Search Results

open access

Federal Capital Offenses: An Overview of Substantive and Procedural Law

Description: Murder, committed under any of more than 50 jurisdictional circumstances, is a federal capital offense. So are treason, espionage, and certain drug kingpin offenses. The Federal Death Penalty Act and related provisions establish the procedure that must be followed before a defendant convicted of a federal capital offense may be executed. This report is an overview of the law in the area.
Date: November 18, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions.
Date: July 18, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Community Oriented Policing Services (COPS): Background and Funding

Description: This report discusses the Community Oriented Policing Services (COPS) program, which was created by Title I of the Violent Crime Control and Law Enforcement Act of 1994 (P.L. 103-322). The mission of the COPS program is to advance community policing in all jurisdictions across the United States. Legislation introduced in the 111th Congress would reauthorize the COPS program through FY2014 and reestablish COPS as a multi-grant program. This report provides an overview and analysis of issues Cong… more
Date: February 6, 2014
Creator: James, Nathan
Partner: UNT Libraries Government Documents Department
open access

Overview of Selected Federal Criminal Civil Rights Statutes

Description: Federal criminal civil rights laws impose criminal penalties for deprivation of certain federal rights, privileges, or immunities. These laws prohibit hate crimes based on race, color, religion, or national origin; the burning of places of worship; violence against health care providers; and the transport of persons (particularly women and children) for the purpose of enslavement or forced labor. Some of these laws require a discriminatory motivation while others, such as human trafficking, do … more
Date: December 16, 2014
Creator: Smith, Alison M.
Partner: UNT Libraries Government Documents Department
open access

Aiding, Abetting, and the Like: An Overview of 18 U.S.C. 2

Description: This report discuses the issues that virtually every federal criminal statute has a hidden feature; helpers and hands-on offenders face the same punishment. This results from 18 U.S.C. 2, which visits the same consequences on anyone who orders or assists in the commission of a federal crime.
Date: October 24, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Federal Lands and Natural Resources: Overview and Selected Issues for the 113th Congress

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: October 14, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

U.S. Secret Service Protection Mission Funding and Staffing: Fact Sheet

Description: The U.S. Secret Service (USSS) has two broad missions, criminal investigations and protection. The protection mission, which is the focus of this fact sheet, covers the President, Vice President, their families, and candidates for those offices, along with the White House and Vice President's residence, through the Service's Uniformed Division. Protective duties also extend to foreign missions in the District of Columbia and to designated individuals, such as the DHS Secretary and visiting fore… more
Date: November 25, 2014
Creator: Reese, Shawn; Painter, William L. & Nagel, Jared C.
Partner: UNT Libraries Government Documents Department
open access

Sexual Violence at Institutions of Higher Education

Description: Currently, there are two federal laws that address sexual violence on college campuses: the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (Clery Act, P.L. 101-542) and Title IX of the Education Amendments of 1972 (Title IX, P.L. 92-318). Following a discussion exploring the prevalence of sexual violence at IHEs, this report provides a detailed policy and legal analysis of these two statutes, as well as a brief description of a third statute related to educati… more
Date: October 23, 2014
Creator: McCallion, Gail & Feder, Jody
Partner: UNT Libraries Government Documents Department
open access

DNA Testing in Criminal Justice: Background, Current Law, Grants, and Issues

Description: This report provides an overview of how DNA is used to investigate crimes and help protect the innocent. It also reviews current statutory law on collecting DNA samples, sharing DNA profiles generated from those samples, and providing access to post-conviction DNA testing. The report also includes a summary of grant programs authorized by Congress to assist state and local governments with reducing DNA backlogs, provide post-conviction DNA testing, and promote new technology in the field. It al… more
Date: January 9, 2014
Creator: James, Nathan
Partner: UNT Libraries Government Documents Department
open access

The "Militarization" of Law Enforcement and the Department of Defense's "1033 Program"

Description: This report gives an overview of the history of Special Weapons and Tactics teams, which are estimated to be deployed 45,000 times each year in the U.S. The report also discusses the "1033 Program" which authorizes federal and state law enforcement agencies to receive excess materials from Department of Defense stocks for use in counter-drug or counter-terrorism activities.
Date: August 20, 2014
Creator: James, Nathan & Else, Daniel H.
Partner: UNT Libraries Government Documents Department
open access

Reauthorizing the Office of National Drug Control Policy: Issues for Consideration

Description: This report provides a discussion of the National Drug Control Strategy, the National Drug Control Budget, and Office of National Drug Control Policy (ONDCP) evaluation of the National Drug Control Strategy implementation. It then provides an analysis of selected legislative and oversight issues that Congress may consider when debating the reauthorization of ONDCP.
Date: September 30, 2014
Creator: Sacco, Lisa N. & Finklea, Kristin
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: January 9, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

The Military Commissions Act of 2009 (MCA 2009): Overview and Legal Issues

Description: This report provides a background and analysis comparing military commissions as envisioned under the revised Military Commissions Act (MCA) to those established by the MCA 2006. After reviewing the history of the implementation of military commissions in the armed conflict against Al Qaeda and associated forces, the report provides an overview of the procedural safeguards provided in the MCA. Finally, the report provides two charts comparing the MCA as amended by the MCA 2009 to the original M… more
Date: March 7, 2014
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Domestic Terrorism Appears to Be Reemerging as a Priority at the Department of Justice

Description: This document examines an apparent shift in priorities at the Department of Justice (DOJ) towards a renewed focus on domestic terrorism with the reestablishment of its Domestic Terrorism Executive Committee, which had been defunct for several years. The report considers why the shift in focus may be occurring and also briefly examines different types of domestic terror threats.
Date: August 15, 2014
Creator: Bjelopera, Jerome P.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: January 23, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

American Foreign Fighters and the Islamic State: Broad Challenges for Federal Law Enforcement

Description: This report offers a framework for considering the challenges to domestic security posed by American fighters in the terrorist group known as the Islamic State (IS, previously referred to as ISIS or ISIL) and outlines some of the ways that U.S. law enforcement responds to such challenges.
Date: September 19, 2014
Creator: Bjelopera, Jerome P.
Partner: UNT Libraries Government Documents Department
open access

The Elder Justice Act: Background and Issues for Congress

Description: This report provides a brief legislative history of the Elder Justice Act, summarizes elder justice provisions enacted as part of ACA, and administrative efforts related to implementation and funding. The report then describes several issues for Congress with respect to the act's reauthorization.
Date: September 3, 2014
Creator: Colello, Kirsten J.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: October 14, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Description: This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs.
Date: August 28, 2014
Creator: James, Nathan
Partner: UNT Libraries Government Documents Department
open access

Identity Theft: Trends and Issues

Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes selected trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule. It also examines possible issues for … more
Date: January 16, 2014
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department
Back to Top of Screen