Search Results

open access

Congress' Power to Legislate Control Over Hate Crimes: Selected Legal Theories

Description: Congress has no power under the commerce clause over “noneconomic, violent criminal conduct” that does not cross state lines said Chief Justice William Rehnquist in United States v. Morrison. Congress, however, enjoys additional legislative powers under the spending clauses and the legislative clauses of the Thirteenth and Fifteenth Amendments. Extensive, if something less than all encompassing, national legislation may be possible under the confluence of authority conveyed by the commerce clau… more
Date: November 28, 2005
Creator: Wallace, Paul Starett, Jr.
Partner: UNT Libraries Government Documents Department
open access

Standards For Retroactive Application Based Upon Groundbreaking Supreme Court Decisions in Criminal Law

Description: This report discusses the Supreme Court decision to announce the “new rule”, supreme courts decision that addresses an issue of law in a new way or for the first time. In criminal law new rules apply prospectively, but they also apply retroactively sometimes.
Date: September 28, 2004
Creator: Wallace, Paul Starett, Jr.
Partner: UNT Libraries Government Documents Department
open access

Remedies Available to Victims of Identity Theft

Description: According to the Federal Trade Commission, identity theft is the most common complaint from consumers in all fifty states, and complaints regarding identity theft have grown for four consecutive years. Victims of identity theft may incur damaged credit records, unauthorized charges on credit cards, and unauthorized withdrawals from bank accounts. Sometimes, victims must change their telephone numbers or even their social security numbers. Victims may also need to change addresses that were fals… more
Date: April 19, 2005
Creator: Welborn, Angie A.
Partner: UNT Libraries Government Documents Department
open access

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity inte… more
Date: October 17, 2003
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department
open access

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Date: April 1, 2005
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department
open access

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Description: Since October 2001, Improvised Explosive Devices (IEDs, or roadside bombs) have been responsible for many of the more than 2,000 combat deaths in Iraq, and 178 combat deaths in Afghanistan. IEDs are hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with these bombs are becoming more numerous and deadly in both Iraq and Afghanistan. Department of Defense (DOD) efforts to counter IEDs have proven only marginally effective, and U.S. forces contin… more
Date: September 25, 2006
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department
open access

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Description: This report discusses Improvised Explosive Devices (IEDs, or roadside bombs) in Iraq and Afghanistan. IEDs have been responsible for many of the more than 2,000 combat deaths in Iraq, and 178 combat deaths in Afghanistan. IEDs are hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with these bombs are becoming more numerous and deadly in both Iraq and Afghanistan. The threat includes vehicle-borne IEDs, in which extremists drive cars laden wit… more
Date: September 25, 2006
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department
open access

Homeland Security: 9/11 Victim Relief Funds

Description: From Summary: This report also discusses the amounts of money collected and distributed by some of the larger victim relief funds such as the New York State’s World Trade Center Relief Fund Distribution, the Twin Towers Fund (established by Rudolph Giuliani, the former mayor of New York City), the Red Cross Liberty Disaster Relief Fund, September 11th Fund (organized by United Way), Safe Horizons, the Families of Freedom Scholarship Fund and several Firefighters and Police Relief Funds.
Date: March 27, 2003
Creator: Wolfe, M. Ann
Partner: UNT Libraries Government Documents Department
open access

Homeland Security: 9/11 Victim Relief Funds

Description: In the first days following the terrorist attacks of September 11, 2001, an unprecedented number of Americans contributed over $2.7 billion in donations to assist in the relief of victims. According to a 2004 Rand Corporation study, that money amounted to only a modest share (7%) of the $38.1 billion “quantified benefits” provided to victims of the terrorist attacks. The Rand Study reported that payments worth $19.6 billion (51%) were disbursed by insurers and $15.8 billion (42%) were disbursed… more
Date: December 10, 2004
Creator: Wolfe, M. Ann
Partner: UNT Libraries Government Documents Department
open access

Burma and Transnational Crime

Description: This report analyzes the primary actors driving transnational crime in Burma, the forms of transnational crime occurring, and current U.S. policy in combating these crimes.
Date: April 27, 2009
Creator: Wyler, Liana S.
Partner: UNT Libraries Government Documents Department
open access

Burma and Transnational Crime

Description: This report analyzes the primary actors driving transnational crime in Burma, the forms of transnational crime occurring, and current U.S. policy in combating these crimes.
Date: August 21, 2008
Creator: Wyler, Liana Sun
Partner: UNT Libraries Government Documents Department
open access

Trafficking in Persons: U.S. Policy and Issues for Congress

Description: Trafficking in persons (TIP) for the purposes of exploitation is both an international and a domestic crime that involves violations of labor, public health, and human rights standards. This report focuses on human trafficking both internationally and within the United States. The report begins with an overview of human trafficking including a discussion of the definition of human trafficking, the scope of the problem globally, and an examination of the victims. It follows with an analysis of g… more
Date: July 2, 2009
Creator: Wyler, Liana Sun
Partner: UNT Libraries Government Documents Department
open access

Trafficking in Persons: U.S. Policy and Issues for Congress

Description: Trafficking in persons (TIP) for the purposes of exploitation is believed to be one of the most prolific areas of international criminal activity and is of significant concern to the United States and the international community. This report discusses the global and ongoing problem of TIP in detail, as well as anti-TIP programs and U.S. and international efforts to combat TIP.
Date: July 2, 2009
Creator: Wyler, Liana Sun; Siskin, Alison & Seelke, Clare Ribando
Partner: UNT Libraries Government Documents Department
Back to Top of Screen