This report discusses major judicial opinions concerning suspected enemy belligerents detained in the conflict with Al Qaeda and the Taliban. The report addresses all Supreme Court decisions concerning enemy combatants and also discusses notable circuit court opinions addressing issues of ongoing relevance.
This report discusses obstruction of justice, which is is a federal crime. It describes specific kinds of obstruction, organized by type, and references various relevant laws that have provisions against obstruction.
This report provides a framework for examining the current status and future prospects for U.S.- Mexican security cooperation. It begins with a brief discussion of the threat that drug trafficking and related crime and violence pose to both nations, followed by an analysis of the evolution of the Mérida Initiative. The report then provides an overview of the Peña Nieto government's security strategy and how it is affecting the Mérida Initiative. The report then examines key aspects of the current U.S.-Mexican security strategy and concludes by raising policy issues that may affect bilateral efforts.
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
This report provides a background and analysis comparing military commissions as envisioned under the revised Military Commissions Act (MCA) to those established by the MCA 2006. After reviewing the history of the implementation of military commissions in the armed conflict against Al Qaeda and associated forces, the report provides an overview of the procedural safeguards provided in the MCA. Finally, the report provides two charts comparing the MCA as amended by the MCA 2009 to the original MCA enacted in 2006 and to general courts-martial.
The focus of this report is on the federal response to domestic violence under the Family Violence Prevention and Services Act (FVPSA). "Domestic violence" is used in the report to describe violence among intimate partners, including those involved in dating relationships.
This report provides background information regarding the prison population in the United States that has been growing steadily for more than 30 years. The report presents correctional system statistics and discusses the federal government's involvement in offender reentry programs and the Second Chance Act (P.L. 110-199) that was enacted on April 9, 2008.
This report reviews the legislative history surrounding the enactment of the 1968 and 1976 amendments to the appointment of the FBI Director, as well as information on the nominees to the FBI Directorship since 1972. It also provides a legal overview of the extension of a Director's tenure.
This report discusses the Community Oriented Policing Services (COPS) program, which was created by Title I of the Violent Crime Control and Law Enforcement Act of 1994 (P.L. 103-322). The mission of the COPS program is to advance community policing in all jurisdictions across the United States. Legislation introduced in the 111th Congress would reauthorize the COPS program through FY2014 and reestablish COPS as a multi-grant program. This report provides an overview and analysis of issues Congress might choose to consider when taking up legislation to reauthorize the COPS program.
This report discusses the three general federal perjury laws. It is an abbreviated version of CRS Report 98-808, Perjury Under Federal Law: A Brief Overview, by Charles Doyle, stripped of most footnotes, quotations, citations, and bibliography.
This report discusses the three general federal perjury laws. It is an abbreviated version of CRS Report 98-808, Perjury Under Federal Law: A Brief Overview, by Charles Doyle, stripped of most footnotes, quotations, citations, and bibliography.
This report describes the nature and scope of the problem of trafficking in persons in Latin America and the Caribbean. It then describes U.S. efforts to deal with trafficking in persons in the region, as well as discusses the successes and failures of some recent country and regional antitrafficking efforts. The report concludes by raising issues that may be helpful for the 113th Congress to consider as it continues to address human trafficking as part of its authorization, appropriations, and oversight activities.
This report discusses the applicability of the Hague Convention and current U.S. laws, both civil and criminal, which seek to address the quandary of children abducted by parents to foreign nations.
This report is an abridged version of CRS Report RL33223, Venue: A Legal Analysis of Where a Federal Crime May Be Tried, by Charles Doyle, stripped of the footnotes and most of the citations to authority found in the longer version.
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
This report analyzes the existing law and authority to detain U.S. persons, including American citizens and resident aliens, as well as other persons within the United States who are suspected of being members, agents, or associates of Al Qaeda or possibly other terrorist organizations as "enemy combatants."
This report first provides a brief federal legislative history of identity theft laws. It analyzes selected trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule. It also examines possible issues for Congress to consider.
This report provides an overview and analysis of issues Congress might consider if it chooses to take up legislation to reauthorize the Community Oriented Policing Services (COPS) program.
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
This report provides an overview of how DNA is used to investigate crimes and help protect the innocent. It also reviews current statutory law on collecting DNA samples, sharing DNA profiles generated from those samples, and providing access to post-conviction DNA testing. The report also includes a summary of grant programs authorized by Congress to assist state and local governments with reducing DNA backlogs, provide post-conviction DNA testing, and promote new technology in the field. It also reviews select issues Congress might consider should it legislate or conduct oversight in this area.
This report provides background information regarding the prison population in the United States that has been growing steadily for more than 30 years. The report presents correctional system statistics and discusses the federal government's involvement in offender reentry programs and the Second Chance Act (P.L. 110-199) that was enacted on April 9, 2008.
This report summarizes the Foreign Sovereign Immunities Act (FSIA) and jurisdiction in cases against foreign defendants and analyzes the court of appeals decision. It also discusses legislative efforts to address these issues(S. 1535 and H.R. 3143).
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. This report provides links to selected authoritative resources related to cybersecurity issues.
This report seeks to inform the current debate over the nomination and confirmation for U.S. circuit and district court nominees in three ways: first, by providing an overview of the time taken by the Senate during recent presidencies to confirm U.S. circuit and district court nominees; second, by identifying potential consequences of a protracted confirmation process for such nominees; and third, by identifying policy options the Senate might consider to shorten the length of time from nomination to confirmation for U.S. circuit and district court nominees.
