You limited your search to:

 Country: United States
 Collection: Congressional Research Service Reports
Antiterrorism and Effective Death Penalty Act of 1996: A Summary
The Antiterrorism and Effective Death Penalty Act of 1996 is the product of legislative efforts stretching back well over a decade and stimulated to passage in part by the tragedies in Oklahoma City and the World Trade Center. This report summarizes the six titles of the Act, its sources, and related legislation. digital.library.unt.edu/ark:/67531/metacrs309/
Foreign Corrupt Practices Act
This report gives an overview of the Foreign Corrupt Practices Act of 1977, which was intended to prohibit bribery of foreign officials by American corporations. It includes information about the original legislation, amendments in 1988, and amendments in 1998 that brought the legislation into conformance with the Organization for Economic Cooperation and Development's agreement on bribery. digital.library.unt.edu/ark:/67531/metacrs1001/
Alert Systems for Missing Adults in Eleven States: Background and Issues for Congress
This report discusses the emerging development of nationwide alert systems to recover missing adults, such as those with mental impairment (such as Alzheimer's disease), developmental disabilities, or suicidal tendencies. This report provides an overview of such alert systems in 11 states: Colorado, Delaware, Florida, Georgia, Kentucky, North Carolina, Ohio, Oklahoma, Rhode Island, Texas, and Virginia. This report also provides a discussion of issues for Congress to consider with respect to the federal role, if any, in developing state alert programs for missing adults. digital.library.unt.edu/ark:/67531/metadc26150/
Perjury Under Federal Law: A Brief Overview
This report describes perjury under federal law, including a definition as well as in-depth explorations of the three general federal perjury laws. This report is available in abbreviated form - without footnotes, quotations, or citations - as CRS Report 98-807, Perjury Under Federal Law: A Sketch of the Elements. digital.library.unt.edu/ark:/67531/metadc29557/
Guantanamo Detention Center: Legislative Activity in the 111th Congress
This report analyzes relevant provisions in enacted legislation and selected pending bills relating to teh U.S. Naval Station in Guantanamo Bay, Cuba, a facility in which alleged enemy belligerents are detained. digital.library.unt.edu/ark:/67531/metadc29573/
Privacy: An Overview of Federal Statues Governing Wiretapping and Electronic Eavesdropping
This report provides an overview of federal law governing wiretapping and electronic eavesdropping. It also appends citations to state law in the area and contains a bibliography of legal commentary as well as the text of the Electronic Communications Privacy Act (ECPA) and the Foreign Intelligence Surveillance Act (FISA). This report also includes a brief summary of the recently expired Protect America Act, P.L. 110-55 and of the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, P.L. 110-261 (H.R. 6304). digital.library.unt.edu/ark:/67531/metadc29535/
Privacy: An Overview of Federal Statues Governing Wiretapping and Electronic Eavesdropping
This report provides an overview of federal law governing wiretapping and electronic eavesdropping. It also appends citations to state law in the area and contains a bibliography of legal commentary as well as the text of the Electronic Communications Privacy Act (ECPA) and the Foreign Intelligence Surveillance Act (FISA). This report also includes a brief summary of the recently expired Protect America Act, P.L. 110-55 and of the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, P.L. 110-261 (H.R. 6304). digital.library.unt.edu/ark:/67531/metadc29536/
Armed Career Criminal Act (18 U.S.C. 924(e)): An Overview
This report briefly explores the Armed Career Criminal Act (ACCA), 18 U.S.C. 924(e), which requires imposition of a minimum 15-year term of imprisonment for recidivists convicted of unlawful possession of a firearm under 18 U.S.C. 922(g). Section 924(e) applies only to those defendants who have three prior state or federal convictions for violent felonies or serious drug offenses. The report includes descriptions of constitutional challenges to the application of section 924(e), which have been generally unsuccessful. digital.library.unt.edu/ark:/67531/metadc29614/
Perjury Under Federal Law: A Sketch of the Elements
This report discusses the three general federal perjury laws. This report is an abbreviated version of CRS Report 98-808, Perjury Under Federal Law: A Brief Overview, by Charles Doyle, stripped of most footnotes, quotations, citations, and bibliography. digital.library.unt.edu/ark:/67531/metadc29556/
Extraterritorial Application of American Criminal Law
Crime is ordinarily proscribed, tried, and punished according to the laws of the place where it occurs. American criminal law applies beyond the geographical confines of the United States, however, under certain limited circumstances. A surprising number of federal criminal statutes have extraterritorial application, but prosecutions have been few. This may be because when extraterritorial criminal jurisdiction does exist, practical and legal complications, and sometimes diplomatic considerations, may counsel against its exercise. digital.library.unt.edu/ark:/67531/metadc29483/
State Statutes Governing Hate Crimes
Concerns about hate crimes have become increasingly prominent among policymakers at all levels of government in recent years. This report compiles state statutes pertaining to hate crimes, including in the context of federal legislation such as the Violent Crime Control and Law Enforcement Act of 1994 and the Matthew Shepard and James Byrd Jr. Hate Crimes Prevention Act (the latter of which was signed by President Obama on October 28, 1999). digital.library.unt.edu/ark:/67531/metadc29664/
