Search Results

open access

Perjury Under Federal Law: A Brief Overview

Description: This report discusses the three general federal perjury laws. It is an abbreviated version of CRS Report 98-808, Perjury Under Federal Law: A Brief Overview, by Charles Doyle, stripped of most footnotes, quotations, citations, and bibliography.
Date: January 28, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Perjury Under Federal Law: A Sketch of the Elements

Description: This report discusses the three general federal perjury laws. It is an abbreviated version of CRS Report 98-808, Perjury Under Federal Law: A Brief Overview, by Charles Doyle, stripped of most footnotes, quotations, citations, and bibliography.
Date: January 28, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Body Armor for Law Enforcement Officers: In Brief

Description: This report contains an overview of the Bulletproof Vest Partnership Initiative (BPV program). It also provides a discussion of data on law enforcement agencies that require their officers to wear armor vests while on duty, research on why officers may choose to wear armor vests, research on the life cycle for armor vests, data on the use of body armor by law enforcement officers who were killed with a firearm, and research on the effectiveness of armor vests.
Date: January 28, 2016
Creator: James, Nathan
Partner: UNT Libraries Government Documents Department
open access

Federal Habeas Corpus: An Abridged Sketch

Description: This report discusses federal habeas corpus, which is a procedure under which a federal court may review the legality of an individualā€™s incarceration. It is most often invoked after conviction and the exhaustion of the ordinary means of appeal. It is at once the last refuge of scoundrels and the last hope of the innocent. It is an intricate weave of statute and case law whose reach has flowed and ebbed over time.
Date: April 28, 2006
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Standards For Retroactive Application Based Upon Groundbreaking Supreme Court Decisions in Criminal Law

Description: This report discusses the Supreme Court decision to announce the ā€œnew ruleā€, supreme courts decision that addresses an issue of law in a new way or for the first time. In criminal law new rules apply prospectively, but they also apply retroactively sometimes.
Date: September 28, 2004
Creator: Wallace, Paul Starett, Jr.
Partner: UNT Libraries Government Documents Department
open access

D.C. Gun Laws and Proposed Amendments

Description: In the wake of the Supreme Court's decision in District of Columbia v. Heller, which declared three firearms provisions of the D.C. Code unconstitutional, a flurry of legislation was introduced both in Congress and in the District of Columbia Council. This report provides an analysis of the District's firearms laws and congressional proposals.
Date: June 28, 2010
Creator: Chu, Vivian S.
Partner: UNT Libraries Government Documents Department
open access

Trying Terrorists as War Criminals

Description: On November 13, 2001, President Bush signed a Military Order pertaining to the detention, treatment, and trial of certain non-citizens in the war against terrorism. The Presidentā€™s Military Order makes it apparent that he plans to treat the attacks as acts of war rather than criminal acts, and to prosecute those responsible as war criminals, trying them by special military commission rather than in federal court. The purpose of this the report is to clarify the legal basis for treating the actsā€¦ more
Date: November 28, 2001
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Congress' Power to Legislate Control Over Hate Crimes: Selected Legal Theories

Description: Congress has no power under the commerce clause over ā€œnoneconomic, violent criminal conductā€ that does not cross state lines said Chief Justice William Rehnquist in United States v. Morrison. Congress, however, enjoys additional legislative powers under the spending clauses and the legislative clauses of the Thirteenth and Fifteenth Amendments. Extensive, if something less than all encompassing, national legislation may be possible under the confluence of authority conveyed by the commerce clauā€¦ more
Date: November 28, 2005
Creator: Wallace, Paul Starett, Jr.
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, protects federal computers, bank computers, and computers used in interstate and foreign commerce. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills crack and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of section 1030 and some of its federal statutory companions.
Date: June 28, 2005
Creator: Doyle, Charles & Weir, Alyssa Bartlett
Partner: UNT Libraries Government Documents Department
open access

Terrorists and Suicide Attacks

Description: This report analyzes the increasing global threat of suicide attacks by terrorist organizations and assesses their relevance and threat toward the interests of the United States. It focuses on several issues, such as the historical background of suicide attacks, personal and organizational motivations of suicide attacks, suicide attacks in Iraq, women and suicide attacks, how to counter attacks, and the implications for U.S. Policy
Date: August 28, 2003
Creator: Cronin, Audrey Kurth
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)ā€” A Legal Analysis

Description: This report discusses the Cyber Crime Protection Security Act (S. 2111) that would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Repā€¦ more
Date: January 28, 2013
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Description: This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs.
Date: August 28, 2014
Creator: James, Nathan
Partner: UNT Libraries Government Documents Department
open access

Trafficking in Persons in Latin America and the Caribbean

Description: This report describes the nature and scope of the problem of trafficking in persons in Latin America and the Caribbean. It then describes U.S. efforts to deal with trafficking in persons in the region, as well as discusses the successes and failures of some recent country and regional antitrafficking efforts. The report concludes by raising issues that may be helpful for the 113th Congress to consider as it continues to address human trafficking as part of its authorization, appropriations, andā€¦ more
Date: January 28, 2014
Creator: Ribando Seelke, Clare
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: The Council of Europe Convention

Description: Forty-three countries, including the United States, have signed the Council of Europeā€™s Convention on Cybercrime of November 2001. The U.S. Senate ratified the Convention on August 3, 2006. The Convention seeks to better combat cybercrime by harmonizing national laws, improving investigative abilities, and boosting international cooperation. Supporters argue that the Convention will enhance deterrence, while critics counter it will have little effect without participation by countries in which ā€¦ more
Date: September 28, 2006
Creator: Archick, Kristin
Partner: UNT Libraries Government Documents Department
open access

Deprivation of Honest Services as a Basis for Federal Mail and Wire Fraud Convictions

Description: The United States Supreme Court in Skilling v. United States construed the honest services branch of the federal mail and wire fraud statutes to reach no more than cases involving bribery or kickbacks. The mail and wire fraud statutes, 18 U.S.C. Ā§Ā§ 1341 and 1343, impose criminal penalties for the use of mail or interstate wire communications to deprive another of money or property through a "scheme or artifice to defraud." This report discusses wire and mail fraud and examines relevant court caā€¦ more
Date: July 28, 2010
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

State Statutes Governing Hate Crimes

Description: Concerns about hate crimes have become increasingly prominent among policymakers at all levels of government in recent years. This report compiles state statutes pertaining to hate crimes, including in the context of federal legislation such as the Violent Crime Control and Law Enforcement Act of 1994 and the Matthew Shepard and James Byrd Jr. Hate Crimes Prevention Act (the latter of which was signed by President Obama on October 28, 1999).
Date: September 28, 2010
Creator: Smith, Alison M. & Foley, Cassandra L.
Partner: UNT Libraries Government Documents Department
open access

Closing the Guantanamo Detention Center: Legal Issues

Description: This report provides an overview of major legal issues that are likely to arise as a result of executive and legislative action to close the Guantanamo detention facility. It discusses legal issues related to the transfer or release of Guantanamo detainees, the continued detention of such persons in the United States, and the possible removal of persons brought to the United States. It considers selected constitutional issues that may arise in the criminal prosecution of detainees. Issues discuā€¦ more
Date: March 28, 2011
Creator: Garcia, Michael John; Elsea, Jennifer K.; Mason, R. Chuck & Liu, Edward C.
Partner: UNT Libraries Government Documents Department
open access

Comparison of Rights in Military Commission Trials and Trials in Federal Criminal Court

Description: This report provides a brief summary of legal issues raised by the choice of forum for trying accused terrorists and a chart comparing selected military commissions rules under the Military Commissions Act, as amended, to the corresponding rules that apply in federal court.
Date: February 28, 2013
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen