Search Results

open access

Organized Crime: An Evolving Challenge for U.S. Law Enforcement

Description: This report provides an analysis of how organized crime has capitalized on globalization by using borders as opportunities, relying on fast-paced technological change, and adapting its organizational structures. It illustrates how these transformations can impact U.S. persons, businesses, and interests. The report includes a discussion of how U.S. law enforcement conceptualizes organized crime in the 21st century and concludes by examining potential issues for Congress, including the extent to … more
Date: December 23, 2010
Creator: Bjelopera, Jerome P. & Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

Clean Energy Standard: Potential Qualifying Energy Sources

Description: This report begins with a brief examination of clean energy, renewable energy, and alternative energy. It then presents possible selection criteria Congress could use to determine which sources could be eligible for a CES depending on the goal(s) of the CES. The report provides an overview of the energy sources most commonly discussed as potential CES qualifying sources: biomass, fossil fuels (natural gas combined-cycle and coal-fired power plants with carbon capture and sequestration), geother… more
Date: May 3, 2011
Creator: Bracmort, Kelsi; Folger, Peter; Holt, Mark; Ratner, Michael & Sissine, Fred
Partner: UNT Libraries Government Documents Department
open access

U.S. Renewable Electricity: How Does Wind Generation Impact Competitive Power Markets?

Description: This report analyzes the impacts of wind generation on competitive power markets, including financial and economic impacts on electric power generators. Overall, the report aims to provide context for several electricity market concepts that are relevant to understanding the economic effects of wind power generation.
Date: November 7, 2012
Creator: Brown, Phillip
Partner: UNT Libraries Government Documents Department
open access

Electric Grid Cybersecurity

Description: This report discusses the current state of electric grid cybersecurity, and the interconnected dependency of critical infrastructure with regard to electric sector reliability. It includes discussions of recent developments, cyber and physical security, threats to the grid and supply chain risks, use of artificial intelligence, improvements to grid cybersecurity, recent legislation and other issues for Congress.
Date: September 4, 2018
Creator: Campbell, Richard J.
Partner: UNT Libraries Government Documents Department
open access

The Smart Grid: Status and Outlook

Description: This report discusses the effort to build a "smart" electricity grid across the the U.S. which can be run with digital technologies that control most of the major functions of a power plant. The current state of the movement and concerns regarding cyber-security are also discussed.
Date: April 10, 2018
Creator: Campbell, Richard J.
Partner: UNT Libraries Government Documents Department
open access

Unmanned Aircraft Systems (UAS): Commercial Outlook for a New Industry

Description: This report discusses unmanned aircraft systems (UAS)--commonly referred to as drones-- which have become a staple of U.S. military reconnaissance and weapons delivery in overseas war zones such as Afghanistan. Now some new technologies and pending federal regulations are enabling the manufacture and use of UAS in domestic commerce, giving rise to a growing commercial UAS industry.
Date: September 9, 2015
Creator: Canis, Bill
Partner: UNT Libraries Government Documents Department
open access

The Advanced Technology Vehicles Manufacturing (ATVM) Loan Program: Status and Issues

Description: This report discusses the Advanced Technology Vehicles Manufacturing (ATVM) Loan Program by the Department of Energy (DOE). Furthermore, the report establishes the program as giving loans to businesses in the automotive industry to make new factories or redesign old ones to produce vehicles that achieve at least 25% higher fuel economy than vehicles from 2005. The report also covers the spending on the program and the requirements to receive a loan.
Date: January 15, 2015
Creator: Canis, Bill & Yacobucci, Brent D.
Partner: UNT Libraries Government Documents Department
open access

Desalination and Membrane Technologies: Federal Research and Adoption Issues

Description: This report discusses emerging technologies (e.g., forward osmosis, nanocomposite and chlorine resistant membranes) that show promise for reducing desalination costs. It also discusses the research to support development of emerging technologies and to reduce desalination's environmental and social impacts.
Date: January 2, 2015
Creator: Carter, Nicole T.
Partner: UNT Libraries Government Documents Department
open access

Desalination and Membrane Technologies: Federal Research and Adoption Issues

Description: This report discusses emerging technologies (e.g., forward osmosis, nanocomposite and chlorine resistant membranes) show promise for reducing desalination costs. It discusses the Research to support development of emerging technologies and to reduce desalination's environmental and social impacts.
Date: January 8, 2013
Creator: Carter, Nicole T.
Partner: UNT Libraries Government Documents Department
open access

OPM Data Breach: Personnel Security Background Investigation Data

Description: This report provides information on the types of data that may be collected in a typical personnel security background investigation. In a July 9, 2015, news release on the cyber-intrusions of its systems, OPM "concluded with high confidence that sensitive information, including the Social Security Numbers (SSNs) of 21.5 million individuals, was stolen from the background investigation databases." This report is not an official statement of the data that was compromised in the OPM breach.
Date: July 24, 2015
Creator: Christensen, Michelle D.
Partner: UNT Libraries Government Documents Department
open access

The Endangered Species Act and “Sound Science”

Description: This report approaches the complex issues surrounding "sound science" by discussing recent controversies, the role of science in general, what science is and what it can and cannot do - as the background for assessing the adequacy of science in ESA implementation; the role of science in legal and policy ESA context; legislation to address concerns relating to ESA science
Date: January 23, 2013
Creator: Corn, M. Lynne; Alexander, Kristina & Buck, Eugene H.
Partner: UNT Libraries Government Documents Department
open access

Alternative Fuel and Advanced Vehicle Technology Incentives: A Summary of Federal Programs

Description: This report describes incentives and programs aimed at deploying alternative fuel and engines, such as tax deductions, federal grants for upgrading old cars, and mandates for biofuel use. The report lists incentives and programs by agency.
Date: June 2, 2015
Creator: Cunningham, Lynn J.; Cook, Beth; Canis, Bill & Yacobucci, Brent D.
Partner: UNT Libraries Government Documents Department
open access

Data Security and Breach Notification Legislation: Selected Legal Issues

Description: This report describes the common elements of several data security and breach notification bills that have been introduced in the 114th Congress, which broadly would impose security and notification requirements on businesses regardless of industry sector. It also discusses state laws that may apply in the event of a data breach and addresses two legal issues that may arise in consideration of new legislation about data security and breach notification.
Date: December 28, 2015
Creator: Dolan, Alissa M.
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketc… more
Date: December 27, 2010
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis

Description: This report discusses the Cyber Crime Protection Security Act (S. 2111) that would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rep… more
Date: January 28, 2013
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis

Description: The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Date: March 12, 2012
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Protecting Civil Aviation from Cyberattacks

Description: This report briefly discusses cyber-security issues in civil aviation. unclear. A recent probe into alleged hacking incidents unfolded just weeks after the Federal Bureau of Investigation (FBI) and the Transportation Security Administration (TSA) alerted airlines to be on the lookout for passengers trying to tap into aircraft electronics and for evidence of tampering or network intrusions.
Date: June 18, 2015
Creator: Elias, Bart
Partner: UNT Libraries Government Documents Department
open access

Telehealth Services Proposed for Medicare Part B Reimbursements, 2018: Fact Sheet

Description: This report discusses telehealth services covered under Medicare and describes the five conditions that a telehealth service must meet to be covered and paid for under Medicare Part B, provides an overview of how the Secretary of the Department of Health and Human Services (HHS) adds telehealth services to Medicare's reimbursable list, and includes a table listing the proposed telehealth services to be added to the CY2018 list for Medicare reimbursement.
Date: November 15, 2017
Creator: Elliott, Victoria L.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen