Search Results

Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Body Armor for Law Enforcement Officers: In Brief
This report contains an overview of the Matching Grant Program for Law Enforcement Armor Vests (BPV program). It also provides a discussion of data on law enforcement agencies that require their officers to wear armor vests while on duty, research on why officers may choose to wear armor vests, research on the life cycle for armor vests, data on the use of body armor by law enforcement officers who were killed with a firearm, and research on the effectiveness of armor vests.
Domestic Human Trafficking Legislation in the 113th Congress
This report discusses domestic human-trafficking-related issues that have received legislative action or are of significant congressional interest in the 113th Congress.
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Domestic Human Trafficking Legislation in the 113th Congress
This report discusses domestic human-trafficking-related issues that have received legislative action or are of significant congressional interest in the 113th Congress.
Egypt: Background and U.S. Relations
This report provides an overview of the key issues for Congress related to Egypt and information on U.S. foreign aid to Egypt. It briefly provides a political history of modern Egypt, an overview of its political institutions, and a discussion of the prospects for democratization in Egypt, as well as addressing the following current topics: the Arab-Israeli peace process, Iraq, terrorism, democratization and reform, human rights, trade, and military cooperation.
Offender Reentry: Correctional Statistics, Reintegration into the Community, and Recidivism
This report provides background information regarding the prison population in the United States that has been growing steadily for more than 30 years. The report presents correctional system statistics and discusses the federal government's involvement in offender reentry programs and the Second Chance Act (P.L. 110-199) that was enacted on April 9, 2008.
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions.
Gun Control Legislation in the 113th Congress
This report looks at past gun control legislation and also how recent events (such as the shootings in Newtown, Connecticut, Aurora, Colorado, and Tucson, Arizona) have influenced current congressional discourse and legislation. The report also specifically examines certain contentious, gun related topics including universal background checks, gun trafficking, and military style firearms.
Domestic Terrorism Appears to Be Reemerging as a Priority at the Department of Justice
This document examines an apparent shift in priorities at the Department of Justice (DOJ) towards a renewed focus on domestic terrorism with the reestablishment of its Domestic Terrorism Executive Committee, which had been defunct for several years. The report considers why the shift in focus may be occurring and also briefly examines different types of domestic terror threats.
The "Militarization" of Law Enforcement and the Department of Defense's "1033 Program"
This report gives an overview of the history of Special Weapons and Tactics teams, which are estimated to be deployed 45,000 times each year in the U.S. The report also discusses the "1033 Program" which authorizes federal and state law enforcement agencies to receive excess materials from Department of Defense stocks for use in counter-drug or counter-terrorism activities.
Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?
This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs.
The Elder Justice Act: Background and Issues for Congress
This report provides a brief legislative history of the Elder Justice Act, summarizes elder justice provisions enacted as part of ACA, and administrative efforts related to implementation and funding. The report then describes several issues for Congress with respect to the act's reauthorization.
American Foreign Fighters and the Islamic State: Broad Challenges for Federal Law Enforcement
This report offers a framework for considering the challenges to domestic security posed by American fighters in the terrorist group known as the Islamic State (IS, previously referred to as ISIS or ISIL) and outlines some of the ways that U.S. law enforcement responds to such challenges.
Reauthorizing the Office of National Drug Control Policy: Issues for Consideration
This report provides a discussion of the National Drug Control Strategy, the National Drug Control Budget, and Office of National Drug Control Policy (ONDCP) evaluation of the National Drug Control Strategy implementation. It then provides an analysis of selected legislative and oversight issues that Congress may consider when debating the reauthorization of ONDCP.
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Federal Lands and Natural Resources: Overview and Selected Issues for the 113th Congress
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Sexual Violence at Institutions of Higher Education
Currently, there are two federal laws that address sexual violence on college campuses: the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (Clery Act, P.L. 101-542) and Title IX of the Education Amendments of 1972 (Title IX, P.L. 92-318). Following a discussion exploring the prevalence of sexual violence at IHEs, this report provides a detailed policy and legal analysis of these two statutes, as well as a brief description of a third statute related to educational privacy. The report concludes with a summary of the steps that have been taken by Congress and the Administration to address campus sexual violence.
Aiding, Abetting, and the Like: An Abbreviated Overview of 18 U.S.C. 2
This report discuses the issues that virtually every federal criminal statute has a hidden feature; helpers and hands-on offenders face the same punishment. This results from 18 U.S.C. 2, which visits the same consequences on anyone who orders or assists in the commission of a federal crime.
Aiding, Abetting, and the Like: An Overview of 18 U.S.C. 2
This report discuses the issues that virtually every federal criminal statute has a hidden feature; helpers and hands-on offenders face the same punishment. This results from 18 U.S.C. 2, which visits the same consequences on anyone who orders or assists in the commission of a federal crime.
Federal Capital Offenses: An Overview of Substantive and Procedural Law
Murder, committed under any of more than 50 jurisdictional circumstances, is a federal capital offense. So are treason, espionage, and certain drug kingpin offenses. The Federal Death Penalty Act and related provisions establish the procedure that must be followed before a defendant convicted of a federal capital offense may be executed. This report is an overview of the law in the area.
U.S. Secret Service Protection Mission Funding and Staffing: Fact Sheet
The U.S. Secret Service (USSS) has two broad missions, criminal investigations and protection. The protection mission, which is the focus of this fact sheet, covers the President, Vice President, their families, and candidates for those offices, along with the White House and Vice President's residence, through the Service's Uniformed Division. Protective duties also extend to foreign missions in the District of Columbia and to designated individuals, such as the DHS Secretary and visiting foreign dignitaries. This fact sheet provides information on USSS funding and staffing because congressional attention has turned to the USSS and its operations due to several recent incidents.
Anti-Terrorist/Anti-Money Laundering Information-Sharing by Financial Institutions under FINCEN's Regulations
This report discusses Information-sharing programs developed by Treasury's Financial Crimes Enforcement Network (FINCEN) designed to aid law enforcement investigation and prosecution of money laundering and terrorist financing.
Special Prosecutors: Investigations and Prosecutions of Police Use of Deadly Force
This legal sidebar discusses the suggestion to appoint a special prosecutor to investigate cases of alleged law enforcement criminality.
Overview of Selected Federal Criminal Civil Rights Statutes
Federal criminal civil rights laws impose criminal penalties for deprivation of certain federal rights, privileges, or immunities. These laws prohibit hate crimes based on race, color, religion, or national origin; the burning of places of worship; violence against health care providers; and the transport of persons (particularly women and children) for the purpose of enslavement or forced labor. Some of these laws require a discriminatory motivation while others, such as human trafficking, do not. Some cover offenders acting "under color of any law." The Federal Bureau of Investigation investigates alleged violations. Punishments can range from a fine to lifetime imprisonment; in some cases the death penalty may be imposed, depending upon the circumstances and the resulting injury, if any. This report provides a brief summary of selected federal criminal civil right statutes.
Gun Control Legislation in the 113th Congress
This report looks at past gun control legislation and also how recent events (such as the shootings in Newtown, Connecticut; Aurora, Colorado; and Tucson, Arizona) have influenced current congressional discourse and legislation. The report also specifically examines certain contentious, gun related topics including universal background checks, gun trafficking, and military style firearms.
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Body Armor for Law Enforcement Officers: In Brief
This report contains an overview of the Matching Grant Program for Law Enforcement Armor Vests (BPV program). It also provides a discussion of data on law enforcement agencies that require their officers to wear armor vests while on duty, research on why officers may choose to wear armor vests, research on the life cycle for armor vests, data on the use of body armor by law enforcement officers who were killed with a firearm, and research on the effectiveness of armor vests.
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
This report discusses the concept of cybercrime and related cyber threats such as cyber espionage and cyber warfare, and questions whether--and under what circumstances--clear distinctions between the various threats should be delineated. It also outlines how current federal strategies may address cybercrime, including issues surrounding the measurement and tracking of cybercrime.
Crime and Forfeiture
This report provides an overview of federal forfeiture law. It sketches the origins and general attributes of forfeiture, describes the distribution of the hundreds of millions of dollars it generates, and identifies some of the related constitutional issues.
Crime and Forfeiture: In Short
This report provides a brief background information on property and trigger crimes and discusses civil forfeiture, criminal forfeiture, disposition of forfeited assets and constitutional considerations.
