Network maintenance July 27th between 7:30AM and 8:00AM CDT may cause service disruptions.
Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy

Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy

Date: February 5, 2010
Creator: Rollins, John
Description: The focus of this report is on the history of Al Qaeda, known (or attributed) actions, suspected capabilities of the organization and non-aligned entities, and an analysis of select regional Al Qaeda affiliates.
Contributing Partner: UNT Libraries Government Documents Department
2012-2013 Presidential Election Period: National Security Considerations and Options

2012-2013 Presidential Election Period: National Security Considerations and Options

Date: October 5, 2012
Creator: Rollins, John
Description: This report discusses historical national security-related presidential transition activities, provides a representative sampling of national security issues a new Administration may encounter, and offers considerations and options relevant to each of the five phases of the presidential election period. Each phase has distinct challenges and opportunities for the incoming Administration, the outgoing Administration, and Congress. This report is intended to provide a framework for national security considerations during the current election period and will be updated to reflect the election outcome.
Contributing Partner: UNT Libraries Government Documents Department
Osama bin Laden's Death: Implications and Considerations

Osama bin Laden's Death: Implications and Considerations

Date: May 5, 2011
Creator: Rollins, John.
Description: This report discusses issues and questions related to the killing of Osama bin Laden (OBL), which are multifaceted and may have operational, regional, and policy implications. Operational policy issues include congressional notification, legal considerations, and current and future military activities.
Contributing Partner: UNT Libraries Government Documents Department
Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy

Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy

Date: January 25, 2011
Creator: Rollins, John
Description: The focus of this report is on the history of Al Qaeda, known (or attributed) actions, suspected capabilities of the organization and non-aligned entities, and an analysis of select regional Al Qaeda affiliates.
Contributing Partner: UNT Libraries Government Documents Department
Post-9/11 Evolution of the United States' Defining of the Terrorist Threat from Al Qaeda

Post-9/11 Evolution of the United States' Defining of the Terrorist Threat from Al Qaeda

Date: January 20, 2015
Creator: Rollins, John W.
Description: This report discusses the evolution on how the United States defines the terrorist threat since the terrorist attacks of September 11, 2001.
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Date: January 22, 2007
Creator: Rollins, John & Wilson, Clay
Description: This report examines possible terrorists' objectives and computer vulnerabilities that might lead to an attempted cyberattack against the critical infrastructure of the U.S. homeland, and also discusses the emerging computer and other technical skills of terrorists and extremists. Policy issues include exploring ways to improve technology for cybersecurity, or whether U.S. counterterrorism efforts should be linked more closely to international efforts to prevent cybercrime.
Contributing Partner: UNT Libraries Government Documents Department
Terrorism and Transnational Crime: Foreign Policy Issues for Congress

Terrorism and Transnational Crime: Foreign Policy Issues for Congress

Date: June 11, 2013
Creator: Rollins, John & Wyler, Liana Sun
Description: This report provides an overview of transnational security issues related to patterns of interaction among international terrorist and crime groups. In addition, the report discusses the U.S. government's perception of and response to the threat. It concludes with an analysis of foreign policy options.
Contributing Partner: UNT Libraries Government Documents Department
International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress

International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress

Date: March 18, 2010
Creator: Rollins, John & Wyler, Liana Sun
Description: This report provides a primer on the confluence of transnational terrorist and criminal groups and related activities abroad. It evaluates possible motivations and disincentives for cooperation between terrorist and criminal organizations, variations in the scope of crime-terrorism links, and the types of criminal activities--fundraising, material and logistics support, and exploitation of corruption and gaps in the rule of law--used by terrorist organizations to sustain operations.
Contributing Partner: UNT Libraries Government Documents Department
U.S. Citizens Kidnapped by the Islamic State

U.S. Citizens Kidnapped by the Islamic State

Date: October 17, 2014
Creator: Rollins, John W. & Rosen, Liana
Description: This report briefly discusses the Islamic State's (IS, or alternatively, Islamic State in Iraq and the Levant, ISIL, or Islamic State in Iraq and Syria, ISIS) kidnapping of American citizens and the implications for congressional response.
Contributing Partner: UNT Libraries Government Documents Department
U.S. Citizens Kidnapped by the Islamic State

U.S. Citizens Kidnapped by the Islamic State

Date: February 13, 2015
Creator: Rollins, John W. & Rosen, Liana
Description: This report briefly examines the kidnapping and killing of U.S. citizens by the terrorist group known as the Islamic State (IS).
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

Date: September 30, 2009
Creator: Theohary, Catherine A. & Rollins, John
Description: This report identifies cybersecurity policy issues that have been proposed for priority consideration. The report lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem. It then lists the current status of the legislation and compares legislation with existing executive branch initiatives. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to further highlight related considerations for Congress.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

Date: January 12, 2010
Creator: Theohary, Catherine A. & Rollins, John
Description: This report identifies cybersecurity policy issues that have been proposed for priority consideration. The report lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem. It then lists the current status of the legislation and compares legislation with existing executive branch initiatives. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to further highlight related considerations for Congress.
Contributing Partner: UNT Libraries Government Documents Department
"Gang of Four" Congressional Intelligence Notifications

"Gang of Four" Congressional Intelligence Notifications

Date: November 19, 2012
Creator: Rollins, John & Lange, Rebecca S.
Description: Report that reviews the history of the Gang of Four intelligence notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Use of the Internet: Information Operations in Cyberspace

Terrorist Use of the Internet: Information Operations in Cyberspace

Date: March 8, 2011
Creator: Theohary, Catherine A. & Rollins, John
Description: This report describes the ways that international terrorists and insurgents use the Internet, strategically and tactically, in pursuit of their political agendas.
Contributing Partner: UNT Libraries Government Documents Department
Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations

Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations

Date: March 10, 2009
Creator: Rollins, John & Henning, Anna C.
Description: This report discusses the legal issues and addresses policy considerations related to the Comprehensive National Cybersecurity Initiative (CNCI). The CNCI establishes a multi-pronged approach the federal government plans to take in identifying current and emerging cyber threats; shoring up current and future telecommunications and cyber vulnerabilities; and responding to, or proactively addressing, entities that wish to steal or manipulate protected data on secure federal systems.
Contributing Partner: UNT Libraries Government Documents Department
International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress

International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress

Date: January 5, 2010
Creator: Rollins, John; Wyler, Liana Sun & Rosen, Seth
Description: This report provides a primer on the confluence of transnational terrorist and criminal groups and related activities abroad. It evaluates possible motivations and disincentives for cooperation between terrorist and criminal organizations, variations in the scope of crime-terrorism links, and the types of criminal activities--fundraising, material and logistics support, and exploitation of corruption and gaps in the rule of law--used by terrorist organizations to sustain operations.
Contributing Partner: UNT Libraries Government Documents Department
NSA Surveillance Leaks: Background and Issues for Congress

NSA Surveillance Leaks: Background and Issues for Congress

Date: September 4, 2013
Creator: Rollins, John W. & Liu, Edward C.
Description: This report discusses the specifics of these two NSA collection programs. The first program collects in bulk the phone records--including the number that was dialed from, the number that was dialed to, and the date and duration of the call--of customers of Verizon and possibly other U.S. telephone service providers. The second program targets the electronic communications, including content, of foreign targets overseas whose communications flow through American networks.
Contributing Partner: UNT Libraries Government Documents Department
The Islamic State--Frequently Asked Questions: Threats, Global Implications, and U.S. Policy Responses

The Islamic State--Frequently Asked Questions: Threats, Global Implications, and U.S. Policy Responses

Date: November 25, 2015
Creator: Rollins, John W. & Peters, Heidi M.
Description: With the attacks in Beirut, over Egypt, and in Paris, the Islamic State has demonstrated a transnational capability that suggests its strategic objectives and tactics have evolved. The response to these attacks by the United States and other nations continues to evolve as the threat posed by IS changes. This report poses frequently asked questions with answers excerpted from other CRS products.
Contributing Partner: UNT Libraries Government Documents Department
Islamist Extremism in Europe

Islamist Extremism in Europe

Date: January 6, 2006
Creator: Archick, Kristin; Rollins, John & Woehrel, Steven
Description: This report provides an overview of Islamist extremism in Europe, possible terrorist links, European responses, and implications for the United States. Although the vast majority of Muslims in Europe are not involved in radical activities, Islamist extremists and vocal fringe communities that advocate terrorism exist and reportedly have provided cover for terrorist cells.
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Date: October 20, 2005
Creator: Rollins, John & Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Post-911 National Threat Notification Efforts: Issues, Actions, and Options for Congress

Post-911 National Threat Notification Efforts: Issues, Actions, and Options for Congress

Date: April 29, 2005
Creator: Rollins, John & Cunningham, L.J.
Description: None
Contributing Partner: UNT Libraries Government Documents Department
The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability

The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability

Date: December 9, 2010
Creator: Kerr, Paul K.; Rollins, John & Theohary, Catherine A.
Description: In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. This report discusses this cyber attack, a malicious software program known as Stuxnet, which infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. Although early reports focused on the impact on facilities in Iran, researchers discovered that the program had spread throughout multiple countries worldwide.
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Date: January 22, 2007
Creator: Rollins, John & Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
The 2014 Sochi Winter Olympics: Security and Human Rights Issues

The 2014 Sochi Winter Olympics: Security and Human Rights Issues

Date: January 6, 2014
Creator: Nichol, Jim; Halchin, Elaine; Rollins, John W.; Tiersky, Alex & Woehrel, Steven
Description: This report discusses the security and human rights issues at 2014 Sochi Winter Olympics.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 NEXT LAST