Congressional Research Service Reports - 32 Matching Results

Search Results

Prisons: Policy Options for Congress
No Description Available.
Police and Law Enforcement: Selected Issues
No Description Available.
Obstruction of Justice: An Overview of Some of the Federal Statutes That Prohibit Interference with Judicial, Executive, or Legislative Activities
This report discusses obstruction of justice, which is is a federal crime. It describes specific kinds of obstruction, organized by type, and references various relevant laws that have provisions against obstruction.
Closing the Guantanamo Detention Center: Legal Issues
This report provides an overview of major legal issues likely to arise as a result of executive and legislative action to close the Guantanamo detention facility. It discusses legal issues related to the transfer of Guantanamo detainees, the continued detention of such persons in the United States, and the possible removal of persons brought into the country. It also discusses selected constitutional issues that may arise in the criminal prosecution of detainees, emphasizing the procedural and substantive protections that are utilized in different adjudicatory forums.
Attribution in Cyberspace: Challenges for U.S. Law Enforcement
This report discusses criminal attribution in the cyber security realm.
Federal Mandatory Minimum Sentencing Statutes: An Overview of Legislation in the 107th Congress
This report examines legislation in the 107th Congress pertaining to federal mandatory minimum sentencing statutes (mandatory minimums), which demand that execution or incarceration follow criminal conviction. They cover drug dealing and using a gun to commit a federal crime, among other crimes.
Operation Enduring Freedom: Foreign Pledges of Military and Intelligence Support
No Description Available.
Agroterrorism: Options in Congress
Although U.S. intelligence agencies have not identified any terrorist acts targeting agricultural production (i.e., agroterrorism) in the United States to date, the events of September 11, 2001 have awakened the nation to their possibility. Some experts estimate that a single agroterrorist attack using a highly contagious livestock disease could cost between $10 billion and $30 billion to the U.S. economy. This report examines the potential threats to America’s agriculture from a deliberate biological attack, describes the current defense structure and capabilities available to respond to agroterrorism, and analyzes current congressional proposals to address the threat of biological weapons to U.S. agriculture.
Al Qaeda: Profile and Threat Assessment
No Description Available.
Hate Crimes: Sketch of Selected Proposals and Congressional Authority
No Description Available.
Material Support of Terrorists and Foreign Terrorist Organizations: Sunset Amendments
No Description Available.
SORNA: A Legal Analysis of 18 U.S.C. §2250 (Failure to Register as a Sex Offender
This report describes the Sex Offender Registration and Notification Act (SORNA) including various elements of the legislation and Constitutional considerations, with requirements and repercussions of an individual's failure to comply with SORNA.
Gangs in Central America
This report describes the gang problem in Central America, discusses country approaches to deal with the gangs, and analyzes U.S. policy with respect to gangs in Central America.
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Terrorism, the Future, and U.S. Foreign Policy
No Description Available.
NASA's Space Shuttle Columbia: Quick Facts and Issues for Congress
No Description Available.
Terrorism, the Future, and U.S. Foreign Policy
No Description Available.
China's Relations with Central Asian States and Problems with Terrorism
This report provides an overview of the Muslim separatist movement in China’s northwestern Xinjiang Uighur Autonomous Region, China’s attempts to stifle activities which it considers terrorism, and implications for U.S. policy. Some analysts suggest that the U.S.-led campaign against terrorism may make it difficult to pressure the Chinese government on human rights and religious freedoms, particularly as they relate to Uighur Muslims in Xinjiang.
Guantanamo Detention Center: Legislative Activity in the 111th Congress
The detention of alleged enemy combatants at the U.S. Naval Station in Guantanamo Bay, Cuba, together with proposals to transfer some such individuals to the United States for prosecution or continued detention, has been a subject of considerable interest for Congress. Several authorization and appropriations measures enacted during the 111th Congress, and various pending bills, address the disposition and treatment of Guantanamo detainees. This report analyzes relevant provisions in enacted legislation and selected pending bills.
Protection of Lawful Commerce in Arms Act, H.R. 1036, S. 659, S. 1805, S. 1806, 108th Congress: Legal Analysis
No Description Available.
Authority of State and Local Police to Enforce Federal Immigration Law
This report discusses the authority of state and local law enforcement to assist in the enforcement of federal immigration law through the investigation and arrest of persons believed to have violated such laws. It describes current provisions in federal law that permit state and local police to enforce immigration law directly, analyzes major cases concerning the ability of states and localities to assist in immigration enforcement, and briefly examines opinions on the issue by the Office of Legal Counsel (OLC) within the Department of Justice.
Authority of State and Local Police to Enforce Federal Immigration Law
This report discusses the authority of state and local law enforcement to assist in the enforcement of federal immigration law through the investigation and arrest of persons believed to have violated such laws. It describes current provisions in federal law that permit state and local police to enforce immigration law directly, analyzes major cases concerning the ability of states and localities to assist in immigration enforcement, and briefly examines opinions on the issue by the Office of Legal Counsel (OLC) within the Department of Justice.
Terrorism and National Security: Issues and Trends
No Description Available.
Defense Cleanup and Environmental Programs: Authorization and Appropriations for FY2001
The Department of Defense operates six environmental programs: cleanup of past contamination at military facilities, acceleration of cleanup at military bases designated for closure, compliance with environmental laws and regulations that apply to ongoing military operations, pollution prevention, natural resource conservation, and environmental technology. In addition to these activities, the Department of Energy is responsible for managing defense nuclear waste and remediating contaminated sites. This report discusses the federal laws that established these programs, describes their scope and purpose, provides a history of appropriations, indicates the President’s budget request for FY2001, examines authorization and appropriations legislation for FY2001, and discusses other relevant legislation considered in the 106th Congress.
Immigration: S Visas for Criminal and Terrorist Informants
In response to the terrorist acts of September 11, 2001, Congress passed legislation making permanent a provision that allows aliens with critical information on criminal or terrorist organizations to come into the United States to provide information to law enforcement officials. The law (S. 1424, and then P.L. 107-45) amended the Immigration and Nationality Act to provide permanent authority for the administration of the "S" visa, which was scheduled to expire on September 13, 2001. On November 29, 2001, then-Attorney General John Ashcroft announced the "Responsible Cooperators Program" to reach out to persons who may be eligible for the S visa. Up to 200 criminal informants and 50 terrorist informants may be admitted annually. Since FY2005, more than 500 informants and their accompanying family members have entered on S visas. No terrorist informants have been admitted into the U.S. since 1996.
Spyware: Background and Policy Issues for Congress
No Description Available.
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Protecting Our Perimeter: “Border Searches” under the Fourth Amendment
No Description Available.
Africa and the War on Terrorism
African countries overwhelmingly expressed their support for the U.S.-led efforts on the war against terrorism shortly after the September 11 attacks on New York and Washington. Some African countries are reportedly sharing intelligence and are coordinating with Washington to fight terrorism in Africa. Administration officials believe that Africa is a potential breeding ground for terrorism. Some African officials are concerned that despite the strong support African governments have provided to the anti-terror campaign, they are not seen as real coalition partners in the fight against terrorism. African officials note that cooperation between the United States and Africa in the fight against terrorism should also include extraditing and apprehending members of African terrorist and extremist groups active in Europe and the United States. They argue that these groups are raising funds and organizing in the west, often unhindered by western governments.
USA PATRIOT Improvement and Reauthorization Act of 2005 (H.R. 3199): A Legal Analysis of the Conference Bill
No Description Available.
USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006 (S. 2271)
No Description Available.