Search Results

open access

Detention of U.S. Persons as Enemy Belligerents

Description: The detainee provisions passed as part of the National Defense Authorization Act for FY2012 affirm that the Authorization for Use of Military Force in response to the terrorist attacks of September 11, 2001, authorizes the detention of persons captured in connection with hostilities. This report provides a background to the legal issues presented, followed by a brief introduction to the law of war pertinent to the detention of different categories of individuals. An overview of U.S. practice du… more
Date: April 11, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Immigration-Related Detention: Current Legislative Issues

Description: As Congress considers addressing some of the problems in the nation's immigration system, the detention of noncitizens in the United States may be an issue as Congress may choose to reevaluate detention priorities (i.e., who should be detained) and resources. There are many policy issues surrounding detention of aliens. The Illegal Immigrant Reform and Immigrant Responsibility Act of 1996 (IIRIRA) increased the number of aliens subject to mandatory detention, and raised concerns about the justn… more
Date: January 12, 2012
Creator: Siskin, Alison
Partner: UNT Libraries Government Documents Department
open access

Protecting Classified Information and the Rights of Criminal Defendants: The Classified Information Procedures Act

Description: A criminal prosecution involving classified information may cause tension between the government's interest in protecting classified information and the criminal defendant's right to a constitutionally valid trial. In some cases, a defendant may threaten to disclose classified information in an effort to gain leverage. Concerns about this practice, referred to as "graymail," led the 96th Congress to enact the Classified Information Procedures Act to provide uniform procedures for prosecutions i… more
Date: April 2, 2012
Creator: Liu, Edward C. & Garvey, Todd
Partner: UNT Libraries Government Documents Department
open access

Extraterritorial Application of American Criminal Law

Description: Crime is ordinarily proscribed, tried, and punished according to the laws of the place where it occurs. American criminal law applies beyond the geographical confines of the United States, however, under certain limited circumstances. A surprising number of federal criminal statutes have extraterritorial application, but prosecutions have been few. This may be because when extraterritorial criminal jurisdiction does exist, practical and legal complications, and sometimes diplomatic consideratio… more
Date: February 15, 2012
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issu… more
Date: May 2, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

The Domestic Terrorist Threat: Background and Issues for Congress

Description: In the last decade, domestic terrorists-people who commit crimes within the homeland and draw inspiration from U.S.-based extremist ideologies and movements-have killed American citizens and damaged property across the country. Not all of these criminals have been prosecuted under terrorism statutes. This report discusses domestic terrorism's significance to policymakers per five topics: level of activity, use of nontraditional tactics, exploitation of the internet, decentralized nature of the … more
Date: May 15, 2012
Creator: Bjelopera, Jerome P.
Partner: UNT Libraries Government Documents Department
open access

Gun Control Legislation

Description: A look at past gun control legislation and also how recent events (such as the shooting in Tucson, AZ on January 8, 2011 which notably wounded Rep. Gabrielle Giffords) have influenced current legislation. This report concludes with discussion of other salient and recurring gun control issues that have generated past congressional interest.
Date: March 2, 2012
Creator: Krouse, William J.
Partner: UNT Libraries Government Documents Department
open access

Comparison of Rights in Military Commission Trials and Trials in Federal Criminal Court

Description: The initiation of military commission proceedings against Khalid Sheik Mohammad and four others for their alleged involvement in the 9/11 terrorist attacks has focused renewed attention on the differences between trials in federal court and those conducted by military commission. This report provides a brief summary of legal issues raised by the choice of forum for trying accused terrorists and a chart comparing selected military commissions rules under the Military Commissions Act, as amended,… more
Date: May 9, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Judicial Activity Concerning Enemy Combatant Detainees: Major Court Rulings

Description: This report discusses major judicial opinions concerning suspected enemy belligerents detained in the conflict with Al Qaeda and the Taliban. The report addresses all Supreme Court decisions concerning enemy combatants. It also discusses notable circuit court opinions addressing issues of ongoing relevance.
Date: April 6, 2012
Creator: Elsea, Jennifer K. & Garcia, Michael John
Partner: UNT Libraries Government Documents Department
open access

