Search Results

open access

The Congressional Appropriations Process: An Introduction

Description: This report describes the annual appropriations cycle from the President’s submission of his annual budget through enactment of the appropriations measures. It describes the three types of appropriations measures—regular appropriations bills, continuing resolutions, and supplemental bills. It explains the spending ceilings for appropriations bills that are associated with the budget resolution and the sequestration process, including a description of the mechanisms used to enforce the ceilings.… more
Date: December 6, 2004
Creator: Streeter, Sandy
Partner: UNT Libraries Government Documents Department
open access

Constitutionality of a Senate Filibuster of a Judicial Nomination

Description: This report provides an overview of the major issues which have been raised recently in the Senate regarding the Judicial Nominations, Filibusters, and the Constitution: When a Majority Is Denied Its Right to Consent and in the press concerning the constitutionality of a Senate filibuster (i.e., extended debate) of a judicial nomination.
Date: December 6, 2004
Creator: Shampansky, Jay R.
Partner: UNT Libraries Government Documents Department
open access

Afghanistan: Narcotics and U.S. Policy

Description: This report describes the structure and development of the narcotics trade in Afghanistan and explores its relevance to Afghan, U.S., and international security interests, including the 9/11 Commission’s recommendation that the United States make a long term commitment to the stability and security of Afghanistan. The report provides current statistical information on the opium trade, profiles its various participants, explores alleged narco-terrorist linkages, and reviews the U.S. and internat… more
Date: December 7, 2004
Creator: Blanchard, Christopher M.
Partner: UNT Libraries Government Documents Department
open access

Border and Transportation Security: Overview of Congressional Issues

Description: This report provides a summary of selected border and transportation security (BTS) concepts and issues that may be of interest to the 109th Congress. It is the product of contributions from CRS staff in the table contained later in this report labeled Key Policy Staff: Border and Transportation Security.
Date: December 17, 2004
Creator: Lake, Jennifer E.
Partner: UNT Libraries Government Documents Department
open access

Afghanistan: Post-War Governance, Security, and U.S. Policy

Description: The United States and its allies are helping Afghanistan emerging from more than 22 years of warfare, although substantial risk to Afghan stability remains. Before the U.S. military campaign against the orthodox Islamist Taliban movement began on October 7, 2001, Afghanistan had been mired in conflict since the Soviet invasion of Afghanistan in 1979. The defeat of the Taliban has enabled the United States and its coalition partners to send forces throughout Afghanistan to search for Taliban and… more
Date: December 28, 2004
Creator: Katzman, Kenneth
Partner: UNT Libraries Government Documents Department
open access

Balancing Scientific Publication and National Security Concerns: Issues for Congress

Description: There is a lack of consensus regarding the best method of balancing scientific publishing and national security. The current federal policy, as described in National Security Decision Directive 189, is that fundamental research should remain unrestricted and that in the rare case where it is necessary to restrict such information, classification is the appropriate vehicle to do so. Other mechanisms restrict international information flow, where Export Administration Regulations (EAR) and Intern… more
Date: December 16, 2004
Creator: Shea, Dana A.
Partner: UNT Libraries Government Documents Department
open access

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data … more
Date: December 16, 2004
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen