You limited your search to:

 Collection: Congressional Research Service Reports
Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Date: February 23, 2015
Creator: Weiss, N. Eric
Description: This report analyzes the sharing of cyberattack information by government with private companies, by private companies with the government, and among private companies. Sharing information with consumers is mentioned but is not the central focus of this report.
Contributing Partner: UNT Libraries Government Documents Department
Trafficking in Persons in Latin America and the Caribbean

Trafficking in Persons in Latin America and the Caribbean

Date: February 11, 2015
Creator: Ribando Seelke, Clare
Description: This report describes the nature and scope of the problem of human trafficking in Latin America and the Caribbean, including U.S. efforts to deal with trafficking in persons in the region, as well as the successes and failures of some recent country and regional antitrafficking efforts. The report concludes by raising issues that may be helpful for the 113th Congress to consider as it continues to address human trafficking as part of its authorization, appropriations, and oversight activities.
Contributing Partner: UNT Libraries Government Documents Department
Public Trust and Law Enforcement--A Brief Discussion for Policy Makers

Public Trust and Law Enforcement--A Brief Discussion for Policy Makers

Date: February 9, 2015
Creator: James, Nathan; Bjelopera, Jerome P.; Finklea, Kristin; Keegan, Natalie; Lister, Sarah A.; Sacco, Lisa N. et al.
Description: This report provides a brief overview of police-community relations and how the federal government might be able to promote more accountability and better relationships between citizens and law enforcement.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: February 3, 2015
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Asset Forfeiture: Selected Legal Issues and Reforms

Asset Forfeiture: Selected Legal Issues and Reforms

Date: February 2, 2015
Creator: Thompson, Richard M., II
Description: This report discusses the asset forfeiture, which refers (in this report) to the process of confiscating either property or money from a person because it is illegal to possess (contraband), constitutes the proceeds of a crime, or was used to facilitate a crime. The report provides an overview of both types -- civil asset forfeiture and criminal forfeitures -- as well as select legal issues and structural reforms.
Contributing Partner: UNT Libraries Government Documents Department
Sex Trafficking of Children in the United States: Overview and Issues for Congress

Sex Trafficking of Children in the United States: Overview and Issues for Congress

Date: January 28, 2015
Creator: Finklea, Kristin M.; Fernandes-Alcantara, Adrienne L. & Siskin, Alison
Description: This report provides an overview of sex trafficking of children in the United States. It first conceptualizes the issue, discussing the victims and perpetrators involved. It then outlines the federal response to investigating and prosecuting perpetrators as well as providing services to victims. The report concludes with a discussion of select issues concerning the federal response to sex trafficking of minors in the United States.
Contributing Partner: UNT Libraries Government Documents Department
Crime and Forfeiture

Crime and Forfeiture

Date: January 22, 2015
Creator: Doyle, Charles
Description: This report provides an overview of federal forfeiture law. It sketches the origins and general attributes of forfeiture, describes the distribution of the hundreds of millions of dollars it generates, and identifies some of the related constitutional issues.
Contributing Partner: UNT Libraries Government Documents Department
Crime and Forfeiture: In Short

Crime and Forfeiture: In Short

Date: January 22, 2015
Creator: Doyle, Charles
Description: This report provides a brief background information on property and trigger crimes and discusses civil forfeiture, criminal forfeiture, disposition of forfeited assets and constitutional considerations.
Contributing Partner: UNT Libraries Government Documents Department
In Re Terrorist Attacks on September 11, 2001: Claims Against Saudi Defendants Under the Foreign Sovereign Immunities Act (FSIA)

In Re Terrorist Attacks on September 11, 2001: Claims Against Saudi Defendants Under the Foreign Sovereign Immunities Act (FSIA)

Date: January 22, 2015
Creator: Elsea, Jennifer K.
Description: This report summarizes the Foreign Sovereign Immunities Act (FSIA) and jurisdiction in cases against foreign defendants and analyzes the court of appeals decision. It also discusses legislative efforts to address these issues(S. 1535 and H.R. 3143).
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Date: January 15, 2015
Creator: Finklea, Kristin & Theohary, Catherine A.
Description: This report discusses the concept of cybercrime and related cyber threats such as cyber espionage and cyber warfare, and questions whether--and under what circumstances--clear distinctions between the various threats should be delineated. It also outlines how current federal strategies may address cybercrime, including issues surrounding the measurement and tracking of cybercrime.
Contributing Partner: UNT Libraries Government Documents Department