International Parental Child Abductions
International child custody disputes are likely to increase in frequency as the global society becomes more integrated and mobile. Since 1988, the Hague Convention on the Civil Aspects of International Child Abduction ("Hague Convention" or "Convention") has been the principal mechanism for enforcing the return of abducted children to the United States. This report will discuss the applicability of the Hague Convention and current U.S. laws, both civil and criminal, which seek to address the quandary of children abducted by parents to foreign nations. In addition, pending legislation, including H.R. 3240 and H.R. 3487, is discussed. digital.library.unt.edu/ark:/67531/metadc31443/
American Jihadist Terrorism: Combating a Complex Threat
Between May 2009 and August 2010, arrests were made for 19 "homegrown," jihadist-inspired terrorist plots by American citizens or legal permanent residents of the United States. The apparent spike in such activity after May 2009 suggests that at least some Americans - even if a tiny minority - continue to be susceptible to ideologies supporting a violent form of jihad. This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. This report also provides official definitions for terms such as "homegrown," "jihadist," and "violent jihadist." The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism, describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. It also outlines actions underway to build trust and partnership between community groups and government agencies and the tensions that may occur between law enforcement and engagement activities. digital.library.unt.edu/ark:/67531/metadc31371/
Authority of State and Local Police to Enforce Federal Immigration Law
This report discusses the authority of state and local law enforcement to assist in the enforcement of federal immigration law through the investigation and arrest of persons believed to have violated such laws. It describes current provisions in federal law that permit state and local police to enforce immigration law directly, analyzes major cases concerning the ability of states and localities to assist in immigration enforcement, and briefly examines opinions on the issue by the Office of Legal Counsel (OLC) within the Department of Justice. digital.library.unt.edu/ark:/67531/metadc31375/
Securing America's Borders: The Role of the Intelligence Community
Maintaining the security of U.S. borders is a fundamental responsibility of the federal government. This report discusses the contribution of intelligence agencies to the border security efforts of the Department of Homeland Security, the Department of Defense, and other federal agencies that work in cooperation with state, local, and tribal law enforcement agencies. Much of the intelligence community's border security-related efforts are classified, however. digital.library.unt.edu/ark:/67531/metadc31392/
The Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF): Budget and Operations for FY2011
This report provides an overview of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) budget and operations. This report chronicles congressional action on the FY2011 Commerce, Justice, Science (CJS), and Related Agencies Appropriations bills, as well as any FY2010 supplemental appropriations bills, that provide funding for ATF. digital.library.unt.edu/ark:/67531/metadc31468/
Gun Control Legislation
In the wake of the tragic shootings in Tuscon, AZ, which resulted in the hospitalization of Representative Gabrielle Giffords, as well as 6 fatalities and 13 wounded, the 112th Congress could reexamine certain issues and legislation related to gun control and firearms. This report provides basic firearms-related statistics, an overview of federal firearms law, and a summary of legislative action in the 111th Congress. digital.library.unt.edu/ark:/67531/metadc40199/
Proposed U.S.-Colombia Free Trade Agreement: Labor Issues
This report examines three labor issues and arguments related to the pending U.S.-Colombia free trade agreement (CFTA; H.R. 5724 and S. 2830): violence against trade unionists; impunity (accountability for or punishment of the perpetrators); and worker rights protections for Colombians. digital.library.unt.edu/ark:/67531/metadc40240/
DNA Testing in Criminal Justice: Background, Current Law, Grants, and Issues
This report provides an overview of how DNA is used to investigate crimes and help protect the innocent. It also reviews current statutory law on collecting DNA samples, sharing DNA profiles generated from those samples, and providing access to post-conviction DNA testing. The report also includes a summary of grant programs authorized by Congress to assist state and local governments with reducing DNA backlogs, provide post-conviction DNA testing, and promote new technology in the field. It also reviews select issues Congress might consider should it legislate or conduct oversight in this area. digital.library.unt.edu/ark:/67531/metadc40144/
Gun Control Legislation
