Search Results

open access

Drug Control: International Policy and Approaches

Description: Over the past decade, worldwide production of illicit drugs has risen dramatically: opium and marijuana production has roughly doubled and coca production tripled. Street prices of cocaine and heroin have fallen significantly in the past 20 years, reflecting increased availability. Despite apparent national political resolve to deal with the drug problem, inherent contradictions regularly appear between U.S. anti-drug policy and other national policy goals and concerns. The mix of competing dom… more
Date: March 1, 2005
Creator: Perl, Raphael F.
Partner: UNT Libraries Government Documents Department
open access

Drug Control: International Policy and Approaches

Description: Over the past decade, worldwide production of illicit drugs has risen dramatically: opium and marijuana production has roughly doubled and coca production tripled. Street prices of cocaine and heroin have fallen significantly in the past 20 years, reflecting increased availability. Despite apparent national political resolve to deal with the drug problem, inherent contradictions regularly appear between U.S. anti-drug policy and other national policy goals and concerns. The mix of competing dom… more
Date: April 13, 2005
Creator: Perl, Raphael F.
Partner: UNT Libraries Government Documents Department
open access

Welfare Law and Domestic Violence

Description: The Family Violence Option (FVO) of the 1996 welfare law (P.L. 104-193) permits state programs of Temporary Assistance for Needy Families (TANF) to waive federal rules regarding required work, time limited benefits, and child support cooperation for victims of domestic violence.
Date: January 9, 2003
Creator: Cooke, Jacqueline & Burke, Vee
Partner: UNT Libraries Government Documents Department
open access

Welfare Law and Domestic Violence

Description: The Family Violence Option (FVO) of the 1996 welfare law (P.L. 104-193) permits state programs of Temporary Assistance for Needy Families (TANF) to waive federal rules regarding required work, time limited benefits, and child support cooperation for victims of domestic violence.
Date: November 1, 2002
Creator: Cooke, Jacqueline & Burke, Vee
Partner: UNT Libraries Government Documents Department
open access

Homeland Security: Protecting Airliners from Terrorist Missiles

Description: This report discusses about the Homeland Security on Protecting Airliners from Terrorist Missiles where Recent events have focused attention on the threat that terrorists with shoulder fired surface-to-air missiles (SAMs) pose to commercial airliners. Most believe that no single solution exists to effectively mitigate this threat.
Date: November 3, 2003
Creator: Bolkcom, Christopher; Elias, Bartholomew & Feickert, Andrew
Partner: UNT Libraries Government Documents Department
open access

Homeland Security: Protecting Airliners from Terrorist Missiles

Description: This report discusses about the Homeland Security on Protecting Airliners from Terrorist Missiles where Recent events have focused attention on the threat that terrorists with shoulder fired surface-to-air missiles pose to commercial airliners. Most believe that no single solution exists to effectively mitigate this threat.
Date: March 25, 2003
Creator: Bolkcom, Christopher & Elias, Bartholomew
Partner: UNT Libraries Government Documents Department
open access

Homeland Security: Protecting Airliners from Terrorist Missiles

Description: This report discusses about the Homeland Security on Protecting Airliners from Terrorist Missiles where Recent events have focused attention on the threat that terrorists with shoulder fired surface-to-air missiles (SAMs) pose to commercial airliners. Most believe that no single solution exists to effectively mitigate this threat.
Date: February 12, 2003
Creator: Bolkcom, Christopher & Elias, Bartholomew
Partner: UNT Libraries Government Documents Department
open access

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Date: April 1, 2005
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department
open access

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity inte… more
Date: October 17, 2003
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department
Back to Top of Screen