Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Training Guide for Hate Crime Data Collection
"The material in this training guide is intended to assist law enforcement agencies in the task of establishing a hate crime training program for their personnel. It provides suggested model reporting procedures, as well as training aids for sensitizing street officers to the hate crime problem. Further training material can be obtained from the organizations listed in Appendix A, captioned 'Organizations Offering Information Concerning Anti-Bias Education.' Assistance in these matters may also be requested from the nearest regional office of the Community Relations Service (CRS) of the Department of Justice (DOJ). (See Appendix D for list of regional CRS/DOJ offices.)"
United States. Federal Bureau of Investigation. Criminal Justice Information Services Division
1996
-
Test and Evaluation Plan for Screener Proficiency Evaluation and Reporting System (SPEARS) Threat Image Projection
"This document is the Test and Evaluation Plan (TEP) to evaluate the effectiveness of the threat image projection training and testing component of the Screener Proficiency Evaluation and Reporting System (SPEARS). This TEP is for the test and evaluation of the EG&G Astrophysics Linescan Training and Testing (TnT) system and will focus on determining its effectiveness in meeting the requirements set forth in the Critical Operational Issues and Criteria and Critical Technical Issues and Criteria provided by the Federal Aviation Administration. The test and evaluation will be conducted at the Los Anqeles International Airport. The results will be analyzed and become part of a later document."
United States. Federal Aviation Administration
Fobes, J. L.; McAnulty, D. Michael
1995-12
-
United States Department of State: Congressional Presentation for Foreign Operations, Fiscal Year 1997
"Following World War II, America chose a path of engagement, which made possible the construction of a more secure, democratic, and prosperous world. Standing on its principles and learning from past mistakes, America prevailed in the face of the formidable communist threat. To meet the challenges of the next century and to build an even safer world for our children, we must plot a similar course marked by vision and steadfastness of purpose. Just as American leadership was critical to global peace, stability, and economic progress in the twentieth century, it will remain so in the twenty-first. Our leadership is likely to be even more relevant in the new information age as our world becomes even smaller and more interdependent. In this era of new challenges and opportunities, our security and economic well-being will depend on global events and trends which we can choose to lead or to follow. If we fail to exercise our leadership now, we will pay an enormous price later. Recently, American leadership has spurred major successes in places such as the New Independent States, the Middle East, Bosnia, Haiti, and South Africa. It has strengthened democracy, reduced the risk of nuclear proliferation, expanded world prosperity, and countered the threats of environmental degradation, unbridled population growth, drug trafficking, and terrorism."
United States. Department of State
1996
-
Criminal Acts against Civil Aviation, 1996
"'Criminal Acts Against Civil Aviation' is a publication of the Federal Aviation Administration's Office of Civil Aviation Security. This document has been published each year since 1986. 'Criminal Act' records incidents that have taken place against civil aviation aircraft and interests worldwide. Incidents are summarized in regional geographic overviews. Feature articles focus on case histories or on specific aviation-related issues. Incidents are also sorted into one of seven categories and compared over a five year period. In addition, charts and graphs are located throughout the publication to provide a visual display of what is being reported. The cutoff date for information to be included in this report is December 31, 1996. The information contained in this publication is derived from a variety of foreign and domestic sources. In many cases, however, specific details of a particular incident, especially those occurring outside the United States, may not be available. While the FAA makes every effort to provide complete and accurate information, it is not always possible to verify accounts of some incidents. The FAA maintains records of aircraft hijackings, bombing attacks, and other significant criminal acts against civil and general aviation interests worldwide, which are used to compile this report. Offenses such as these represent serious threats to aviation safety and, in those incidents involving U.S. air carriers or facilities outside the United States, are often intended as symbolic attacks against the United States. Hijacking and commandeering incidents are viewed within the context of the U.S. Federal criminal statute (49 USC 1472 (i)), which defines air piracy as any seizure or exercise of control, by force or violence or threat of force or violence, or by any other form of intimidation, and with wrongful intent, of any aircraft. This report does not distinguish between an act of air piracy and an attempted act of air piracy for statistical purposes."
United States. Transportation Security Administration
1996
-
Security for the Internet Protocol
"Lack of widely available security is hindering the growth of the Internet, particularly for commercial users. Two security mechanisms have been designed for use with IPv4 and IPv6. They are an integral component of the IPv6 design but can also optionally work with IPv4. The first mechanism provides source host authentication and information integrity protection without confidentiality and should be exportable and widely deployable. The second mechanism protects the confidentiality of packet contents through the use of encryption. Both mechanisms are designed to be independent of any particular cryptographic algorithm so that new algorithms can be supported in the future without any change to the basic protocols."
Naval Research Laboratory (U.S.)
Atkinson, Randall J.
1995-11-30
-
Planning for Disaster Debris
"This guide highlights the need for communities to plan for the cleanup of debris after a major natural disaster. Based on lessons learned from communities that have experienced such disasters, this guide contains information to help communities prepare for and recover more quickly from the increased solid waste generated by a natural disaster. […] Every year natural disasters, such as fires, floods, earthquakes, hurricanes, and tornadoes, challenge American communities. These natural disasters have generated large amounts of debris, causing considerable disposal challenges for local public officials. If you answer yes to any of the following questions, your community could benefit from the advice and information presented in this guide. […] In the past, debris from disasters was simply buried or burned in the community. As demonstrated by recent disasters, burying or burning debris as a means of waste management may not be acceptable. Citizens do not want to inhale the smoke from open burning. Municipalities do not want to risk contamination of drinking water and soil from uncontrolled burial of debris. Under normal circumstances, much municipal solid waste is recycled. The remainder is disposed of in sanitary landfills or in sophisticated combustors, both of which are equipped with devices to control pollutants. Often, however, these standard waste disposal options are not sufficient to handle the overwhelming amount of debris left after a disaster. Further adding to the disposal dilemma is the fact that many municipalities are reluctant to overburden or deplete their existing disposal capacity with disaster debris." This guide was updated in March 2008.
United States. Environmental Protection Agency
1995-12
-
New Germany and Nuclear Weapons: Options for the Future
"This article first explores the issue of whether German motivations for obtaining nuclear weapons in the future exist or may develop by discussing the historical background regarding German attitudes about nuclear policy - the past German motivations and resulting debates over obtaining nuclear weapons. Second, it examines possible motivations in terms of the changed security concerns brought by the end of the cold war. What are the various security scenarios and plausible options and, in turn, their related effects on German nuclear decisions? Third, this article analyzes the influence of nonsecurity motivations. These motivations may stem from German efforts at producing an integrated political and cultural identity (i.e., political community) as part of the ongoing unification process. Can these nonsecurity aspects also act as an impetus for German desires to become a nuclear power? Last, this article includes overall conclusions and possible policy implications for the United States and the US Air Force."
USAF Institute for National Security Studies
Gose, Mark N.
1996
-
Air Sampling Sensors, the Open Skies Treaty, and Verifying the Chemical Weapons Convention
This thesis examines a novel proposal to join two separate arms control measures to achieve unique counterproliferation benefits. The Open Skies Treaty (OST) is a confidence-building measure between the states of NATO and the former Warsaw Pact. It allows aircraft equipped with sensors to overfly neighboring countries to monitor security-related activities. The Chemical Weapons Convention (CWC) attempts to eliminate an entire category of weapons of mass destruction. It is verified through reporting procedures and on-site inspections. OST overflights could be used to verify the CWC, aiding CWC inspectors to plan their inspections. This cross-treaty measure could be enhanced further with the addition of air sampling sensors capable of testing for chemical weapons production, creating inter-treaty synergy. Once these two pacts enter into force and prove their efficacy for arms control, this proposal for inter-treaty coordination will receive more attention. Obstacles for this inter-treaty coordination include the lack of formal mechanisms in either treaty for a complementary role and the lack of political impetus to effect it. This coordination is a logical progression for arms control.
Naval Postgraduate School (U.S.)
Rowe, Gregory D.
1995-12
-
Research Paper: Temporary Migrants in the United States
Temporary migrants to the United States, known legally as non-immigrants, have grown in number and importance over the 1980s and 1990s. The Immigration Act of 1990 in particular instituted a number of changes that the U.S. Commission on Immigration Reform is evaluating for its final report to Congress in 1997. This volume represents a significant contribution to the fact-finding efforts undertaken by the Commission to understand the implementation and impact of these policies. Scholars and policymakers working in the immigration arena have long appreciated the complexity of the different categories of permanent admissions, but only now are they turning their attention to the oftentimes linked temporary system with its rather different complexities. In this volume, leading scholars examine the non-immigrant system's major visa categories for temporary workers and foreign students. The Commission solicited these authors' contributions to help the Commission identify major policy issues and their solutions. The introductory chapter summarizes the authors' observations and recommendations on a range of topics, from the overall system of non-immigrant admissions to the effects of specific visa categories on U.S. businesses and workers, as well as our universities and students. The chapters here, comprising one of the first collections of scholarly studies on the topic, offer considerable scope and a solid point of departure for policymakers evaluating the non-immigrant system.
U.S. Commission on Immigration Reform
Lowell, Briant Lindsay
1996
-
Patterns of Global Terrorism 1996: Asia Overview
Although terrorism remains a concern in East Asia, national reconciliation efforts in Cambodia and the Philippines, and successful prosecutions in Japan, have helped reduce the terrorist profile in the region. Continuing defections by Khmer Rouge troops in Cambodia have reduced their numbers considerably, although the Khmer Rouge is still considered active and dangerous. Talks between the Philippine Government and a major insurgent group there have resulted in a peace agreement, although another major insurgent group has continued attacks in the southern Philippines, and terrorist groups continue to plague that nation. In February the Philippines hosted an international conference on counterterrorism at Baguio, which was attended by representatives of 20 nations, including the United States. The prosecution of a series of leaders of the Aum Shinrikyo cult in Japan, based primarily on the 1995 sarin nerve gas attack in the Tokyo subway, and the continued pursuit of Aum leaders still at large have dealt a heavy blow to that group. Terrorist activities by the Free Papua Movement (OPM) in Indonesia and by insurgent groups in a number of East Asian countries continue to pose a threat. In South Asia, terrorist training camps located in Afghanistan remain open. The fate of the four Western hostages, who were kidnapped in July 1995 by Kashmiri militants believed to be associated with the Pakistan-based Harakat ul-Ansar (HUA), remains unknown. Reports from Kashmiri militant sources maintain that the hostages were killed in December 1995, although these reports have not been confirmed. In Sri Lanka, the Liberation Tigers of Tamil Eelam (LTTE) continued to carry out extremely violent attacks in its ongoing campaign to cripple the economy and target government officials. A truck bomb destroyed the Central Bank, killing some 90 persons and wounding hundreds more. A commuter train was bombed, and a bus was ambushed, killing more than 80. The LTTE continued to assassinate political opponents, both civilian and military. The Indian and Pakistani Governments each claim that the intelligence service of the other country sponsors bombings on its territory.
United States. Department of State
1996
-
International Terrorism In the Twenty-First Century
"The Cold War is over but international terrorism remains a threat across the globe and especially to the United States and its allies. When looking at the future of international terrorism, several key questions need to be answered. They are: Why won't the terrorist threat go away? Is terrorism truly a serious threat or just Western paranoia to maintain military and police budgets? Where should terrorist actions be expected and for what reasons? What will be the impact of terrorism on individual nation states and overall global stability? And finally, will peaceful resolution and responses to terrorism be possible or will anti-terrorism efforts merely begin another version of arms escalation, punitive actions, and repressive governmental endeavors? This chapter will explore the global role of terrorism in the twenty-first century, including anti-terrorism responses and the possible consequences to nation states when they respond to terrorist acts."
USAF Counterproliferation Center
Goldstein, Frank L., 1945-
1996
-
FBI and Domestic Counterterrorism: A Comparative Analysis
This thesis is an attempt to analyze the effectiveness of the Federal Bureau of Investigation (FBI) in countering domestic terrorism in comparison to other democracies. in the first chapter, there is an attempt to define terrorism by examining the historical development and early attempts at defining terrorism. The second chapter describes the history of the FBI and its early battles with domestic terrorists, including infringements up constitutional rights. The third chapter relates Israel's problems with domestic terrorism by outlining the professional development and tragic errors of the Shin Bet (Israel's domestic security service). Great Britain's attempts to crush the Irish Republican Army are the subject of the fourth chapter. The fifth chapter concludes by demonstrating that each country has sought to eliminate domestic terrorism but no matter what method is used; eventually, they are forced to negotiate with the terrorists.
Naval Postgraduate School (U.S.)
Fears, Karla P.
1995-12
-
United States National and Supporting Military Counterdrug Strategies: A History and Assessment
"The National Drug Control Strategy and supporting strategy of the Department of Defense guide the efforts the United States and the Services in counterdrug operations. This study examines the origins of the national strategy and how the supporting military strategy was developed to work within the framework produced by Presidents Bush and Clinton. It explores the degrees of success achieved over the eight years the two strategies have been in existence, proposes a focus on the economics of the drug source countries as the center of gravity in counterdrug strategies of the future, and offers considerations for how military strategy could more effectively complement national strategy."
Army War College (U.S.)
Stroberg, Jon E.
1996
-
Joint Transportation Rotorcraft (JTR): Its Contribution to Future Joint Warfare
"The Force XXI Army of the 21st Century will be composed of numerous mobile customers requiring frequent and near simultaneous servicing from limited inventories. Combine the new force with the expected greater velocity and asymmetry of the future battlespace and it becomes absolutely critical to move, redirect, and redistribute supplies at speeds never before envisioned. This study will explore the many contributions and efficiencies the JTR can bring to the future force."
Army War College (U.S.)
Burke, Donald S., Jr.
1996
-
Surprise Attack: The Case of the Yom-Kippur War
"The issue of strategic surprise and specially the subject of surprise attack are some of the most complex problems that policymakers, militaries and intelligence analysts have to face. This is particularly true for states such as Israel, as it was demonstrated during the Yom Kippur War in 1973. Israel was taken by surprise which effected the beginning of the war, as well as the final results. From the Israeli perspective the basic problem was rooted in the imbalance between the size of the Arab and the Israeli military and the asymmetry seen from a geographical perspective. The IDF (Israeli defense forces) is primarily based on reserve forces, whereas the Arab militaries are mainly active. Therefore the deployment of the Israeli reserves depends on early warning, a decision of mobilization and its execution. Moreover, Israel has no strategic depth and its vital objectives are very close to the borders. These factors indicate the significance of the surprise attack and the need for intelligence warning, as a fundamental issue in the national security doctrine."
Industrial College of the Armed Forces (U.S.)
Chorev, Moni
1996
-
Chokepoints: Maritime Economic Concerns in Southeast Asia
"To ensure unrestricted sea lines of communication (SLOCs) in Southeast Asia (SEA), the U.S. Navy is assigned the task of helping to maintain clear maritime passage through the sea lanes of the region. For many years, the prime concern was military, not economic, as the United States required secure maritime transport via SLOCs in case of war. Now the emphasis has shifted to the economic component of our national security, a policy reaffirmed when the United States announced it would not accept disruption of trade in the South China Sea. In March and again in May, 1995, Secretary of State Christopher warned quarreling claimants to the Spratly reefs not to interfere with international shipping. What is the economic logic behind the American stance on freedom of navigation for commercial shipping? For the U.S. a concern is: 'Who benefits from keeping sea lanes open, and how much do they benefit?' A related question is: 'Who would be hurt if the sea lanes were closed, and how much would it hurt them?'"
National Defense University. Institute for National Strategic Studies
Noer, John H.; Gregory, David
1996
-
Incident at Mischief Reef: Implications for the Philippines, China, and the United States
"The February 1995 Chinese occupation of the Philippine-claimed Mischief Reef in the South China Sea raised tensions throughout the region and heightened concern throughout much of the industrialized/maritime world. Instability or armed conflict in this key area, particularly involving the Republic of the Philippines, could affect important, if not vital, U.S. security and economic interests. This paper examines the implications of the Spratly Island Issue on U.S. interests in the South China Sea, emphasizing the U.S. bilateral treaty relationship with the Philippines. After briefly reviewing the historical background and the various players' probable intentions, several possible approaches are discussed that could reduce the likelihood of conflict and instability."
Army War College (U.S.)
Meyer, Stanley E.
1996
-
Dupe Checklist System: Resolution Procedures Manual
"The Resolution Procedures Manual is one of five security reference handbooks providing background information, guidelines and procedures regarding passenger questioning and resolutions in conjunction with the Dupe Checklist (DCS) Program. It is intended to be used for operational guidance and/or training activities. A passenger may be duped into carrying a bomb on board an aircraft under the following circumstances: (1) A bomb is placed in an unsuspecting passenger's unattended baggage; (2) An unsuspecting passenger is given a bag to transport on his/her flight. A bomb is concealed inside the bag; (3) An unsuspecting passenger is given an item or a package to transport on his/ her flight. The item/package contains a bomb: (4) An unsuspecting passenger is given a 'gift' just prior to the flight. The gift contains a bomb; (5) A passenger may believe that he/she is involved in some type of illegal activity. Such a passenger may believe that his/her bag contains contraband (e.g. drugs, gold, cash, or diamonds). The passenger is not aware of the true contents of his/her bag (a bomb); (6) A passenger who is a terrorist, or a terrorist group sympathizer, may believe he/she is transferring confidential material or an explosive to his/her destination. In reality the passenger is carrying a bomb setup to go off on his/her flight."
United States. Federal Aviation Administration
Fobes, J. L.
1995-12
-
Electromagnetic Bomb - a Weapon of Electrical Mass Destruction
"High Power Electromagnetic Pulse generation techniques and High Power Microwave technology have matured to the point where practical E-bombs (Electromagnetic bombs) are becoming technically feasible, with new applications in both Strategic and Tactical Information Warfare. The development of conventional E-bomb devices allows their use in non-nuclear confrontations. This paper discusses aspects of the technology base, weapon delivery techniques and proposes a doctrinal foundation for the use of such devices in warhead and bomb applications."
United States. Department of the Air Force
Kopp, Carlo
1996
-
Managing Innovation in Policing: The Untapped Potential of the Middle Manager
"Although conventional management thinking assumes that middle managers will subvert organizational strategic change, the power and responsibility to convert leaders words to organizational deeds place great innovation challenges in middle managers bailiwick. Whether middle managers are part of the problem or part of the solution is being tested by police agencies that have recently embraced community policing and problem solving as operating strategies. At issue is whether a critical mass of police middle managers can contribute productively so that strategic changes called for by chiefs to implement community policing permeate deeply and enduringly in the organization. A new book, prepared under a National Institute of Justice grant, concludes that middle managements power to affect change can be harnessed to advance community policing objectives by including those managers in planning, acknowledging their legitimate self-interests, and motivating their investment in long-range solutions that enhance community safety and security."
National Institute of Justice (U.S.)
