You limited your search to:

 Collection: Congressional Research Service Reports
Enron: A Select Chronology of Congressional, Corporate, and Government Activities
This report presents basic background information on the collapse of the Enron Corporation, identifying public policy issues in financial market oversight. This report briefly summarizes some federal laws carrying criminal penalties which may be implicated in the events surrounding the collapse of the Enron Corp. This report compares the auditing and accounting reform measures passed by the House (H.R. 3763) and reported by the Senate Committee on Banking, Housing, and Urban Affairs. This report compares the major provisions of three auditor and accounting reform proposals: H.R. 3763, S. 2673, and a rule proposed on June 20, 2002, by the SEC that would create a new auditor oversight board by using the SEC’s existing authority to regulate corporate accounting. The report focuses on Section 404(a) of the Employee Retirement Income Security Act (ERISA), the federal statute that regulates employer-sponsored pension plans. Section 404(a) is considered the “touchstone for understanding the scope and object of an ERISA fiduciary’s duties.” digital.library.unt.edu/ark:/67531/metacrs2298/
Enron: A Select Chronology of Congressional, Corporate, and Government Activities
This report presents basic background information on the collapse of the Enron Corporation, identifying public policy issues in financial market oversight. This report briefly summarizes some federal laws carrying criminal penalties which may be implicated in the events surrounding the collapse of the Enron Corp. This report compares the auditing and accounting reform measures passed by the House (H.R. 3763) and reported by the Senate Committee on Banking, Housing, and Urban Affairs. This report compares the major provisions of three auditor and accounting reform proposals: H.R. 3763, S. 2673, and a rule proposed on June 20, 2002, by the SEC that would create a new auditor oversight board by using the SEC’s existing authority to regulate corporate accounting. The report focuses on Section 404(a) of the Employee Retirement Income Security Act (ERISA), the federal statute that regulates employer-sponsored pension plans. Section 404(a) is considered the “touchstone for understanding the scope and object of an ERISA fiduciary’s duties.” digital.library.unt.edu/ark:/67531/metacrs2299/
Enron: A Select Chronology of Congressional, Corporate, and Government Activities
This report presents basic background information on the collapse of the Enron Corporation, identifying public policy issues in financial market oversight. This report briefly summarizes some federal laws carrying criminal penalties which may be implicated in the events surrounding the collapse of the Enron Corp. This report compares the auditing and accounting reform measures passed by the House (H.R. 3763) and reported by the Senate Committee on Banking, Housing, and Urban Affairs. This report compares the major provisions of three auditor and accounting reform proposals: H.R. 3763, S. 2673, and a rule proposed on June 20, 2002, by the SEC that would create a new auditor oversight board by using the SEC’s existing authority to regulate corporate accounting. digital.library.unt.edu/ark:/67531/metacrs2300/
Gangs in Central America
No Description digital.library.unt.edu/ark:/67531/metacrs6766/
Immigration Consequences of Criminal Activity
No Description digital.library.unt.edu/ark:/67531/metacrs9934/
International Terrorism: Threat, Policy, and Response
No Description digital.library.unt.edu/ark:/67531/metacrs9505/
International Terrorism: Threat, Policy, and Response
No Description digital.library.unt.edu/ark:/67531/metacrs9506/
Enron: A Select Chronology of Congressional, Corporate, and Government Activities
This report presents basic background information on the collapse of the Enron Corporation, identifying public policy issues in financial market oversight. This report briefly summarizes some federal laws carrying criminal penalties which may be implicated in the events surrounding the collapse of the Enron Corp. This report compares the auditing and accounting reform measures passed by the House (H.R. 3763) and reported by the Senate Committee on Banking, Housing, and Urban Affairs. This report compares the major provisions of three auditor and accounting reform proposals: H.R. 3763, S. 2673, and a rule proposed on June 20, 2002, by the SEC that would create a new auditor oversight board by using the SEC’s existing authority to regulate corporate accounting. The report focuses on Section 404(a) of the Employee Retirement Income Security Act (ERISA), the federal statute that regulates employer-sponsored pension plans. Section 404(a) is considered the “touchstone for understanding the scope and object of an ERISA fiduciary’s duties.” digital.library.unt.edu/ark:/67531/metacrs4005/
Enron: A Select Chronology of Congressional, Corporate, and Government Activities
This report presents basic background information on the collapse of the Enron Corporation, identifying public policy issues in financial market oversight. This report briefly summarizes some federal laws carrying criminal penalties which may be implicated in the events surrounding the collapse of the Enron Corp. This report compares the auditing and accounting reform measures passed by the House (H.R. 3763) and reported by the Senate Committee on Banking, Housing, and Urban Affairs. This report compares the major provisions of three auditor and accounting reform proposals: H.R. 3763, S. 2673, and a rule proposed on June 20, 2002, by the SEC that would create a new auditor oversight board by using the SEC’s existing authority to regulate corporate accounting. The report focuses on Section 404(a) of the Employee Retirement Income Security Act (ERISA), the federal statute that regulates employer-sponsored pension plans. Section 404(a) is considered the “touchstone for understanding the scope and object of an ERISA fiduciary’s duties.” digital.library.unt.edu/ark:/67531/metacrs4006/
Identity Theft: Trends and Issues
In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud—the highest level since 2007. Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation's economy but its security. Consequently, in securing the nation and its economic health, policy makers are also tasked with reducing identity theft and its impact. digital.library.unt.edu/ark:/67531/metadc86550/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc122226/
Obstruction of Justice: An Overview of Some of the Federal Statutes That Prohibit Interference with Judicial, Executive, or Legislative Activities
This report discusses obstruction of justice, which is is a federal crime. It describes specific kinds of obstruction, organized by type, and references various relevant laws that have provisions against obstruction. digital.library.unt.edu/ark:/67531/metadc287910/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc93941/
Crime and Forfeiture
This report provides an overview of federal forfeiture law. It sketches the origins and general attributes of forfeiture, describes the distribution of the hundreds of millions of dollars it generates, and identifies some of the related constitutional issues. digital.library.unt.edu/ark:/67531/metadc282308/
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime. digital.library.unt.edu/ark:/67531/metadc98020/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc98018/
Body Armor for Law Enforcement Officers: In Brief
This report contains an overview of the Matching Grant Program for Law Enforcement Armor Vests (BPV program). It also provides a discussion of data on law enforcement agencies that require their officers to wear armor vests while on duty, research on why officers may choose to wear armor vests, research on the life cycle for armor vests, data on the use of body armor by law enforcement officers who were killed with a firearm, and research on the effectiveness of armor vests. digital.library.unt.edu/ark:/67531/metadc306444/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cyber security issues, including: legislation, hearings in the 112th Congress, data and statistics, and cyber security glossaries. digital.library.unt.edu/ark:/67531/metadc93928/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc93929/
Polygraph Use by the Department of Energy: Issues for Congress
This report examines how the Department of Energy's (DOE) polygraph testing program has evolved and reviews certain scientific findings with regard to the polygraph's scientific validity. Several issues include whether: DOE's new screening program is focused on an appropriate number of individuals occupying only the most sensitive positions; the program should be expanded in order to adequately safeguard certain classified information; further research into the polygraph's scientific validity is needed; there are possible alternatives to the polygraph; and whether DOE should continue polygraph screening. digital.library.unt.edu/ark:/67531/metadc462298/
Terrorist Watch List Screening and Background Checks for Firearms
This report examines potential policy issues that could arise under the Terror Gap proposal. For context, a basic overview of the U.S. government's post-9/11 terrorist watchlist procedures is provided, as well as an analysis of the Terror Gap proposal, which has been reintroduced in the 113th Congress. digital.library.unt.edu/ark:/67531/metadc462233/
Domestic Terrorism Appears to Be Reemerging as a Priority at the Department of Justice
This document examines an apparent shift in priorities at the Department of Justice (DOJ) towards a renewed focus on domestic terrorism with the reestablishment of its Domestic Terrorism Executive Committee, which had been defunct for several years. The report considers why the shift in focus may be occurring and also briefly examines different types of domestic terror threats. digital.library.unt.edu/ark:/67531/metadc462589/
Federal Prison Industries: Overview and Legislative History
This report provides background on the Federal Prison Industries, Inc.'s (FPI's) operations and statutory authority; it does not address the related debates on inmate labor, criminal rehabilitation, or competitive versus noncompetitive federal government contracting. digital.library.unt.edu/ark:/67531/metadc462396/
Identity Theft: Trends and Issues
This report first provides a brief federal legislative history of identity theft laws. It analyzes selected trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule. It also examines possible issues for Congress to consider. digital.library.unt.edu/ark:/67531/metadc462892/
Latin America: Terrorism Issues
U.S. attention to terrorism in Latin America intensified in the aftermath of the September 2001 terrorist attacks on New York and Washington, with an increase in bilateral and regional cooperation. Over the past several years, policymakers have been concerned about Iran's increasing activities in Latin America, particularly its relations with Venezuela, although there has been disagreement over the extent and significance of Iran's relations with the region. In the 112th Congress, several initiatives have been introduced related to terrorism issues in the Western Hemisphere regarding Mexico, Venezuela, and the activities of Iran and Hezbollah, and several oversight hearings have been held. digital.library.unt.edu/ark:/67531/metadc87366/
Smart Meter Data: Privacy and Cybersecurity
Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. Smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. Detailed electricity usage data offers a window into the lives of people inside of a home by revealing what individual appliances they are using, and the transmission of the data potentially subjects this information to interception or theft by unauthorized third parties or hackers. Unforeseen consequences under federal law may result from the installation of smart meters and the communications technologies that accompany them. This report examines federal privacy and cybersecurity laws that may apply to consumer data collected by residential smart meters. digital.library.unt.edu/ark:/67531/metadc87204/
Organized Crime: An Evolving Challenge for U.S. Law Enforcement
In the last two decades, organized crime has grown more complex, posing evolving challenges for U.S. federal law enforcement. These criminals have transformed their operations in ways that broaden their reach and make it harder for law enforcement to combat them. They have adopted more-networked structural models, internationalized their operations, and grown more tech savvy. They are a significant challenge to U.S. law enforcement. There still is no single agency charged with investigating organized crime in the way the Federal Bureau of Investigation (FBI) has been designated the lead investigative agency for terrorism. Further, resources to tackle this issue are divided among many federal agencies. As such, Congress may exert its oversight authority regarding the federal coordination of organized crime investigations via the 2011 strategy. Policymakers may also debate the efficacy of current resources appropriated to combat organized crime. digital.library.unt.edu/ark:/67531/metadc87162/
Length of Time from Nomination to Confirmation for U.S. Circuit and District Court Nominees: Overview and Policy Options to Shorten the Process
This report seeks to inform the current debate over the nomination and confirmation for U.S. circuit and district court nominees in three ways: first, by providing an overview of the time taken by the Senate during recent presidencies to confirm U.S. circuit and district court nominees; second, by identifying potential consequences of a protracted confirmation process for such nominees; and third, by identifying policy options the Senate might consider to shorten the length of time from nomination to confirmation for U.S. circuit and district court nominees. digital.library.unt.edu/ark:/67531/metadc272061/
Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy
The focus of this report is on the history of Al Qaeda, known (or attributed) actions, suspected capabilities of the organization and non-aligned entities, and an analysis of select regional Al Qaeda affiliates. digital.library.unt.edu/ark:/67531/metadc103077/
Federal Efforts to Address the Threat of Bioterrorism: Selected Issues and Options for Congress
This report focuses on four areas under congressional consideration deemed critical to the success of the biodefense enterprise: strategic planning; risk assessment; surveillance; and the development, procurement, and distribution of medical countermeasures. This report also discusses the effectiveness and sufficiency of programs implementing these aspects of the federal biodefense efforts, outside analysts' suggestions for improving the government's efforts, and current issues under congressional consideration. digital.library.unt.edu/ark:/67531/metadc103084/
Closing the Guantanamo Detention Center: Legal Issues
This report provides an overview of major legal issues likely to arise as a result of executive and legislative action to close the Guantanamo detention facility. It discusses legal issues related to the transfer of Guantanamo detainees, the continued detention of such persons in the United States, and the possible removal of persons brought into the country. It also discusses selected constitutional issues that may arise in the criminal prosecution of detainees, emphasizing the procedural and substantive protections that are utilized in different adjudicatory forums. digital.library.unt.edu/ark:/67531/metadc103051/
Davis v. United States: Retroactivity and the Good-Faith Exception to the Exclusionary Rule
This report covers the legal causes and implications of Davis v. United States. The Supreme Court will consider whether evidence that was seized in violation of the defendant’s Fourth Amendment rights is admissible at trial because the police seized the evidence in good-faith reliance on then-controlling case law. digital.library.unt.edu/ark:/67531/metadc99064/
Terrorist Capabilities for Cyberattack: Overview and Policy Issues
No Description digital.library.unt.edu/ark:/67531/metacrs10185/
Latin America: Terrorism Issues
No Description digital.library.unt.edu/ark:/67531/metacrs10147/
Victims' Rights Amendment: Proposals to Amend the United States Constitution in the 106th Congress
No Description digital.library.unt.edu/ark:/67531/metacrs1127/
Latin America: Terrorism Issues
Report regarding U.S. attention to terrorism in Latin America, which has intensified in the aftermath of the September 2001 terrorist attacks. The report talks about the 112th Congress's initiatives that have been introduced related to terrorism issues in the Western Hemisphere regarding Mexico, Venezuela, and the activities of Iran and Hezbollah. digital.library.unt.edu/ark:/67531/metadc228105/
Mexico's Drug Trafficking Organizations: Source and Scope of the Rising Violence
Report which provides background on drug trafficking in Mexico, identifies the major drug trafficking organizations, and analyzes the context, scope, and scale of the violence. It examines current trends of the violence, analyzes prospects for curbing violence in the future, and compares it with violence in Colombia. digital.library.unt.edu/ark:/67531/metadc227700/
Failure to Register as a Sex Offender: An Abridged Legal Analysis of 18 U.S.C. 2250
Report that describes 18 U.S.C. 2250, which outlaws any individual convicted of a sex offense from not registering themselves in a jurisdiction which they live, work, or go to school. It describes elements of the law, and consequences for not following it. digital.library.unt.edu/ark:/67531/metadc227790/
Failure to Register as a Sex Offender: An Abridged Legal Analysis of 18 U.S.C. 2250
Report that describes 18 U.S.C. 2250, which outlaws any individual convicted of a sex offense from not registering themselves in a jurisdiction which they live, work, or go to school. It describes elements of the law, and consequences for not following it. digital.library.unt.edu/ark:/67531/metadc227789/
Search and Seizure Cases in the October 2012 Term of the Supreme Court
Report that looks at three search and seizure cases heard during its October 2012 term. digital.library.unt.edu/ark:/67531/metadc227796/
Murder or Attempted Murder of a Member of Congress and Other Federal Officials and Employees: Implications in Federal Criminal Law and Procedure of Events in Tucson
Report describing the federal procedures and attendant legal provisions generally associated with the prosecution of cases regarding the killing and attempted killing of federal officers and employees in the performance of their official duties. digital.library.unt.edu/ark:/67531/metadc227706/
Terrorism Funding: FY2002 Appropriations Bills
No Description digital.library.unt.edu/ark:/67531/metacrs1539/
Cyberwarfare
Cyberwarfare raises issues of growing national interest and concern. Cyberwarfare can be used to describe various aspects of defending and attacking information and computer networks in cyberspace, as well as denying an adversary’s ability to do the same. Some major problems encountered with cyber attacks, in particular, are the difficulty in determining the origin and nature of the attack and in assessing the damage incurred. digital.library.unt.edu/ark:/67531/metacrs1536/
Terrorism Risk Insurance: A Summary of Legislative Proposals
No Description digital.library.unt.edu/ark:/67531/metacrs1717/
Agroterrorism: Options in Congress
Although U.S. intelligence agencies have not identified any terrorist acts targeting agricultural production (i.e., agroterrorism) in the United States to date, the events of September 11, 2001 have awakened the nation to their possibility. Some experts estimate that a single agroterrorist attack using a highly contagious livestock disease could cost between $10 billion and $30 billion to the U.S. economy. This report examines the potential threats to America’s agriculture from a deliberate biological attack, describes the current defense structure and capabilities available to respond to agroterrorism, and analyzes current congressional proposals to address the threat of biological weapons to U.S. agriculture. digital.library.unt.edu/ark:/67531/metacrs1384/
Gun Legislation in the 109th Congress
Congress continues to debate the efficacy and constitutionality of federal regulation of firearms and ammunition. It is a contentious debate, with strong advocates for and against the further federal regulation of firearms. Gun control advocates argue that federal regulation of firearms curbs access by criminals, juveniles, and other "high-risk" individuals, among other things. Gun control opponents deny that federal policies keep firearms out of the hands of high-risk persons; rather, they argue, controls often create burdens for law-abiding citizens and infringe upon constitutional rights provided by the Second Amendment. This report describes the details of this ongoing debate, including several pieces of legislation related to the issue. digital.library.unt.edu/ark:/67531/metacrs10384/
Krouse, William J.
Congress continues to debate the efficacy and constitutionality of federal regulation of firearms and ammunition. It is a contentious debate, with strong advocates for and against the further federal regulation of firearms. Gun control advocates argue that federal regulation of firearms curbs access by criminals, juveniles, and other "high-risk" individuals. Gun control opponents deny that federal policies keep firearms out of the hands of high-risk persons; rather, they argue, control often create burdens for law-abiding citizens and infringe upon constitutional rights provided by the Second Amendment. This report explores this issue in greater detail, including related legislation. digital.library.unt.edu/ark:/67531/metacrs10383/
Latin America: Terrorism Issues
In the aftermath of the September 2001 terrorist attacks on New York and Washington, D.C., U.S. attention to terrorism in Latin America intensified, with an increase in bilateral and regional cooperation. Latin American nations strongly condemned the attacks. This report outlines the U.S.-Latin American relationship in regards to terrorism, including several pieces of international counterterrorism legislation, including the Inter-American Convention Against Terrorism and the Organization of American States. digital.library.unt.edu/ark:/67531/metacrs10571/
Victims' Rights Amendment in the 106th Congress: Overview of Suggestions to Amend the Constitution
No Description digital.library.unt.edu/ark:/67531/metacrs1523/
Latin America: Terrorism Issues
In the aftermath of the September 2001 terrorist attacks on New York and Washington, D.C., U.S. attention to terrorism in Latin America intensified, with an increase in bilateral and regional cooperation. Latin American nations strongly condemned the attacks. This report outlines the U.S.-Latin American relationship in regards to terrorism, including several pieces of international counterterrorism legislation, including the Inter-American Convention Against Terrorism and the Organization of American States. digital.library.unt.edu/ark:/67531/metacrs10572/