Reviews and compiles the latest statistics on the incidence and societal cost of identity theft (IT). Generally, IT or identity fraud involves "stealing" another person's personal identifying info. -- such as Social Security number, date of birth, and mother's maiden name -- and then using the info. to fraudulently establish credit, run up debt, or take over existing financial accounts. This report provides info. on: the extent or prevalence of IT; the cost of IT to the financial services industry, including direct fraud losses, staffing of fraud departments, and effect on consumer confidence in online commerce; the cost of IT to victims, including victim productivity losses, out-of-pocket expenses, and cost of being denied credit; and the cost of IT to the Fed. criminal justice system.
The U.S. Border Patrol operates checkpoints on U.S. roads, mainly in the southwest border states where most illegal entries occur. As part of a three-tiered strategy to maximize detection and apprehension of illegal aliens, Border Patrol agents at checkpoints screen vehicles for illegal aliens and contraband. This report assesses:(1) checkpoint performance and factors affecting performance; (2) checkpoint performance measures; (3) community impacts considered in checkpoint placement and design; and (4) the impact of checkpoint operations on nearby communities. Research included a review of Border Patrol data and guidance, and visits to checkpoints and communities in five Border Patrol sectors across four southwest border states. Illus.
Since 9/11, a concern has been that terrorists or their supporters would seek to immigrate to the U.S. (i.e., seek lawful permanent residency (LPR)). The U.S. Citizenship and Immigration Services (USCIS) conducts background checks for those applying for LPR. This report reviews USCIS's processes for screening individuals applying for LPR. The auditor assessed: what data show about the extent to which national security concerns were discovered during USCIS background checks for LPR applications; what issues USCIS has encountered in its background check processes and what actions have been taken to resolve those issues; and the extent to which USCIS has addressed fraud vulnerabilities in its adjudication procedures for LPR. Illus.
Section 287(g) of the Immigration and Nationality Act, as amended, authorizes the fed. govt. to enter into agreements with state and local law enforcement agencies to train officers to assist in identifying those individuals who are in the country illegally. U.S. Immigration and Customs Enforcement (ICE) is responsible for supervising state and local officers under this program. This report reviews: (1) the extent to which ICE has designed controls to govern 287(g) program implementation; and (2) how program resources are being used and the activities, benefits, and concerns reported by participating agencies. Illustrations.
In November 2005, the Dept. of Homeland Security announced the launch of the Secure Border Initiative (SBI), a multiyear, multibillion dollar program aimed at securing U.S. borders and reducing illegal immigration. The U.S. Custom and Border Protection's (CBP) SBI program is responsible for developing a comprehensive border protection system using technology, known as SBInet, and tactical infrastructure -- fencing, roads, and lighting. This report addresses: (1) the extent to which CBP has implemented SBInet and the impact of delays that have occurred; and (2) the extent to which CBP has deployed tactical infrastructure and assessed its results. Includes recommendations. Charts and tables.
The Illegal Immigration Reform and Immigrant Responsibility Act of 1996 included provisions establishing an expedited removal (ER) process for dealing with aliens who attempt to enter the U.S. by engaging in fraud or misrepresentation or those who arrive with fraudulent, improper, or no documents. Aliens who are subject to ER and assert a fear of being returned to their home country or country of last residence are to be provided a credible fear (CF) interview. This CF interview identified aliens whose asylum claims have a possibility of succeeding. Recommends that INS reevaluate its policy for deciding when to release aliens who have a CF of persecution.
Covering nearly 4,000 miles of land and water from Washington to Maine, the U.S.-Canadian border is the longest undefended border in the world. The U.S. Customs and Border Protection, in collaboration with other fed., state, local, tribal, and Canadian entities have the primary responsibility for security. The Sec. of Homeland Security is required to submit a report to Congress that addresses the vulnerabilities along the northern border, and provides recommendations and required resources to address them. This report examined: (1) the extent to which the DHS report to Congress is responsive to the legislative requirements; and (2) actions that may be necessary to address northern border vulnerabilities in addition to the actions addressed in the report.
Contains profiles of felons incarcerated in Fed. and state correctional facilities, using data from the two most recent surveys of inmates in Fed. and state correctional facilities. It addresses the following questions: (1) what were the overall profiles -- personal demographics, family background, criminal record, drug history, and treatment participation -- for state and for Fed. prison inmates in 1997, and were there any differences between state and Fed. inmates or by current offense type, race, and gender?; and (2) in comparing the 1991 and 1997 profiles, were there any changes in the overall profiles for state and for Fed. inmates or by current offense type, race, and gender?
An eligible person or bus. may file a protest challenging a Fed. contract award or the procedure by which the offers were solicited. This report reviews the cases, particularly small business (SB) cases, that have been filed in district courts and U.S. Court of Fed. Claims (COFC) (Courts) since the Admin. Dispute Resolution Act of 1996 took effect. The report's objectives are to: identify the # of bid protest cases filed in the Courts between 1997 and 1999, that were filed by SB, the type of agencies involved, and the amount of the procurement; identify the perceived advantages and disadvantages, particularly for SB, of filing bid protest cases in each judicial forum.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.