Congressional Research Service Reports - 377 Matching Results

Search Results

Comparison of Rights in Military Commission Trials and Trials in Federal Criminal Court

Description: This report provides a brief summary of legal issues raised by the choice of forum for trying accused terrorists and a chart comparing selected military commissions rules under the Military Commissions Act, as amended, to the corresponding rules that apply in federal court.
Date: January 26, 2010
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department

Comparison of Rights in Military Commission Trials and Trials in Federal Criminal Court

Description: The initiation of military commission proceedings against Khalid Sheik Mohammad and four others for their alleged involvement in the 9/11 terrorist attacks has focused renewed attention on the differences between trials in federal court and those conducted by military commission. This report provides a brief summary of legal issues raised by the choice of forum for trying accused terrorists and a chart comparing selected military commissions rules under the Military Commissions Act, as amended, to the corresponding rules that apply in federal court.
Date: May 9, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department

Comparison of the World Trade Center Medical Monitoring and Treatment Program and the World Trade Center Health Program Created by Title I of P.L. 111-347, the James Zadroga 9/11 Health and Compensation Act of 2010

Description: This report compares the current federally-supported medical screening and treatment program offered to various persons affected by the terrorist attacks of September 11, 2001, with the federal program established by Title I of P.L. 111-347, the James Zadroga 9/11 Health and Compensation Act of 2010.
Date: January 25, 2011
Creator: Szymendera, Scott & Lister, Sarah A.
Partner: UNT Libraries Government Documents Department

Crime and Forfeiture

Description: This report provides an overview of federal forfeiture law. It sketches the origins and general attributes of forfeiture, describes the distribution of the hundreds of millions of dollars it generates, and identifies some of the related constitutional issues.
Date: January 22, 2015
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Crime and Forfeiture

Description: This report provides an overview of federal forfeiture law. It sketches the origins and general attributes of forfeiture, describes the distribution of the hundreds of millions of dollars it generates, and identifies some of the related constitutional issues.
Date: May 13, 2013
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Crime and Forfeiture: In Short

Description: This report provides a brief background information on property and trigger crimes and discusses civil forfeiture, criminal forfeiture, disposition of forfeited assets and constitutional considerations.
Date: January 22, 2015
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

The Crime Victims Fund: Federal Support for Victims of Crime

Description: This report provides background and funding information for Victims of Crime Act (VOCA) programs and the Crime Victims Fund (CVF). It describes the process through which CVF funds are allocated and explains how the CVF impacts the annual budget for DOJ. It then provides an analysis of selected issues that Congress may consider regarding the CVF and the federal budget.
Date: October 27, 2015
Creator: Sacco, Lisa N.
Partner: UNT Libraries Government Documents Department

The Crime Victims Fund: Federal Support for Victims of Crime

Description: Report that provides background and funding information for Victims of Crime Act (VOCA) programs and the Crime Victims Fund (CVF). It describes the process through which CVF funds are allocated and explains how the CVF impacts the annual budget for Department of Justice (DOJ).
Date: August 22, 2012
Creator: Sacco, Lisa N.
Partner: UNT Libraries Government Documents Department

Criminal Justice Reform: One Judge's View

Description: This report briefly provides highlights from an article written by Judge Alex Kozinski of the United States Court of Appeals for the Ninth Circuit, in which he recommended 26 changes in the U.S. criminal justice system, federal and state.
Date: January 1, 2016
Partner: UNT Libraries Government Documents Department

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act.
Date: December 27, 2010
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report discusses the concept of cybercrime and related cyber threats such as cyber espionage and cyber warfare, and questions whether--and under what circumstances--clear distinctions between the various threats should be delineated. It also outlines how current federal strategies may address cybercrime, including issues surrounding the measurement and tracking of cybercrime.
Date: January 15, 2015
Creator: Finklea, Kristin & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: May 23, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: July 20, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: March 8, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: March 20, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: May 22, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: January 17, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: April 17, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Date: May 24, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed.
Date: April 26, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department