In Re Terrorist Attacks on September 11, 2001: Claims Against Saudi Defendants Under the Foreign Sovereign Immunities Act (FSIA)
This report summarizes the Foreign Sovereign Immunities Act (FSIA) and jurisdiction in cases against foreign defendants and analyzes the court of appeals decision. It also discusses legislative efforts to address these issues(S. 1535 and H.R. 3143).
Sex Trafficking of Children in the United States: Overview and Issues for Congress
This report provides an overview of sex trafficking of children in the United States. It first conceptualizes the issue, discussing the victims and perpetrators involved. It then outlines the federal response to investigating and prosecuting perpetrators as well as providing services to victims. The report concludes with a discussion of select issues concerning the federal response to sex trafficking of minors in the United States.
Asset Forfeiture: Selected Legal Issues and Reforms
This report discusses the asset forfeiture, which refers (in this report) to the process of confiscating either property or money from a person because it is illegal to possess (contraband), constitutes the proceeds of a crime, or was used to facilitate a crime. The report provides an overview of both types -- civil asset forfeiture and criminal forfeitures -- as well as select legal issues and structural reforms.
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Public Trust and Law Enforcement--A Brief Discussion for Policy Makers
This report provides a brief overview of police-community relations and how the federal government might be able to promote more accountability and better relationships between citizens and law enforcement.
Missing Adults: Background, Federal Programs, and Issues for Congress
The first section of this report discusses demographics and record keeping of missing adults and unidentified remains, as well as some of the factors that may contribute to the disappearance of adults. This section also discusses federally-funded databases that are used to track data on missing adults and unidentified individuals. The second section of the report describes the federal programs and initiatives to assist in locating missing adults, including funding data where applicable. Finally, the third section discusses issues about the federal role in missing adult cases.
Trafficking in Persons in Latin America and the Caribbean
This report describes the nature and scope of the problem of human trafficking in Latin America and the Caribbean, including U.S. efforts to deal with trafficking in persons in the region, as well as the successes and failures of some recent country and regional antitrafficking efforts. The report concludes by raising issues that may be helpful for the 113th Congress to consider as it continues to address human trafficking as part of its authorization, appropriations, and oversight activities.
Domestic Human Trafficking Legislation in the 114th Congress
This report discusses domestic human trafficking-related issues that have received legislative action or are of significant interest in the 114th Congress.
Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis
This report analyzes the sharing of cyberattack information by government with private companies, by private companies with the government, and among private companies. Sharing information with consumers is mentioned but is not the central focus of this report.
Overview of FY2016 Appropriations for Commerce, Justice, Science, and Related Agencies (CJS)
This report tracks and describes actions taken by the Administration and Congress to provide FY2016 appropriations for the Commerce, Justice, Science, and Related Agencies (CJS) accounts. It also provides an overview of FY2015 appropriations for agencies and bureaus funded as part of the annual appropriation for CJS.
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under a variety of cybersecurity topics.
Supervised Release (Parole): An Abbreviated Outline of Federal Law
This report discusses the supervised release (parole) for federal crimes, the nature of the supervision and the conditions imposed during supervised release.
Supervised Release (Parole): An Overview of Federal Law
This report discusses the supervised release (parole) for federal crimes, the nature of the supervision, and the conditions imposed during supervised release.
Balancing Tourism against Terrorism: The Visa Waiver Program
This report briefly discusses Congress's concern that some foreign fighters might exploit the Visa Waiver Program (VWP) to enter the United States and commit acts of terrorism. The VWP allows eligible visitors from 38 European nations and a few prosperous Asia-Pacific countries to enter the United States for short business or leisure stays without first obtaining a visa from a U.S. consulate abroad.
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Terrorist Attacks in Europe and Mounting Security Concerns
This report briefly discusses the European policy response to recent terrorist attacks.
Federal Involvement in Sex Offender Registration and Notification: Overview and Issues for Congress, In Brief
This report begins with a brief background on sex offender crime and policy in the United States, followed by a description of the role of the federal government in sex offender registration and notification. It concludes with a discussion of select issues on which Congress may exercise additional oversight or address through legislation.
Back to Top of Screen