Identity Theft: Trends and Issues

Description: In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud—the highest level since 2007. Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation's economy but its security. Consequently, in securing the nation and its economic health, policy makers are also tasked wit… more
Date: February 15, 2012
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Description: Globalization and technological innovation have fostered the expansion of both legitimate and criminal operations across physical borders as well as throughout cyberspace. U.S. law enforcement has increasingly relied on intelligence-led policing, enhanced interagency cooperation, and technological implementation to confront 21st century crime. Issues for Congress are how it can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime… more
Date: February 15, 2012
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis

Description: The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Date: March 12, 2012
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues.
Date: April 26, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Terrorist Watch List Screening and Brady Background Checks for Firearms

Description: The November 2009 shooting at Fort Hood, TX, renewed interest in terrorist watchlist screening and Brady background checks for firearms through the National Instant Criminal Background Check System (NICS). In the 110th Congress, Senator Frank Lautenberg and Representative Peter King introduced a bill based on a legislative proposal developed by DOJ that would have authorized the Attorney General to deny the transfer of firearms or the issuance of firearms (and explosives) licenses/permits to "d… more
Date: February 1, 2012
Creator: Krouse, William J.
Partner: UNT Libraries Government Documents Department
open access

Detention of U.S. Persons as Enemy Belligerents

Description: The detainee provisions passed as part of the National Defense Authorization Act for FY2012 affirm that the Authorization for Use of Military Force in response to the terrorist attacks of September 11, 2001, authorizes the detention of persons captured in connection with hostilities. This report provides a background to the legal issues presented, followed by a brief introduction to the law of war pertinent to the detention of different categories of individuals. An overview of U.S. practice du… more
Date: February 1, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Smart Meter Data: Privacy and Cybersecurity

Description: Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. Smart meters must record near-real time data on consumer electricity usage and transmit the data t… more
Date: February 3, 2012
Creator: Murrill, Brandon J.; Liu, Edward C. & Thompson, Richard M., II
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity iss… more
Date: April 26, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Date: May 23, 2012
Creator: Finklea, Kristin M. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Trafficking in Persons: U.S. Policy and Issues for Congress

Description: Trafficking in persons (TIP) for the purposes of exploitation is believed to be one of the most prolific areas of international criminal activity and is of significant concern to the United States and the international community. This report discusses the global and ongoing problem of TIP in detail, as well as anti-TIP programs and U.S. and international efforts to combat TIP.
Date: January 12, 2012
Creator: Siskin, Alison & Wyler, Liana Sun
Partner: UNT Libraries Government Documents Department
open access

Latin America: Terrorism Issues

Description: U.S. attention to terrorism in Latin America intensified in the aftermath of the September 2001 terrorist attacks on New York and Washington, with an increase in bilateral and regional cooperation. Over the past several years, policymakers have been concerned about Iran's increasing activities in Latin America, particularly its relations with Venezuela, although there has been disagreement over the extent and significance of Iran's relations with the region. In the 112th Congress, several initi… more
Date: January 5, 2012
Creator: Sullivan, Mark P.
Partner: UNT Libraries Government Documents Department
open access

Organized Crime: An Evolving Challenge for U.S. Law Enforcement

Description: In the last two decades, organized crime has grown more complex, posing evolving challenges for U.S. federal law enforcement. These criminals have transformed their operations in ways that broaden their reach and make it harder for law enforcement to combat them. They have adopted more-networked structural models, internationalized their operations, and grown more tech savvy. They are a significant challenge to U.S. law enforcement. There still is no single agency charged with investigating org… more
Date: January 6, 2012
Creator: Bjelopera, Jerome P. & Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

Detention of U.S. Persons as Enemy Belligerents

Description: This report provides a background to the National Defense Authorization Act for FY2012, the Authorization to use Military Force act, and the President's power to detain "enemy combatants." It then gives a brief introduction to the law of war pertinent to the detention of different categories of individuals and an overview of U.S. practice during wartime to detain persons deemed dangerous to national security. It concludes by discussion Congress's role in prescribing rules for wartime detention … more
Date: February 1, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen