Congressional Research Service Reports - 63 Matching Results

Search Results

In Re Terrorist Attacks on September 11, 2001: Dismissals of Claims Against Saudi Defendants Under the Foreign Sovereign Immunities Act (FSIA)
This report summarizes the Foreign Sovereign Immunities Act (FSIA) and jurisdiction in cases against foreign defendants and analyzes the recent court of appeals decision.
Internet Firearm and Ammunition Sales
This report discusses the sale of firearms and ammunition over the Internet, with a focus on the extent to which federal law regulates such activity.
Identity Theft: Trends and Issues
In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud—the highest level since 2007. Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation's economy but its security. Consequently, in securing the nation and its economic health, policy makers are also tasked with reducing identity theft and its impact.
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime.
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Cybersecurity: Authoritative Reports and Resources
Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cyber security issues, including: legislation, hearings in the 112th Congress, data and statistics, and cyber security glossaries.
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Cybersecurity: Authoritative Reports and Resources
Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Terrorist Watch List Screening and Brady Background Checks for Firearms
The November 2009 shooting at Fort Hood, TX, renewed interest in terrorist watchlist screening and Brady background checks for firearms through the National Instant Criminal Background Check System (NICS). In the 110th Congress, Senator Frank Lautenberg and Representative Peter King introduced a bill based on a legislative proposal developed by DOJ that would have authorized the Attorney General to deny the transfer of firearms or the issuance of firearms (and explosives) licenses/permits to "dangerous terrorists." They reintroduced this proposal in the 111th Congress and supporters dubbed it the "Terror Gap" proposal. It was reintroduced once again in the 112th Congress. The Terror Gap proposal raises several potential issues for Congress, which are discussed in this report.
DNA Testing in Criminal Justice: Background, Current Law, Grants, and Issues
This report provides an overview of how DNA is used to investigate crimes and help protect the innocent. It also reviews current statutory law on collecting DNA samples, sharing DNA profiles generated from those samples, and providing access to post-conviction DNA testing. The report also includes a summary of grant programs authorized by Congress to assist state and local governments with reducing DNA backlogs, provide post-conviction DNA testing, and promote new technology in the field.
U.S.-Colombia Free Trade Agreement: Labor Issues
This report examines three labor issues and arguments related to the pending U.S.-Colombia free trade agreement (CFTA; H.R. 5724 and S. 2830): violence against trade unionists; impunity (accountability for or punishment of the perpetrators); and worker rights protections for Colombians.
Failure to Register as a Sex Offender: An Abridged Legal Analysis of 18 U.S.C. 2250
Report that describes 18 U.S.C. 2250, which outlaws any individual convicted of a sex offense from not registering themselves in a jurisdiction which they live, work, or go to school. It describes elements of the law, and consequences for not following it.
Failure to Register as a Sex Offender: An Abridged Legal Analysis of 18 U.S.C. 2250
Report that describes 18 U.S.C. 2250, which outlaws any individual convicted of a sex offense from not registering themselves in a jurisdiction which they live, work, or go to school. It describes elements of the law, and consequences for not following it.
Latin America: Terrorism Issues
U.S. attention to terrorism in Latin America intensified in the aftermath of the September 2001 terrorist attacks on New York and Washington, with an increase in bilateral and regional cooperation. Over the past several years, policymakers have been concerned about Iran's increasing activities in Latin America, particularly its relations with Venezuela, although there has been disagreement over the extent and significance of Iran's relations with the region. In the 112th Congress, several initiatives have been introduced related to terrorism issues in the Western Hemisphere regarding Mexico, Venezuela, and the activities of Iran and Hezbollah, and several oversight hearings have been held.
Money Laundering: An Abridged Overview of 18 U.S.C. 1956 and Related Federal Criminal Law
This is an overview of the elements of federal criminal money laundering statutes and the sanctions imposed for their violation.
Smart Meter Data: Privacy and Cybersecurity
Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. Smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. Detailed electricity usage data offers a window into the lives of people inside of a home by revealing what individual appliances they are using, and the transmission of the data potentially subjects this information to interception or theft by unauthorized third parties or hackers. Unforeseen consequences under federal law may result from the installation of smart meters and the communications technologies that accompany them. This report examines federal privacy and cybersecurity laws that may apply to consumer data collected by residential smart meters.
Search and Seizure Cases in the October 2012 Term of the Supreme Court
Report that looks at three search and seizure cases heard during its October 2012 term.
Latin America: Terrorism Issues
U.S. attention to terrorism in Latin America intensified in the aftermath of the September 2001 terrorist attacks on New York and Washington, with an increase in bilateral and regional cooperation. Over the past several years, policymakers have been concerned about Iran's increasing activities in Latin America, particularly its relations with Venezuela, although there has been disagreement over the extent and significance of Iran's relations with the region. In the 112th Congress, several initiatives have been introduced related to terrorism issues in the Western Hemisphere regarding Mexico, Venezuela, and the activities of Iran and Hezbollah, and several oversight hearings have been held.
Crime Victims' Rights Act: A Summary and Legal Analysis of 18 U.S.C. 3771
An overview of rights afforded to federal crime victims. The report describes who qualifies for these rights and follows with a description of the rights.
Organized Crime: An Evolving Challenge for U.S. Law Enforcement
In the last two decades, organized crime has grown more complex, posing evolving challenges for U.S. federal law enforcement. These criminals have transformed their operations in ways that broaden their reach and make it harder for law enforcement to combat them. They have adopted more-networked structural models, internationalized their operations, and grown more tech savvy. They are a significant challenge to U.S. law enforcement. There still is no single agency charged with investigating organized crime in the way the Federal Bureau of Investigation (FBI) has been designated the lead investigative agency for terrorism. Further, resources to tackle this issue are divided among many federal agencies. As such, Congress may exert its oversight authority regarding the federal coordination of organized crime investigations via the 2011 strategy. Policymakers may also debate the efficacy of current resources appropriated to combat organized crime.
Extraterritorial Application of American Criminal Law: An Abbreviated Sketch
This report discusses the application of American criminal law outside the United States.
The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement
Globalization and technological innovation have fostered the expansion of both legitimate and criminal operations across physical borders as well as throughout cyberspace. U.S. law enforcement has increasingly relied on intelligence-led policing, enhanced interagency cooperation, and technological implementation to confront 21st century crime. Issues for Congress are how it can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime. It may also examine whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information.
The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement
This report looks at issues for Congress related to expansion of legitimate and criminal operations across physical borders and through cyberspace as a result of globalization and technological innovation. In particular, it considers how Congress can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime and whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information.
Gun Control Legislation
Report that looks at past gun control legislation and also how recent events (such as the shooting in Tucson, AZ on January 8, 2011 which wounded Rep. Gabrielle Giffords) have influenced current legislation. This report concludes with discussion of other salient and recurring gun control issues that have generated past congressional interest.
Gun Control Legislation
This report looks at past gun control legislation and also how recent events (such as the shooting in Tucson, Arizona on January 8, 2011 which notably wounded Rep. Gabrielle Giffords) have influenced current legislation. This report concludes with discussion of other salient and recurring gun control issues that have generated past congressional interest.
Gun Control Legislation
This report looks at past gun control legislation and also how recent events (such as the shooting in Tucson, Arizona on January 8, 2011 which notably wounded Rep. Gabrielle Giffords) have influenced current legislation. This report concludes with discussion of other salient and recurring gun control issues that have generated past congressional interest.
Gun Control Legislation
This report looks at past gun control legislation and also how recent events (such as the shooting in Tucson, AZ on January 8, 2011 which notably wounded Rep. Gabrielle Giffords) have influenced current legislation. This report concludes with discussion of other salient and recurring gun control issues that have generated past congressional interest.
Gun Control Legislation
This report looks at past gun control legislation and also how recent events (such as the shooting in Tucson, AZ on January 8, 2011 which notably wounded Rep. Gabrielle Giffords) have influenced current legislation. This report concludes with discussion of other salient and recurring gun control issues that have generated past congressional interest.
Gun Control Legislation
A look at past gun control legislation and also how recent events (such as the shooting in Tucson, AZ on January 8, 2011 which notably wounded Rep. Gabrielle Giffords) have influenced current legislation. This report concludes with discussion of other salient and recurring gun control issues that have generated past congressional interest.
Cybersecurity: Authoritative Reports and Resources
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed.
Cybersecurity: Authoritative Reports and Resources
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed.
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis
The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
The Crime Victims Fund: Federal Support for Victims of Crime
Report that provides background and funding information for Victims of Crime Act (VOCA) programs and the Crime Victims Fund (CVF). It describes the process through which CVF funds are allocated and explains how the CVF impacts the annual budget for Department of Justice (DOJ).
Cybersecurity: Authoritative Reports and Resources
Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues.
Whistleblower Protections Under Federal Law: An Overview
This report provides an overview of key aspects of the 18 selected federal statutes applicable to individuals in certain private-sector industries. It focuses on the protections provided to employees who believe they have been subject to retaliation, rather than on how or where alleged misconduct should be disclosed. In addition, the report also includes an overview of the Whistleblower Protection Act. While state law may also provide whistleblower protections for employees, this report focuses only on the aforementioned federal statutory provisions.
Protecting Classified Information and the Rights of Criminal Defendants: The Classified Information Procedures Act
A criminal prosecution involving classified information may cause tension between the government's interest in protecting classified information and the criminal defendant's right to a constitutionally valid trial. In some cases, a defendant may threaten to disclose classified information in an effort to gain leverage. Concerns about this practice, referred to as "graymail," led the 96th Congress to enact the Classified Information Procedures Act to provide uniform procedures for prosecutions involving classified information.
Detention of U.S. Persons as Enemy Belligerents
This report provides a background to the legal issues presented, followed by a brief introduction to the law of war pertinent to the detention of different categories of individuals. An overview of U.S. practice during wartime to detain persons deemed dangerous to the national security is presented. The report concludes by discussing Congress's role in prescribing rules for wartime detention as well as legislative proposals in the 112th Congress to address the detention of U.S. persons.
Trafficking in Persons: U.S. Policy and Issues for Congress
This report focuses on international and domestic human trafficking and U.S. policy responses, with particular emphasis on the Trafficking Victims Protection Act of 2000 (TVPA) and its subsequent reauthorizations.
Extraterritorial Application of American Criminal Law
Crime is ordinarily proscribed, tried, and punished according to the laws of the place where it occurs. American criminal law applies beyond the geographical confines of the United States, however, under certain limited circumstances. A surprising number of federal criminal statutes have extraterritorial application, but prosecutions have been few. This may be because when extraterritorial criminal jurisdiction does exist, practical and legal complications, and sometimes diplomatic considerations, may counsel against its exercise.
Immigration-Related Detention: Current Legislative Issues
As Congress considers addressing some of the problems in the nation's immigration system, the detention of noncitizens in the United States may be an issue as Congress may choose to reevaluate detention priorities (i.e., who should be detained) and resources. There are many policy issues surrounding detention of aliens. The Illegal Immigrant Reform and Immigrant Responsibility Act of 1996 (IIRIRA) increased the number of aliens subject to mandatory detention, and raised concerns about the justness of mandatory detention, especially as it is applied to asylum seekers arriving without proper documentation. Additionally, as DHS increases its ability to identify aliens who are subject to removal from local jails in more remote locations, the nationwide allocation of detention space may become an issue.
Judicial Activity Concerning Enemy Combatant Detainees: Major Court Rulings
This report discusses major judicial opinions concerning suspected enemy belligerents detained in the conflict with Al Qaeda and the Taliban. The report addresses all Supreme Court decisions concerning enemy combatants. It also discusses notable circuit court opinions addressing issues of ongoing relevance.
The Domestic Terrorist Threat: Background and Issues for Congress
In the last decade, domestic terrorists-people who commit crimes within the homeland and draw inspiration from U.S.-based extremist ideologies and movements-have killed American citizens and damaged property across the country. Not all of these criminals have been prosecuted under terrorism statutes. This report discusses domestic terrorism's significance to policymakers per five topics: level of activity, use of nontraditional tactics, exploitation of the internet, decentralized nature of the threat, and prison radicalization. The report also discusses three areas that Congress may consider the federal role of combating such activities: the issue of definitions, adequacy of domestic terrorism intelligence collection efforts, and the value of community outreach driven efforts to quell terrorism related radicalization in the United States.
Drones in Domestic Surveillance Operations: Fourth Amendment Implications and Legislative Responses
This report first explores the potential uses of drones in the domestic sphere by federal, state, and local governments. It then surveys current Fourth Amendment jurisprudence, including cases surrounding privacy in the home, privacy in public spaces, location tracking, manned aerial surveillance, and those involving the national border. Next, it considers how existing jurisprudence may inform current and proposed drone uses. It then describes the various legislative measures introduced in the 112th Congress to address the legal and policy issues surrounding drones and, finally, briefly identifies several alternative approaches that may constrain the potential scope of drone surveillance.
Detention of U.S. Persons as Enemy Belligerents
The detainee provisions passed as part of the National Defense Authorization Act for FY2012 affirm that the Authorization for Use of Military Force in response to the terrorist attacks of September 11, 2001, authorizes the detention of persons captured in connection with hostilities. This report provides a background to the legal issues presented, followed by a brief introduction to the law of war pertinent to the detention of different categories of individuals. An overview of U.S. practice during wartime to detain persons deemed dangerous to the national security is presented.