1995-12
-
Future Role and Structure of the Force XXI National Guard
"Preparation of the ground force build-up prior to DESERT STORM revealed severe deficiencies in National Guard 'Roundout' brigades training readiness. None of the three brigades which underwent an intensive 180 day train up were declared 'combat ready' prior to the outbreak of hostilities. This paper reviews the causes for the failure of National Guard maneuver brigades to maintain their training proficiency. It examines whether or not the policy of fielding combat National Guard brigade size units is realistic given the performance expectations of Force XXI. The paper outlines possible solutions which allows the National Guard to continue to play a valuable role in our nation's defense and at the same time fulfill an historic position within our country's citizenry."
Army War College (U.S.)
Hooper, Travis L.
1996
-
Construction Information for a Stronger Home
This Federal Emergency Management Agency [FEMA] report offers information on constructing a home to withstand natural disasters.
United States. Federal Emergency Management Agency
Ekroth, David C.; Rowbethaum, Jeff; Bornman, Charles
1995-12
-
Recording and Coding Guide for the Structure Inventory and Appraisal of the Nation's Bridges
"This Guide has been prepared for use by the States, Federal and other agencies in recording and coding the data elements that will comprise the National Bridge Inventory data base. By having a complete and thorough inventory, an accurate report can be made to the Congress on the number and state of the Nation's bridges. The Guide also provides the data necessary for the Federal Highway Administration (FHWA) and the Military Traffic Management Command to identify and classify the Strategic Highway Corridor Network and it's connectors for defense purposes. The coded items in this Guide are considered to be an integral part of the data base that can be used to meet several Federal reporting requirements, as well as part of the States' needs. These requirements are set forth in the National Bridge Inspection Standards (23 CFR 650.3) which are included as Appendix C. A complete, thorough, accurate, and compatible data base is the foundation of an effective bridge management system. Reports submitted in connection with the Highway Bridge Replacement and Rehabilitation Program and the National Bridge Inspection Program also are related to this Guide."
United States. Federal Highway Administration
1995-12
-
Proposed Deployment of United States Armed Forces into Bosnia: Memorandum Opinion for the Counsel to the President [November 30, 1995]
"This is to provide you with our analysis of whether the President, acting without specific statutory authorization, lawfully may introduce United States ground troops into Bosnia and Herzegovina ('Bosnia') to help the North Atlantic Treaty Organization ('NATO') ensure compliance with the recently negotiated peace agreement. We believe that the President may act unilaterally in the circumstances here."
United States. Department of Justice. Office of Legal Counsel
1995-11-30
-
Russian Views on Information-Based Warfare
Article attempts to define the Russian understanding of the term "information warfare" and explores the impact of the information revolution on the Russian military. Like the US, the Russian army is still discussing terminology, concepts, and policy, and has no authoritative definitions or doctrine to offer the international community. In fact, until it catches up with the West in the information technology arena, Russia may be content to use the nuclear deterrent to offset the possibility of anyone using an information operation against it. Such an option is dangerous for everyone. This article has one caveat. The Russian military officers who have openly addressed the subject of the military's information revolution do not official represent the Russian Ministry of Defense or General Staff. Therefore, this study avoids the phrase "the Russian military thinks" since it cites individual military or civilian analysts. The article presents a general outline of the Russian view of information warfare through the writings of various military and civilian figures. Author asserts that one of the easiest ways for the West to begin joint talks on information warfare with Russia is through the medium of a conference among academics or through an unofficial organization or club, such as Russia's International Information Academy.
United States. Department of the Air Force
Thomas, Timothy L.
1996
-
Public Law 104-58: Alaska Power Administration Asset Sale and Termination Act
"An Act to authorize and direct the Secretary of Energy to sell the Alaska Power Administration, and to authorize the export of Alaska North Slope crude oil, and for other purposes."
