Search Results

open access

Clean Water Act and Pollutant Total Maximum Daily Loads (TMDLs)

Description: This report discusses the total maximum daily load (TMDL) program which regulates pollutants to ensure that water quality standards can be attained; section 303(d) of the Clean Water Act requires states to identify waters that are impaired by pollution, even after application of pollution controls. The report focuses on new challenges facing the TMDL program, including more complex TMDLs, larger scale impairments, and nonpoint sources.
Date: September 21, 2012
Creator: Copeland, Claudia
Partner: UNT Libraries Government Documents Department
open access

Comparison of Rights in Military Commission Trials and Trials in Federal Criminal Court

Description: The initiation of military commission proceedings against Khalid Sheik Mohammad and four others for their alleged involvement in the 9/11 terrorist attacks has focused renewed attention on the differences between trials in federal court and those conducted by military commission. This report provides a brief summary of legal issues raised by the choice of forum for trying accused terrorists and a chart comparing selected military commissions rules under the Military Commissions Act, as amended,… more
Date: May 9, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

The Crime Victims Fund: Federal Support for Victims of Crime

Description: Report that provides background and funding information for Victims of Crime Act (VOCA) programs and the Crime Victims Fund (CVF). It describes the process through which CVF funds are allocated and explains how the CVF impacts the annual budget for Department of Justice (DOJ).
Date: August 22, 2012
Creator: Sacco, Lisa N.
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: May 23, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: July 20, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issu… more
Date: May 2, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues.
Date: April 26, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity iss… more
Date: April 26, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis

Description: The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Date: March 12, 2012
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Detention of U.S. Persons as Enemy Belligerents

Description: This report provides a background to the National Defense Authorization Act for FY2012, the Authorization to use Military Force act, and the President's power to detain "enemy combatants." It then gives a brief introduction to the law of war pertinent to the detention of different categories of individuals and an overview of U.S. practice during wartime to detain persons deemed dangerous to national security. It concludes by discussion Congress's role in prescribing rules for wartime detention … more
Date: February 1, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Detention of U.S. Persons as Enemy Belligerents

Description: This report provides a background to the legal issues presented, followed by a brief introduction to the law of war pertinent to the detention of different categories of individuals. An overview of U.S. practice during wartime to detain persons deemed dangerous to the national security is presented. The report concludes by discussing Congress's role in prescribing rules for wartime detention as well as legislative proposals in the 112th Congress to address the detention of U.S. persons.
Date: December 4, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Detention of U.S. Persons as Enemy Belligerents

Description: The detainee provisions passed as part of the National Defense Authorization Act for FY2012 affirm that the Authorization for Use of Military Force in response to the terrorist attacks of September 11, 2001, authorizes the detention of persons captured in connection with hostilities. This report provides a background to the legal issues presented, followed by a brief introduction to the law of war pertinent to the detention of different categories of individuals. An overview of U.S. practice du… more
Date: April 11, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Detention of U.S. Persons as Enemy Belligerents

Description: The detainee provisions passed as part of the National Defense Authorization Act for FY2012 affirm that the Authorization for Use of Military Force in response to the terrorist attacks of September 11, 2001, authorizes the detention of persons captured in connection with hostilities. This report provides a background to the legal issues presented, followed by a brief introduction to the law of war pertinent to the detention of different categories of individuals. An overview of U.S. practice du… more
Date: February 1, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

DNA Testing in Criminal Justice: Background, Current Law, Grants, and Issues

Description: This report provides an overview of how DNA is used to investigate crimes and help protect the innocent. It also reviews current statutory law on collecting DNA samples, sharing DNA profiles generated from those samples, and providing access to post-conviction DNA testing. The report also includes a summary of grant programs authorized by Congress to assist state and local governments with reducing DNA backlogs, provide post-conviction DNA testing, and promote new technology in the field.
Date: December 6, 2012
Creator: James, Nathan
Partner: UNT Libraries Government Documents Department
Back to Top of Screen