Community, and Recidivism

Offender Reentry: Correctional Statistics, Reintegration into the Community, and Recidivism

Date: January 7, 2014
Creator: James, Nathan
Description: This report provides background information regarding the prison population in the United States that has been growing steadily for more than 30 years. The report presents correctional system statistics and discusses the federal government's involvement in offender reentry programs and the Second Chance Act (P.L. 110-199) that was enacted on April 9, 2008.
Contributing Partner: UNT Libraries Government Documents Department
Offender Reentry: Correctional Statistics, Reintegration into the Community, and Recidivism

Offender Reentry: Correctional Statistics, Reintegration into the Community, and Recidivism

Date: June 12, 2014
Creator: James, Nathan
Description: This report provides background information regarding the prison population in the United States that has been growing steadily for more than 30 years. The report presents correctional system statistics and discusses the federal government's involvement in offender reentry programs and the Second Chance Act (P.L. 110-199) that was enacted on April 9, 2008.
Contributing Partner: UNT Libraries Government Documents Department
American Jihadist Terrorism: Combating a Complex Threat

American Jihadist Terrorism: Combating a Complex Threat

Date: November 15, 2011
Creator: Bjelopera, Jerome P.
Description: This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, "homegrown" and "domestic" are terms that describe terrorist activity or plots perpetrated within the United States or abroad by American citizens, legal permanent residents, or visitors radicalized largely within the United States. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. It also outlines actions underway to build trust and partnership between community groups and government agencies and the tensions that may occur between law enforcement and engagement activities.
Contributing Partner: UNT Libraries Government Documents Department
Extraterritorial Application of American Criminal Law

Extraterritorial Application of American Criminal Law

Date: February 15, 2012
Creator: Doyle, Charles
Description: Crime is ordinarily proscribed, tried, and punished according to the laws of the place where it occurs. American criminal law applies beyond the geographical confines of the United States, however, under certain limited circumstances. A surprising number of federal criminal statutes have extraterritorial application, but prosecutions have been few. This may be because when extraterritorial criminal jurisdiction does exist, practical and legal complications, and sometimes diplomatic considerations, may counsel against its exercise.
Contributing Partner: UNT Libraries Government Documents Department
DNA Databanking: Selected Fourth Amendment Issues and Analysis

DNA Databanking: Selected Fourth Amendment Issues and Analysis

Date: June 6, 2011
Creator: Barbour, Emily C.
Description: This report looks at how the practice of DNA database programs, which have been looked at favorably by Congress, are in possible violation of the Fourth Amendment's prohibition on unreasonable searches and seizures. It looks at how the databases' legality has currently been holding up in court, as well as how new advances and revelations in the science of forensic analysis and databanking may have potentially significant legal implications.
Contributing Partner: UNT Libraries Government Documents Department