Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

Identity Theft: Trends and Issues

Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule, effective June 1, 2010.
Date: January 5, 2010
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report discusses the concept of cybercrime and related cyber threats such as cyber espionage and cyber warfare, and questions whether--and under what circumstances--clear distinctions between the various threats should be delineated. It also outlines how current federal strategies may address cybercrime, including issues surrounding the measurement and tracking of cybercrime.
Date: January 15, 2015
Creator: Finklea, Kristin & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Identity Theft: Trends and Issues

Description: In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud—the highest level since 2007. Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation's economy but its security. Consequently, in securing the nation and its economic health, policy makers are also tasked with reducing identity theft and its impact.
Date: February 15, 2012
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: May 23, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: July 20, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Comparison of the World Trade Center Medical Monitoring and Treatment Program and the World Trade Center Health Program Created by Title I of P.L. 111-347, the James Zadroga 9/11 Health and Compensation Act of 2010

Description: This report compares the current federally-supported medical screening and treatment program offered to various persons affected by the terrorist attacks of September 11, 2001, with the federal program established by Title I of P.L. 111-347, the James Zadroga 9/11 Health and Compensation Act of 2010.
Date: January 25, 2011
Creator: Szymendera, Scott & Lister, Sarah A.
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.
Date: August 16, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Agricultural Disaster Assistance

Description: This report briefly discusses the federal grand jury, which exists to investigate crimes against the United States and to secure the constitutional right of grand jury indictment.
Date: May 20, 2015
Creator: Shields, Dennis A.
Partner: UNT Libraries Government Documents Department

Terrorist Watch List Screening and Brady Background Checks for Firearms

Description: The November 2009 shooting at Fort Hood, TX, renewed interest in terrorist watchlist screening and Brady background checks for firearms through the National Instant Criminal Background Check System (NICS). In the 110th Congress, Senator Frank Lautenberg and Representative Peter King introduced a bill based on a legislative proposal developed by DOJ that would have authorized the Attorney General to deny the transfer of firearms or the issuance of firearms (and explosives) licenses/permits to "dangerous terrorists." They reintroduced this proposal in the 111th Congress and supporters dubbed it the "Terror Gap" proposal. It was reintroduced once again in the 112th Congress. The Terror Gap proposal raises several potential issues for Congress, which are discussed in this report.
Date: February 1, 2012
Creator: Krouse, William J.
Partner: UNT Libraries Government Documents Department

Federal Grand Juries: The Law in a Nutshell

Description: This report discusses the history and current role of the federal grand jury in the American criminal justice system. The federal grand jury exists to investigate crimes against the United States and to secure the constitutional right of grand jury indictment. Its responsibilities require broad powers. As an arm of the United States District Court which summons it, upon whose process it relies, and which will receive any indictments it returns, the grand jury's subject matter and geographical jurisdiction is that of the court to which it is attached.
Date: October 3, 2005
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Charleston, SC, Mass Shooter Might Have Been Denied a Handgun If Not for Possible Recordkeeping Oversights

Description: This report briefly discusses the announcement by Federal Bureau of Investigation (FBI) Director James Comey that the alleged assailant in the Charleston, SC, mass murder/shooting at the Emanuel African Methodist Episcopal Church might have been prevented from acquiring a handgun if not for possible recordkeeping oversights on the part of the FBI and Columbia, SC, city police and county sheriff's departments.
Date: July 13, 2015
Creator: Krouse, William J.
Partner: UNT Libraries Government Documents Department

Immigration Consequences of Criminal Activity

Description: This report discusses the potential immigration consequences of criminal activity. “Criminal activity” generally refers to conduct for which an alien has been found or plead guilty before a court of law, though in limited circumstances consequences may attach to the commission of a crime or admission of acts constituting the essential elements of a crime. Consequences may flow from violations of either federal, state or, in many circumstances, foreign criminal law. Some federal crimes are set out in the INA itself — alien smuggling, for example. However, not all violations of immigration law are crimes. Notably, being in the U.S. without legal permission — i.e., being an “illegal alien” — is not a crime in and of itself. Thus, for example, an alien who overstays a student visa may be an “illegal alien,” in that the alien may be subject to removal from the U.S., but such an alien is not a “criminal alien.”
Date: October 23, 2006
Creator: Garcia, Michael John & Eig, Larry M
Partner: UNT Libraries Government Documents Department

The Insanity Defense: An Overview and Legislative Proposals

Description: This report will discuss the insanity defense as used in the federal courts. It will briefly trace the history of the evolution of that defense from its earliest formulation to the version used in the John Hinckley case, and will provide, in summary form, descriptive analysis of various pieces of Legislation to change federal law with regard to the substantive definition of the defense, the allocation of the burden of persuasion when the defense is invoked, and procedures following the successful use of the defense.
Date: July 19, 1982
Creator: Marion, Catherine
Partner: UNT Libraries Government Documents Department

Department of Justice (DOJ) Appropriations for FY2008 and FY2009

Description: This report provides a discussion of funding for the U.S. Department of Justice (DOJ) for fiscal years 2008 and 2009, including background information, a breakdown of funding from FY2008 regular and supplemental funding, and budget requests for FY2009.
Date: June 10, 2008
Creator: Krouse, William J.; Franco, Celinda & James, Nathan
Partner: UNT Libraries Government Documents Department