35 Matching Results

Search Results

2012-2013 Presidential Election Period: National Security Considerations and Options

Description: This report discusses historical national security-related presidential transition activities, provides a representative sampling of national security issues a new Administration may encounter, and offers considerations and options relevant to each of the five phases of the presidential election period. Each phase has distinct challenges and opportunities for the incoming Administration, the outgoing Administration, and Congress. This report is intended to provide a framework for national security considerations during the current election period and will be updated to reflect the election outcome.
Date: October 5, 2012
Creator: Rollins, John
Partner: UNT Libraries Government Documents Department

Osama bin Laden's Death: Implications and Considerations

Description: This report discusses issues and questions related to the killing of Osama bin Laden (OBL), which are multifaceted and may have operational, regional, and policy implications. Operational policy issues include congressional notification, legal considerations, and current and future military activities.
Date: May 5, 2011
Creator: Rollins, John.
Partner: UNT Libraries Government Documents Department

Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Description: This report examines possible terrorists' objectives and computer vulnerabilities that might lead to an attempted cyberattack against the critical infrastructure of the U.S. homeland, and also discusses the emerging computer and other technical skills of terrorists and extremists. Policy issues include exploring ways to improve technology for cybersecurity, or whether U.S. counterterrorism efforts should be linked more closely to international efforts to prevent cybercrime.
Date: January 22, 2007
Creator: Rollins, John & Wilson, Clay
Partner: UNT Libraries Government Documents Department

Terrorism and Transnational Crime: Foreign Policy Issues for Congress

Description: This report provides an overview of transnational security issues related to patterns of interaction among international terrorist and crime groups. In addition, the report discusses the U.S. government's perception of and response to the threat. It concludes with an analysis of foreign policy options.
Date: June 11, 2013
Creator: Rollins, John & Wyler, Liana Sun
Partner: UNT Libraries Government Documents Department

International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress

Description: This report provides a primer on the confluence of transnational terrorist and criminal groups and related activities abroad. It evaluates possible motivations and disincentives for cooperation between terrorist and criminal organizations, variations in the scope of crime-terrorism links, and the types of criminal activities--fundraising, material and logistics support, and exploitation of corruption and gaps in the rule of law--used by terrorist organizations to sustain operations.
Date: March 18, 2010
Creator: Rollins, John & Wyler, Liana Sun
Partner: UNT Libraries Government Documents Department

U.S. Citizens Kidnapped by the Islamic State

Description: This report briefly discusses the Islamic State's (IS, or alternatively, Islamic State in Iraq and the Levant, ISIL, or Islamic State in Iraq and Syria, ISIS) kidnapping of American citizens and the implications for congressional response.
Date: October 17, 2014
Creator: Rollins, John W. & Rosen, Liana
Partner: UNT Libraries Government Documents Department

Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

Description: This report identifies cybersecurity policy issues that have been proposed for priority consideration. The report lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem. It then lists the current status of the legislation and compares legislation with existing executive branch initiatives. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to further highlight related considerations for Congress.
Date: September 30, 2009
Creator: Theohary, Catherine A. & Rollins, John
Partner: UNT Libraries Government Documents Department

Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

Description: This report identifies cybersecurity policy issues that have been proposed for priority consideration. The report lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem. It then lists the current status of the legislation and compares legislation with existing executive branch initiatives. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to further highlight related considerations for Congress.
Date: January 12, 2010
Creator: Theohary, Catherine A. & Rollins, John
Partner: UNT Libraries Government Documents Department

Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations

Description: This report discusses the legal issues and addresses policy considerations related to the Comprehensive National Cybersecurity Initiative (CNCI). The CNCI establishes a multi-pronged approach the federal government plans to take in identifying current and emerging cyber threats; shoring up current and future telecommunications and cyber vulnerabilities; and responding to, or proactively addressing, entities that wish to steal or manipulate protected data on secure federal systems.
Date: March 10, 2009
Creator: Rollins, John & Henning, Anna C.
Partner: UNT Libraries Government Documents Department

International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress

Description: This report provides a primer on the confluence of transnational terrorist and criminal groups and related activities abroad. It evaluates possible motivations and disincentives for cooperation between terrorist and criminal organizations, variations in the scope of crime-terrorism links, and the types of criminal activities--fundraising, material and logistics support, and exploitation of corruption and gaps in the rule of law--used by terrorist organizations to sustain operations.
Date: January 5, 2010
Creator: Rollins, John; Wyler, Liana Sun & Rosen, Seth
Partner: UNT Libraries Government Documents Department

The Islamic State--Frequently Asked Questions: Threats, Global Implications, and U.S. Policy Responses

Description: With the attacks in Beirut, over Egypt, and in Paris, the Islamic State has demonstrated a transnational capability that suggests its strategic objectives and tactics have evolved. The response to these attacks by the United States and other nations continues to evolve as the threat posed by IS changes. This report poses frequently asked questions with answers excerpted from other CRS products.
Date: November 25, 2015
Creator: Rollins, John W. & Peters, Heidi M.
Partner: UNT Libraries Government Documents Department

Islamist Extremism in Europe

Description: This report provides an overview of Islamist extremism in Europe, possible terrorist links, European responses, and implications for the United States. Although the vast majority of Muslims in Europe are not involved in radical activities, Islamist extremists and vocal fringe communities that advocate terrorism exist and reportedly have provided cover for terrorist cells.
Date: January 6, 2006
Creator: Archick, Kristin; Rollins, John & Woehrel, Steven
Partner: UNT Libraries Government Documents Department

The 2016 Olympic Games: Health, Security, Environmental, and Doping Issues

Description: This report discusses a variety of issues might pose risks to the health, safety, and general well-being of athletes and their families, team personnel, and spectators participating in or attending the 2016 Olympic Games. Chief among these are the Zika virus, public safety threats, security concerns, and environmental conditions. The report also discusses the possible implications of hosting the Olympics for Brazil and the issue of doping.
Date: August 8, 2016
Creator: Halchin, L. Elaine & Rollins, John W.
Partner: UNT Libraries Government Documents Department

NSA Surveillance Leaks: Background and Issues for Congress

Description: This report discusses the specifics of these two NSA collection programs. The first program collects in bulk the phone records--including the number that was dialed from, the number that was dialed to, and the date and duration of the call--of customers of Verizon and possibly other U.S. telephone service providers. The second program targets the electronic communications, including content, of foreign targets overseas whose communications flow through American networks.
Date: September 4, 2013
Creator: Rollins, John W. & Liu, Edward C.
Partner: UNT Libraries Government Documents Department