This report concludes with discussion of other salient and recurring gun control issues that have generated past congressional interest. Those issues include (1) screening firearms background check applicants against terrorist watch lists, (2) reforming the regulation of federally licensed gun dealers, (3) requiring background checks for private firearms transfers at gun shows, (4) more strictly regulating certain firearms previously defined in statute as "semiautomatic assault weapons," and (5) banning or requiring the registration of certain long-range .50 caliber rifles, which are commonly referred to as "sniper" rifles. To set these and other emerging issues in context, this report provides basic firearms-related statistics, an overview of federal firearms law, and a summary of legislative action in the 111th Congress. digital.library.unt.edu/ark:/67531/metadc84047/
Immigration-Related Detention: Current Legislative Issues
As Congress considers addressing some of the problems in the nation's immigration system, the detention of noncitizens in the United States may be an issue as Congress may choose to reevaluate detention priorities (i.e., who should be detained) and resources. There are many policy issues surrounding detention of aliens. The Illegal Immigrant Reform and Immigrant Responsibility Act of 1996 (IIRIRA) increased the number of aliens subject to mandatory detention, and raised concerns about the justness of mandatory detention, especially as it is applied to asylum seekers arriving without proper documentation. Additionally, as DHS increases its ability to identify aliens who are subject to removal from local jails in more remote locations, the nationwide allocation of detention space may become an issue. digital.library.unt.edu/ark:/67531/metadc84040/
Gun Control Legislation
This report provides basic firearms-related statistics, an overview of federal firearms law, and a summary of legislative action in the 111th Congress. The report concludes with salient issues that have generated significant congressional interest, including the 1994-2004 LCAFD ban. digital.library.unt.edu/ark:/67531/metadc84046/
Detention of U.S. Persons as Enemy Belligerents
The detainee provisions passed as part of the National Defense Authorization Act for FY2012 affirm that the Authorization for Use of Military Force in response to the terrorist attacks of September 11, 2001, authorizes the detention of persons captured in connection with hostilities. This report provides a background to the legal issues presented, followed by a brief introduction to the law of war pertinent to the detention of different categories of individuals. An overview of U.S. practice during wartime to detain persons deemed dangerous to the national security is presented. digital.library.unt.edu/ark:/67531/metadc84022/
Protecting Classified Information and the Rights of Criminal Defendants: The Classified Information Procedures Act
A criminal prosecution involving classified information may cause tension between the government's interest in protecting classified information and the criminal defendant's right to a constitutionally valid trial. In some cases, a defendant may threaten to disclose classified information in an effort to gain leverage. Concerns about this practice, referred to as "graymail," led the 96th Congress to enact the Classified Information Procedures Act to provide uniform procedures for prosecutions involving classified information. digital.library.unt.edu/ark:/67531/metadc83957/
American Jihadist Terrorism: Combating a Complex Threat
This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, "homegrown" and "domestic" are terms that describe terrorist activity or plots perpetrated within the United States or abroad by American citizens, legal permanent residents, or visitors radicalized largely within the United States. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. It also outlines actions underway to build trust and partnership between community groups and government agencies and the tensions that may occur between law enforcement and engagement activities. digital.library.unt.edu/ark:/67531/metadc83950/
Extraterritorial Application of American Criminal Law
Crime is ordinarily proscribed, tried, and punished according to the laws of the place where it occurs. American criminal law applies beyond the geographical confines of the United States, however, under certain limited circumstances. A surprising number of federal criminal statutes have extraterritorial application, but prosecutions have been few. This may be because when extraterritorial criminal jurisdiction does exist, practical and legal complications, and sometimes diplomatic considerations, may counsel against its exercise. digital.library.unt.edu/ark:/67531/metadc83803/
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act. digital.library.unt.edu/ark:/67531/metadc83829/
Gun Control Legislation
A look at past gun control legislation and also how recent events (such as the shooting in Tucson, AZ on January 8, 2011 which notably wounded Rep. Gabrielle Giffords) have influenced current legislation. This report concludes with discussion of other salient and recurring gun control issues that have generated past congressional interest. digital.library.unt.edu/ark:/67531/metadc85453/
The Domestic Terrorist Threat: Background and Issues for Congress
In the last decade, domestic terrorists-people who commit crimes within the homeland and draw inspiration from U.S.-based extremist ideologies and movements-have killed American citizens and damaged property across the country. Not all of these criminals have been prosecuted under terrorism statutes. This report discusses domestic terrorism's significance to policymakers per five topics: level of activity, use of nontraditional tactics, exploitation of the internet, decentralized nature of the threat, and prison radicalization. The report also discusses three areas that Congress may consider the federal role of combating such activities: the issue of definitions, adequacy of domestic terrorism intelligence collection efforts, and the value of community outreach driven efforts to quell terrorism related radicalization in the United States. digital.library.unt.edu/ark:/67531/metadc85433/
Judicial Activity Concerning Enemy Combatant Detainees: Major Court Rulings
This report discusses major judicial opinions concerning suspected enemy belligerents detained in the conflict with Al Qaeda and the Taliban. The report addresses all Supreme Court decisions concerning enemy combatants. It also discusses notable circuit court opinions addressing issues of ongoing relevance. digital.library.unt.edu/ark:/67531/metadc85382/
Comparison of Rights in Military Commission Trials and Trials in Federal Criminal Court
The initiation of military commission proceedings against Khalid Sheik Mohammad and four others for their alleged involvement in the 9/11 terrorist attacks has focused renewed attention on the differences between trials in federal court and those conducted by military commission. This report provides a brief summary of legal issues raised by the choice of forum for trying accused terrorists and a chart comparing selected military commissions rules under the Military Commissions Act, as amended, to the corresponding rules that apply in federal court. digital.library.unt.edu/ark:/67531/metadc85378/
Cybersecurity: Authoritative Reports and Resources
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed. digital.library.unt.edu/ark:/67531/metadc85416/
The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement
Globalization and technological innovation have fostered the expansion of both legitimate and criminal operations across physical borders as well as throughout cyberspace. U.S. law enforcement has increasingly relied on intelligence-led policing, enhanced interagency cooperation, and technological implementation to confront 21st century crime. Issues for Congress are how it can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime. It may also examine whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information. digital.library.unt.edu/ark:/67531/metadc86586/
Identity Theft: Trends and Issues
In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud—the highest level since 2007. Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation's economy but its security. Consequently, in securing the nation and its economic health, policy makers are also tasked with reducing identity theft and its impact. digital.library.unt.edu/ark:/67531/metadc86550/
Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis
The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011). digital.library.unt.edu/ark:/67531/metadc86604/
Community Oriented Policing Services (COPS): Background and Funding
The Community Oriented Policing Services (COPS) program was created by Title I of the Violent Crime Control and Law Enforcement Act of 1994 (P.L. 103-322). The mission of the COPS program is to advance community policing in all jurisdictions across the United States. Legislation introduced in the 111th Congress would reauthorize the COPS program through FY2014 and reestablish COPS as a multi-grant program. This report provides an overview and analysis of issues Congress might choose to consider when taking up legislation to reauthorize the COPS program. digital.library.unt.edu/ark:/67531/metadc87303/
Latin America: Terrorism Issues
U.S. attention to terrorism in Latin America intensified in the aftermath of the September 2001 terrorist attacks on New York and Washington, with an increase in bilateral and regional cooperation. Over the past several years, policymakers have been concerned about Iran's increasing activities in Latin America, particularly its relations with Venezuela, although there has been disagreement over the extent and significance of Iran's relations with the region. In the 112th Congress, several initiatives have been introduced related to terrorism issues in the Western Hemisphere regarding Mexico, Venezuela, and the activities of Iran and Hezbollah, and several oversight hearings have been held. digital.library.unt.edu/ark:/67531/metadc87366/
Cybersecurity: Authoritative Reports and Resources
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed. digital.library.unt.edu/ark:/67531/metadc87226/
Smart Meter Data: Privacy and Cybersecurity
Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. Smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. Detailed electricity usage data offers a window into the lives of people inside of a home by revealing what individual appliances they are using, and the transmission of the data potentially subjects this information to interception or theft by unauthorized third parties or hackers. Unforeseen consequences under federal law may result from the installation of smart meters and the communications technologies that accompany them. This report examines federal privacy and cybersecurity laws that may apply to consumer data collected by residential smart meters. digital.library.unt.edu/ark:/67531/metadc87204/
Detention of U.S. Persons as Enemy Belligerents
The detainee provisions passed as part of the National Defense Authorization Act for FY2012 affirm that the Authorization for Use of Military Force in response to the terrorist attacks of September 11, 2001, authorizes the detention of persons captured in connection with hostilities. This report provides a background to the legal issues presented, followed by a brief introduction to the law of war pertinent to the detention of different categories of individuals. An overview of U.S. practice during wartime to detain persons deemed dangerous to the national security is presented. digital.library.unt.edu/ark:/67531/metadc87203/