United States. Government Printing Office
1995-11-28
-
Flexibility in the Safe Drinking Water Act
"The Safe Drinking Water Act and EPA's implementing regulations provide the flexibility for water systems to reduce their costs to comply with the requirements of the drinking water program. EPA's regulations offer a number of options under which the water systems can reduce the frequency of required testing or the costs of laboratory analyses. For example, monitoring requirements for certain contaminants may be waived for a water system if (1) the contaminants were not used, stored, manufactured, or disposed of within a defined area around the water source or (2) the source is not otherwise vulnerable to contamination. Water systems can also avoid or defer the costs of treating water under certain conditions. For example, under the act, water systems can be exempted from meeting a quality standard when the systems cannot afford to install needed equipment or when there are other compelling reasons, as long as the exemption will not result in an unreasonable risk to health."
United States. Government Accountability Office
1995-11-21
-
Presidential Discretion to Delay Making Determinations Under the Chemical and Biological Weapons Control and Warfare Elimination Act of 1991: Memorandum for Alan J. Kreczko, Special Assistant to the President and Legal Adviser to the National Security Council [November 16, 1995]
"You have asked for our opinion concerning the scope, if any, of the President's discretion to delay making the determinations that are prerequisite to imposing mandatory sanctions under the Chemical and Biological Weapons Control and Warfare Elimination Act of 1991, codified in part as an amendment to the Export Administration Act at 50 U.S.C. app. § 2410c (the 'CBW Act'). We conclude that Act permits the President to delay making determinations that would trigger sanctions under this section, when the delay is necessary to protect intelligence sources or methods used for acquiring intelligence relating to CBW proliferation. You have also asked whether the President has any greater ability to delay a determination when the life of an intelligence source would be placed at substantial risk by the imposition of sanctions and no alternative reasonable means exists to exfiltrate or otherwise protect the source. This extreme case creates a conflict with the President's constitutional obligations and various of his statutory duties. In such circumstances, we conclude that the President can delay making a determination to protect the life of the source."
United States. Department of Justice. Office of Legal Counsel
1995-11-16
-
Participation in Congressional Hearings During an Appropriations Lapse: Memorandum for the Attorney General [November 16, 1995]
"The Department of Justice has been informed that various congressional committees intend to hold hearings at which Department of Justice officials have been requested to testify, during the period in which the Department lacks appropriations to pay for the services of those officials. You have asked under what circumstances Department officials may participate in these hearings. […] The Antideficiency Act places a substantial limit on the functioning of federal officers and employees generally, including officers and employees of the Department of Justice. These limits extend to participation in congressional hearings conducted during a period of lapsed appropriations. During such a period, an officer or employee of the Department of Justice may participate in congressional hearings if he or she is a Senate-confirmed officer, if appropriated funds are available for his or her participation, if he or she is subpoenaed, or if the hearing falls within one of the categories set forth above."
United States. Department of Justice. Office of Legal Counsel
1995-11-16
-
Federal Law Enforcement: Information on Certain Agencies' Criminal Investigative Personnel and Salary Costs, Summary of Statement of Norman J. Rabkin, Director, Administration of Justice Issues, Testimony before the Subcommittee on Crime, Committee on the Judiciary, House of Representatives
"The federal criminal justice system typically deals with criminal activity occurring in more than one state or criminal activity affecting matters of paramount federal interest, such as federal taxation, civil rights, international trade, securities, narcotics, national defense, federal grant programs, federal contracting, and federally insured financial institutions. Federal criminal law prosecution authority is vested in the Attorney General and is exercised through the prosecutors of the Department of Justice (DOJ) and the 94 U.S. Attorneys Offices. An early stage in any criminal law enforcement system is the detection and investigation of a possible crime. Agencies that report to the Attorney General and whose investigative efforts support the prosecutors include the Federal Bureau of Investigation (FBI) and the Drug Enforcement Administration (DEA). In addition, many other agencies outside DOJ, such as the Internal Revenue Service (IRS), the Customs Service, and the Bureau of Alcohol, Tobacco and Firearms (ATF) also provide major investigative efforts in the federal criminal law enforcement process."
United States. Government Accountability Office
1995-11-15