Search Results

Adam Walsh Child Protection and Safety Act: A Sketch
This report briefly summarizes the Adam Walsh Child Protection Act. The report specifically notes the four intentions the law has such as reformulating the federal standards for sex offender registration, and amending criminal law and procedure at the federal level. Finally, the report calls for the creation of the National Child Abuse Registry which will provide regulation on child safety.
Africa and the War on Terrorism
African countries overwhelmingly expressed their support for the U.S.-led efforts on the war against terrorism shortly after the September 11 attacks on New York and Washington. Some African countries are reportedly sharing intelligence and are coordinating with Washington to fight terrorism in Africa. Administration officials believe that Africa is a potential breeding ground for terrorism. Some African officials are concerned that despite the strong support African governments have provided to the anti-terror campaign, they are not seen as real coalition partners in the fight against terrorism. African officials note that cooperation between the United States and Africa in the fight against terrorism should also include extraditing and apprehending members of African terrorist and extremist groups active in Europe and the United States. They argue that these groups are raising funds and organizing in the west, often unhindered by western governments.
Agroterrorism: Options in Congress
Although U.S. intelligence agencies have not identified any terrorist acts targeting agricultural production (i.e., agroterrorism) in the United States to date, the events of September 11, 2001 have awakened the nation to their possibility. Some experts estimate that a single agroterrorist attack using a highly contagious livestock disease could cost between $10 billion and $30 billion to the U.S. economy. This report examines the potential threats to America’s agriculture from a deliberate biological attack, describes the current defense structure and capabilities available to respond to agroterrorism, and analyzes current congressional proposals to address the threat of biological weapons to U.S. agriculture.
Attribution in Cyberspace: Challenges for U.S. Law Enforcement
This report discusses criminal attribution in the cyber security realm.
Authority of State and Local Police to Enforce Federal Immigration Law
This report discusses the authority of state and local law enforcement to assist in the enforcement of federal immigration law through the investigation and arrest of persons believed to have violated such laws. It describes current provisions in federal law that permit state and local police to enforce immigration law directly, analyzes major cases concerning the ability of states and localities to assist in immigration enforcement, and briefly examines opinions on the issue by the Office of Legal Counsel (OLC) within the Department of Justice.
Authority of State and Local Police to Enforce Federal Immigration Law
This report discusses the authority of state and local law enforcement to assist in the enforcement of federal immigration law through the investigation and arrest of persons believed to have violated such laws. It describes current provisions in federal law that permit state and local police to enforce immigration law directly, analyzes major cases concerning the ability of states and localities to assist in immigration enforcement, and briefly examines opinions on the issue by the Office of Legal Counsel (OLC) within the Department of Justice.
China's Relations with Central Asian States and Problems with Terrorism
This report provides an overview of the Muslim separatist movement in China’s northwestern Xinjiang Uighur Autonomous Region, China’s attempts to stifle activities which it considers terrorism, and implications for U.S. policy. Some analysts suggest that the U.S.-led campaign against terrorism may make it difficult to pressure the Chinese government on human rights and religious freedoms, particularly as they relate to Uighur Muslims in Xinjiang.
Closing the Guantanamo Detention Center: Legal Issues
This report provides an overview of major legal issues likely to arise as a result of executive and legislative action to close the Guantanamo detention facility. It discusses legal issues related to the transfer of Guantanamo detainees, the continued detention of such persons in the United States, and the possible removal of persons brought into the country. It also discusses selected constitutional issues that may arise in the criminal prosecution of detainees, emphasizing the procedural and substantive protections that are utilized in different adjudicatory forums.
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Defense Cleanup and Environmental Programs: Authorization and Appropriations for FY2001
The Department of Defense operates six environmental programs: cleanup of past contamination at military facilities, acceleration of cleanup at military bases designated for closure, compliance with environmental laws and regulations that apply to ongoing military operations, pollution prevention, natural resource conservation, and environmental technology. In addition to these activities, the Department of Energy is responsible for managing defense nuclear waste and remediating contaminated sites. This report discusses the federal laws that established these programs, describes their scope and purpose, provides a history of appropriations, indicates the President’s budget request for FY2001, examines authorization and appropriations legislation for FY2001, and discusses other relevant legislation considered in the 106th Congress.
Federal Mandatory Minimum Sentencing Statutes: An Overview of Legislation in the 107th Congress
This report examines legislation in the 107th Congress pertaining to federal mandatory minimum sentencing statutes (mandatory minimums), which demand that execution or incarceration follow criminal conviction. They cover drug dealing and using a gun to commit a federal crime, among other crimes.
Gangs in Central America
This report describes the gang problem in Central America, discusses country approaches to deal with the gangs, and analyzes U.S. policy with respect to gangs in Central America.
Guantanamo Detention Center: Legislative Activity in the 111th Congress
The detention of alleged enemy combatants at the U.S. Naval Station in Guantanamo Bay, Cuba, together with proposals to transfer some such individuals to the United States for prosecution or continued detention, has been a subject of considerable interest for Congress. Several authorization and appropriations measures enacted during the 111th Congress, and various pending bills, address the disposition and treatment of Guantanamo detainees. This report analyzes relevant provisions in enacted legislation and selected pending bills.
Hate Crimes: Sketch of Selected Proposals and Congressional Authority
This report presents sketch of selected proposals and congressional authority related to Hate Crimes.
Immigration: Frequently Asked Questions on the State Criminal Alien Assistance Program (SCAAP)
This report mainly provides information about the Frequently Asked Questions on the State Criminal Alien Assistance Program (SCAAP) on Immigration which is a formula grant program that provides financial assistance to states and localities for correctional officer salary costs.
Immigration: S Visas for Criminal and Terrorist Informants
In response to the terrorist acts of September 11, 2001, Congress passed legislation making permanent a provision that allows aliens with critical information on criminal or terrorist organizations to come into the United States to provide information to law enforcement officials. The law (S. 1424, and then P.L. 107-45) amended the Immigration and Nationality Act to provide permanent authority for the administration of the "S" visa, which was scheduled to expire on September 13, 2001. On November 29, 2001, then-Attorney General John Ashcroft announced the "Responsible Cooperators Program" to reach out to persons who may be eligible for the S visa. Up to 200 criminal informants and 50 terrorist informants may be admitted annually. Since FY2005, more than 500 informants and their accompanying family members have entered on S visas. No terrorist informants have been admitted into the U.S. since 1996.
Material Support of Terrorists and Foreign Terrorist Organizations: Sunset Amendments
No Description Available.
Murderous Schemes are not Violent Crimes?
This report discusses the U.S. Court of Appeals for the Fourth Circuit's decision in the case of "U.S. v. McCollum" which stated that conspiracy to murder was not a violent crime for federal sentencing purposes and discusses the background of the case and the prior case law which led to the decision.
NASA's Space Shuttle Columbia: Quick Facts and Issues for Congress
No Description Available.
Obstruction of Justice: An Overview of Some of the Federal Statutes That Prohibit Interference with Judicial, Executive, or Legislative Activities
This report discusses obstruction of justice, which is is a federal crime. It describes specific kinds of obstruction, organized by type, and references various relevant laws that have provisions against obstruction.
Operation Enduring Freedom: Foreign Pledges of Military and Intelligence Support
No Description Available.
Police and Law Enforcement: Selected Issues
No Description Available.
Prisons: Policy Options for Congress
No Description Available.
Protecting Our Perimeter: “Border Searches” under the Fourth Amendment
This report is on Protecting Our Perimeter: “Border Searches” under the Fourth Amendment.
Protection of Lawful Commerce in Arms Act, H.R. 1036, S. 659, S. 1805, S. 1806, 108th Congress: Legal Analysis
No Description Available.
Al Qaeda: Profile and Threat Assessment
No Description Available.
SORNA: A Legal Analysis of 18 U.S.C. §2250 (Failure to Register as a Sex Offender
This report describes the Sex Offender Registration and Notification Act (SORNA) including various elements of the legislation and Constitutional considerations, with requirements and repercussions of an individual's failure to comply with SORNA.
Spyware: Background and Policy Issues for Congress
No Description Available.
The State Department's "Trafficking in Persons" Report: Scope, Aid Restrictions, and Methodology
This report describes the legislative provisions that govern the U.S. Department of State's production of the annual TIP Report, reviews country ranking trends in the TIP Report, and identifies recent congressional oversight of and legislative activity to modify the TIP Report. Answers to selected frequently asked questions (FAQs) are included throughout the report.
Terrorism and National Security: Issues and Trends
No Description Available.
Terrorism, the Future, and U.S. Foreign Policy
No Description Available.
Terrorism, the Future, and U.S. Foreign Policy
No Description Available.
USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006 (S. 2271)
No Description Available.
USA PATRIOT Improvement and Reauthorization Act of 2005 (H.R. 3199): A Legal Analysis of the Conference Bill
Among other things, Title I makes permanent 14 USA PATRIOT Act sections scheduled to expire on February 3, 2006, as well as the terrorism support amendments scheduled to expire on December 31, 2006. It amends and postpones until December 31, 2009 the expiration of the act’s sections 206 and 215 relating to Foreign Intelligence Surveillance Act (FISA) orders for roving wiretaps and access to business records. It extends the temporary FISA “lone wolf” provision to the same date.
Back to Top of Screen