Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

The Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF): Budget and Operations for FY2008, FY2009, and FY2010

Description: This report provides an overview of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) budget and operations for FY2008, FY2009, and FY2010. It chronicles congressional action on the annual Commerce, Justice, Science (CJS), and Related Agencies Appropriations bills for those fiscal years, as well as action on supplemental and stimulus appropriations bills.
Date: April 15, 2010
Creator: Krouse, William J.
Partner: UNT Libraries Government Documents Department

Terrorist Attacks on Commercial Airlines: Federal Criminal Prohibitions

Description: This report is a brief description of offenses with which terrorists may be charged, an outline of the penalties to which they may be subject, and of the jurisdictional circumstances under which offenses they may be federally prosecuted regardless of whether they are committed within the United States or overseas.
Date: January 22, 2010
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Federal Involvement in Sex Offender Registration and Notification: Overview and Issues for Congress, In Brief

Description: This report begins with a brief background on sex offender crime and policy in the United States, followed by a description of the role of the federal government in sex offender registration and notification. It concludes with a discussion of select issues on which Congress may exercise additional oversight or address through legislation.
Date: March 25, 2015
Creator: Sacco, Lisa N.
Partner: UNT Libraries Government Documents Department

Federal Efforts to Address the Threat of Bioterrorism: Selected Issues for Congress

Description: This report focuses on four areas critical to the success of the biodefense enterprise that the 111th Congress is likely to consider: strategic planning; risk assessment; surveillance; and the development, procurement, and distribution of medical countermeasures.
Date: March 18, 2010
Creator: Gottron, Frank & Shea, Dana A.
Partner: UNT Libraries Government Documents Department

Gangs in Central America

Description: This report describes the gang problem in Central America, discusses country and regional approaches to deal with the gangs, and analyzes U.S. policy with respect to gangs in Central America.
Date: January 11, 2010
Creator: Seelke, Clare Ribando
Partner: UNT Libraries Government Documents Department

Hate Crime Legislation

Description: This report provides an overview of the hate crime debate, with background on current law and hate crime statistics, and a legislative history of hate crime prevention bills in recent Congresses. This report does not analyze the constitutional or other legal issues that often arise as part of the hate crime debate.
Date: January 15, 2010
Creator: Krouse, William J.
Partner: UNT Libraries Government Documents Department

Missing and Exploited Children: Background, Policies, and Issues

Description: This report covers only select aspects of the broader topic of missing and exploited children. It begins with an overview of the scope of the missing and exploited children issue, including definitions and approximate numbers of children known to be missing or exploited. The report also provides information about the Missing and Exploited Children's (MEC) program's funding, oversight, and major components. Finally, the report discusses issues that may be relevant to the MEC program.
Date: April 29, 2015
Creator: Fernandes-Alcantara, Adrienne L.
Partner: UNT Libraries Government Documents Department

Federal Efforts to Address the Threat of Bioterrorism: Selected Issues and Options for Congress

Description: This report focuses on four areas under congressional consideration deemed critical to the success of the biodefense enterprise: strategic planning; risk assessment; surveillance; and the development, procurement, and distribution of medical countermeasures. This report also discusses the effectiveness and sufficiency of programs implementing these aspects of the federal biodefense efforts, outside analysts' suggestions for improving the government's efforts, and current issues under congressional consideration.
Date: February 8, 2011
Creator: Gottron, Frank & Shea, Dana A.
Partner: UNT Libraries Government Documents Department

Failure to Register as a Sex Offender: An Abridged Legal Analysis of 18 U.S.C. 2250

Description: Report that describes 18 U.S.C. 2250, which outlaws any individual convicted of a sex offense from not registering themselves in a jurisdiction which they live, work, or go to school. It describes elements of the law, and consequences for not following it.
Date: August 30, 2012
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Failure to Register as a Sex Offender: An Abridged Legal Analysis of 18 U.S.C. 2250

Description: Report that describes 18 U.S.C. 2250, which outlaws any individual convicted of a sex offense from not registering themselves in a jurisdiction which they live, work, or go to school. It describes elements of the law, and consequences for not following it.
Date: August 30, 2012
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Murder or Attempted Murder of a Member of Congress and Other Federal Officials and Employees: Implications in Federal Criminal Law and Procedure of Events in Tucson

Description: Report describing the federal procedures and attendant legal provisions generally associated with the prosecution of cases regarding the killing and attempted killing of federal officers and employees in the performance of their official duties.
Date: January 25, 2011
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act.
Date: December 27, 2010
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

DNA Testing in Criminal Justice: Background, Current Law, Grants, and Issues

Description: This report provides an overview of how DNA is used to investigate crimes and help protect the innocent. It also reviews current statutory law on collecting DNA samples, sharing DNA profiles generated from those samples, and providing access to post-conviction DNA testing. The report also includes a summary of grant programs authorized by Congress to assist state and local governments with reducing DNA backlogs, provide post-conviction DNA testing, and promote new technology in the field. It also reviews select issues Congress might consider should it legislate or conduct oversight in this area.
Date: May 2, 2011
Creator: James, Nathan
Partner: UNT Libraries Government Documents Department

Davis v. United States: Retroactivity and the Good-Faith Exception to the Exclusionary Rule

Description: This report covers the legal causes and implications of Davis v. United States. The Supreme Court will consider whether evidence that was seized in violation of the defendant’s Fourth Amendment rights is admissible at trial because the police seized the evidence in good-faith reliance on then-controlling case law.
Date: April 19, 2011
Creator: Barbour, Emily C.
Partner: UNT Libraries Government Documents Department

The Federal Grand Jury

Description: This report discusses the federal grand jury, which exists to investigate crimes against the United States and to secure the constitutional right of grand jury indictment.
Date: May 7, 2015
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Smart Meter Data: Privacy and Cybersecurity

Description: Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. Smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. Detailed electricity usage data offers a window into the lives of people inside of a home by revealing what individual appliances they are using, and the transmission of the data potentially subjects this information to interception or theft by unauthorized third parties or hackers. Unforeseen consequences under federal law may result from the installation of smart meters and the communications technologies that accompany them. This report examines federal privacy and cybersecurity laws that may apply to consumer data collected by residential smart meters.
Date: February 3, 2012
Creator: Murrill, Brandon J.; Liu, Edward, C. & Thompson, Richard M., II
Partner: UNT Libraries Government Documents Department