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime. digital.library.unt.edu/ark:/67531/metadc87232/
Terrorist Watch List Screening and Brady Background Checks for Firearms
The November 2009 shooting at Fort Hood, TX, renewed interest in terrorist watchlist screening and Brady background checks for firearms through the National Instant Criminal Background Check System (NICS). In the 110th Congress, Senator Frank Lautenberg and Representative Peter King introduced a bill based on a legislative proposal developed by DOJ that would have authorized the Attorney General to deny the transfer of firearms or the issuance of firearms (and explosives) licenses/permits to "dangerous terrorists." They reintroduced this proposal in the 111th Congress and supporters dubbed it the "Terror Gap" proposal. It was reintroduced once again in the 112th Congress. The Terror Gap proposal raises several potential issues for Congress, which are discussed in this report. digital.library.unt.edu/ark:/67531/metadc87202/
Organized Crime: An Evolving Challenge for U.S. Law Enforcement
In the last two decades, organized crime has grown more complex, posing evolving challenges for U.S. federal law enforcement. These criminals have transformed their operations in ways that broaden their reach and make it harder for law enforcement to combat them. They have adopted more-networked structural models, internationalized their operations, and grown more tech savvy. They are a significant challenge to U.S. law enforcement. There still is no single agency charged with investigating organized crime in the way the Federal Bureau of Investigation (FBI) has been designated the lead investigative agency for terrorism. Further, resources to tackle this issue are divided among many federal agencies. As such, Congress may exert its oversight authority regarding the federal coordination of organized crime investigations via the 2011 strategy. Policymakers may also debate the efficacy of current resources appropriated to combat organized crime. digital.library.unt.edu/ark:/67531/metadc87162/
Trafficking in Persons: U.S. Policy and Issues for Congress
Trafficking in persons (TIP) for the purposes of exploitation is believed to be one of the most prolific areas of international criminal activity and is of significant concern to the United States and the international community. This report discusses the global and ongoing problem of TIP in detail, as well as anti-TIP programs and U.S. and international efforts to combat TIP. digital.library.unt.edu/ark:/67531/metadc87335/
Authority of State and Local Police to Enforce Federal Immigration Law
This report discusses the authority of state and local law enforcement to assist in the enforcement of federal immigration law through the investigation and arrest of persons believed to have violated such laws. It describes current provisions in federal law that permit state and local police to enforce immigration law directly, analyzes major cases concerning the ability of states and localities to assist in immigration enforcement, and briefly examines opinions on the issue by the Office of Legal Counsel (OLC) within the Department of Justice. digital.library.unt.edu/ark:/67531/metadc93845/
U.S.-Mexican Security Cooperation: The Mérida Initiative and Beyond
Increasing violence perpetrated by drug trafficking organizations and other criminal groups is threatening citizen security and governance in Mexico. Escalating violence has increased U.S. concerns about stability in Mexico, a key political and economic ally, and about the possibility of violence spilling over into the United States. In recent years, U.S.-Mexican security cooperation has increased significantly, largely as a result of the development and implementation of the Mérida Initiative, a counterdrug and anticrime assistance package for Mexico and Central America that was first proposed in October 2007. This report looks at the funding and Congressional oversight for this Initiative. digital.library.unt.edu/ark:/67531/metadc93841/
Southwest Border Violence: Issues in Identifying and Measuring Spillover Violence
There has been an increase in the level of drug trafficking-related violence within and between the drug trafficking organizations in Mexico. This violence has generated concern among U.S. policy makers that the violence in Mexico might spill over into the United States. This report looks at the nature of the drug trafficking conflict and assessments of how the conflict could spill across the border. digital.library.unt.edu/ark:/67531/metadc93823/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc93941/
Detention of U.S. Persons as Enemy Belligerents
This report provides a background to the National Defense Authorization Act for FY2012, the Authorization to use Military Force act, and the President's power to detain "enemy combatants." It then gives a brief introduction to the law of war pertinent to the detention of different categories of individuals and an overview of U.S. practice during wartime to detain persons deemed dangerous to national security. It concludes by discussion Congress's role in prescribing rules for wartime detention as well as legislative proposals in the 112th Congress to address the detention of U.S. persons. digital.library.unt.edu/ark:/67531/metadc93921/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cyber security issues, including: legislation, hearings in the 112th Congress, data and statistics, and cyber security glossaries. digital.library.unt.edu/ark:/67531/metadc93928/
FIRST PREV 1 2 3 4 NEXT LAST