This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.
This report provides a discussion of the National Drug Control Strategy, the National Drug Control Budget, and Office of National Drug Control Policy (ONDCP) evaluation of the National Drug Control Strategy implementation. It then provides an analysis of selected legislative and oversight issues that Congress may consider when debating the reauthorization of ONDCP.
Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Report that provides a background to the detention of enemy belligerents, followed by a brief introduction to the law of war pertinent to the detention of different categories of individuals.
Report that explores current foreign policy issues regarding U.S. efforts to combat human trafficking, the interrelationship among existing polices, and the historical and current role of Congress in such efforts.
Report regarding U.S. attention to terrorism in Latin America, which has intensified in the aftermath of the September 2001 terrorist attacks. The report talks about the 112th Congress's initiatives that have been introduced related to terrorism issues in the Western Hemisphere regarding Mexico, Venezuela, and the activities of Iran and Hezbollah.
This report provides a framework for examining the current status and future prospects for U.S.- Mexican security cooperation. It begins with a brief discussion of the threat that drug trafficking and related crime and violence pose to both nations, followed by an analysis of the evolution of the Mérida Initiative. The report then provides an overview of the Peña Nieto government's security strategy and how it is affecting the Mérida Initiative. The report then examines key aspects of the current U.S.-Mexican security strategy and concludes by raising policy issues that may affect bilateral efforts.
Report that provides background information regarding the prison population in the United States that has been growing steadily for more than 30 years. The report presents correctional system statistics and discusses the federal government's involvement in offender reentry programs and the Second Chance Act (P.L. 110-199) that was enacted on April 9, 2008.
Report that first reviews the legislative history surrounding the enactment of the 1968 and 1976 amendments to the appointment of the FBI Director, as well as information on the nominees to the FBI Directorship since 1972. The report also provides a legal overview of the extension of a Director's tenure.
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
The Supreme Court decided four search and seizure cases during its October 2012 term: Florida v. Jardines, Florida v. Harris, Bailey v. United, and Missouri v. McNeely. This report discusses the prior precedents in each case as well as the decision reached by the Court.
This report discusses the Community Oriented Policing Services (COPS) program, which was created by Title I of the Violent Crime Control and Law Enforcement Act of 1994 (P.L. 103-322). The mission of the COPS program is to advance community policing in all jurisdictions across the United States. Legislation introduced in the 111th Congress would reauthorize the COPS program through FY2014 and reestablish COPS as a multi-grant program. This report provides an overview and analysis of issues Congress might choose to consider when taking up legislation to reauthorize the COPS program.
This report provides an overview of federal forfeiture law. It sketches the origins and general attributes of forfeiture, describes the distribution of the hundreds of millions of dollars it generates, and identifies some of the related constitutional issues.
The first section of this report discusses demographics and record keeping of missing adults and unidentified remains, as well as some of the factors that may contribute to the disappearance of adults. This section also discusses federally funded databases that are used to track data on missing adults and unidentified individuals. The second section of the report describes the federal programs and initiatives to assist in locating missing adults, including funding data where applicable. Finally, the third section discusses issues about the federal role in missing adult cases.
This report examines potential policy issues that could arise under the Terror Gap proposal. For context, a basic overview of the U.S. government's post-9/11 terrorist watchlist procedures is provided, as well as an analysis of the Terror Gap proposal, which has been reintroduced in the 113th Congress.
This report provides background information regarding Miranda rights and public safety exception. The report discusses Supreme Court decisions on Miranda v. Arizona, due process inquiry, and the Fifth Amendment right.
This report provides general information about ricin, identifies historical examples of its use, discusses its potential as a bioterror weapon, and summarizes how its possession is currently regulated.
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
This report focuses on mass shootings and selected implications they have for federal policy in the areas of public health and safety. While such crimes most directly impact particular citizens in very specific communities, addressing these violent episodes involves officials at all levels of government and professionals from numerous disciplines.
This is a report regarding U.S. attention to terrorism in Latin America, which has intensified in the aftermath of the September 11, 2001 terrorist attacks. The report talks about the 112th Congress's initiatives that have been introduced related to terrorism issues in the Western Hemisphere regarding Mexico, Venezuela, and the activities of Iran and Hezbollah.
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
This dialog allows you to filter your current search.
Each of the Serial/Series Titles listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Serial/Series Titles? Start typing and we'll update the list to show only those items that match your needs.
Try limiting with other filters first or use this comprehensive list of titles as an alternative starting point.
This dialog allows you to filter your current search.
Each of the World Regions listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
This dialog allows you to filter your current search.
Each of the Countries listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Countries? Start typing and we'll update the list to show only those items that match your needs.
This dialog allows you to filter your current search.
Each of the U.S. States listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
This dialog allows you to filter your current search.
Each of the Counties listed note their name and the number of records that will be limited down to if you choose that option.
This dialog allows you to filter your current search.
Each of the Decades listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
This dialog allows you to filter your current search.
Each of the Years listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Years? Start typing and we'll update the list to show only those items that match your needs.
This dialog allows you to filter your current search.
Each of the Months listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
This dialog allows you to filter your current search.
Each of the Days listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Days? Start typing and we'll update the list to show only those items that match your needs.