This report monitors actions taken by the 109th Congress for the House’s Science, State, Justice, Commerce, and Related Agencies (SSJC) and the Senate’s Commerce, Justice, Science, and Related Agencies (CJS) FY2006 appropriations legislation.
This report tracks and describes actions taken by the Administration and Congress to provide FY2016 appropriations for the Commerce, Justice, Science, and Related Agencies (CJS) accounts. It also provides an overview of FY2015 appropriations for agencies and bureaus funded as part of the annual appropriation for CJS.
Congress has the authority to determine classes of aliens who may be admitted into the United States and the grounds for which they may be removed. Pursuant to the Immigration and Nationality Act (INA), as amended, certain conduct may either disqualify an alien from entering the United States ("inadmissibility") or provide grounds for his or her removal/deportation. Prominently included among this conduct is criminal activity. This report explores this issue in-depth, especially the difference between the terms "illegal alien" and "criminal alien" and relevant legislation.
This report discusses the potential immigration consequences of criminal activity. “Criminal activity” generally refers to conduct for which an alien has been found or plead guilty before a court of law, though in limited circumstances consequences may attach to the commission of a crime or admission of acts constituting the essential elements of a crime. Consequences may flow from violations of either federal, state or, in many circumstances, foreign criminal law. Some federal crimes are set out in the INA itself — alien smuggling, for example. However, not all violations of immigration law are crimes. Notably, being in the U.S. without legal permission — i.e., being an “illegal alien” — is not a crime in and of itself. Thus, for example, an alien who overstays a student visa may be an “illegal alien,” in that the alien may be subject to removal from the U.S., but such an alien is not a “criminal alien.”
This report examines how the Department of Energy's (DOE) polygraph testing program has evolved and reviews certain scientific findings with regard to the polygraph's scientific validity. Several issues include whether: DOE's new screening program is focused on an appropriate number of individuals occupying only the most sensitive positions; the program should be expanded in order to adequately safeguard certain classified information; further research into the polygraph's scientific validity is needed; there are possible alternatives to the polygraph; and whether DOE should continue polygraph screening.
This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Currently, there are two federal laws that address sexual violence on college campuses: the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (Clery Act, P.L. 101-542) and Title IX of the Education Amendments of 1972 (Title IX, P.L. 92-318). Following a discussion exploring the prevalence of sexual violence at IHEs, this report provides a detailed policy and legal analysis of these two statutes, as well as a brief description of a third statute related to educational privacy. The report concludes with a summary of the steps that have been taken by Congress and the Administration to address campus sexual violence.
This report lists the current federal capital offenses and summarizes the procedures for federal civilian death penalty cases. Several laws are relevant to the topic including: P.L. 103-322, the Violent Crime Control and Law Enforcement Act of 1994; the Anti-terrorism and Effective Death Penalty Act of 1996; and P.L. 107-197, the Terrorist Bombings Convention Implementation Act of 2002.
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Under the federal system in the United States, the states and localities traditionally have held the major responsibility for prevention and control of crime and maintenance of order. For most of the Republic’s history, “police powers” in the broad sense were reserved to the states under the Tenth Amendment to the Constitution. Many still hold that view, but others see a string of court decisions in recent decades as providing the basis for a far more active federal role. Several bills are discussed in this report that address issues related to crime, juvenile justice, and Congress’ evolving role in crime legislation.
This report discusses how best to coordinate the Federal government's multi-agency efforts to curb illicit traffic in dangerous drugs has once again become an issue of major interest to the Congress. Critics of the Reagan Administration's anti-drug program contend that it lacks an overall strategy and that it suffers from the absence of a central mechanism for the formulation of general policy as well as for the broad direction of operations
This report analyzes the sharing of cyberattack information by government with private companies, by private companies with the government, and among private companies. Sharing information with consumers is mentioned but is not the central focus of this report.
This report provides an analysis of how organized crime has capitalized on globalization by using borders as opportunities, relying on fast-paced technological change, and adapting its organizational structures. It illustrates how these transformations can impact U.S. persons, businesses, and interests. The report includes a discussion of how U.S. law enforcement conceptualizes organized crime in the 21st century and concludes by examining potential issues for Congress, including the extent to which organized crime is a national security threat (partly to be tackled by U.S. law enforcement agencies), congressional oversight regarding the federal coordination of organized crime investigations, and the utility of current resources appropriated to combat organized crime.
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
This report examines compulsory DNA collection by law enforcement and its implications in regards to 4th amendment protections by examining legal precedents and considering the contemporary scientific understanding of DNA.
This report focuses on conflicts in Africa in which sexual violence is reported to be widespread or systematic. It describes the context in which such violence takes place, selected cases where it is currently occurring, and U.S. policy responses. The report concludes with a discussion of potential policy considerations, including the design and effectiveness of U.S. programs; coordination between agencies and between international donors; and the question of whether policy responses to sexual violence can be separated from the broader context in which such violence occurs. The report includes a detailed case study of DRC, which has drawn particular attention from the Obama Administration and the 111th Congress.
This report focuses on human trafficking both internationally and within the United States. The report begins with an overview of human trafficking including a discussion of the definition of human trafficking, the scope of the problem globally, and an examination of the victims. It follows with an analysis of global anti-trafficking efforts by the United States and the international community. The report then focuses on trafficking into and within the United States, examining relief for trafficking victims in the United States and discussing U.S. law enforcement efforts to combat domestic trafficking. The report concludes with an overview of anti-trafficking legislation and an analysis of policy issues related to human trafficking.
This report analyzes the existing law and authority to detain U.S. persons, including American citizens and resident aliens, as well as other persons within the United States who are suspected of being members, agents, or associates of Al Qaeda or possibly other terrorist organizations as "enemy combatants."
The federal government owns or leases 3.7 billion square feet of office space, which may be vulnerable to acts of terrorism and other forms of violence. The September 2001 terrorist attacks on the Pentagon and the World Trade Center renewed concerns about the vulnerability of federal buildings to bombing or other forms of attack. This report describes the creation and function of the Interagency Security Committee (ISC), which oversees the physical security of federal facilities. This report includes information on the ISC's 2007-2008 Action Plan.
This dialog allows you to filter your current search.
Each of the Years listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
This dialog allows you to filter your current search.
Each of the Months listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.