The U.S. military must follow the law of war, which sets out rules—such as prohibiting torture and unnecessary destruction—for armed conflicts. The Department of Defense (DOD) has procedures for complying…
Learn MoreWith the expanding use of artificial intelligence (AI), Congress and the executive branch may explore whether agency roles and responsibilities relating to privacy have kept pace with emerging technologies and…
Learn MoreThe Government Accountability Office was asked to examine how the Department of Homeland Security (DHS) established and made changes to National Priority Areas. This report examines the extent to which…
Learn MoreCongress has authorized a range of grant programs that support state, local, and tribal law enforcement. This report provides information on selected Department of Justice grants administered by the Office…
Learn MoreSection 230 of the Communications Act, enacted as part of the Communications Decency Act, provides limited federal immunity to providers and users of interactive computer services. The statute generally precludes…
Learn MoreThe Department of Defense (DOD) frequently turns to private contractors to provide it with the goods and services that DOD needs to carry out its mission. Federal contracting regulations require…
Learn MoreThe intense partisan polarization and hatred in the U.S., alongside the growing willingness of many politicians and voters to support authoritarian practices, have generated deep concern about democracy in the…
Learn MoreSpecial operations encompass the use of small units in direct or indirect military actions focused on strategic or operational objectives. These actions require units with combinations of specialized personnel, equipment,…
Learn MoreOne of the top priorities of any presidential administration is to protect the country from foreign and domestic threats. While a challenge at all times, the country is especially vulnerable…
Learn MoreAs the federal government adapts to rapidly changing technology and online behaviors by individuals using social media, it is imperative that it update policies and procedures associated with personnel vetting.…
Learn MoreWhile the origins of the Small Business Administration’s (SBA) Small Disadvantaged Business (SDB) contracting program and its prime contracting goals date to 1958, the history of the program is one…
Learn MoreIn today’s dynamic digital landscape, organizations face constant cyber threats with the potential to severely disrupt operations and compromise sensitive data. Whether agencies take a proactive or reactive approach to…
Learn MoreThis report examines the various expedited parliamentary procedures available to Congress under the War Powers Resolution (WPR). To provide an understanding of the deadlines for congressional action associated with these…
Learn MorePublic charters are schools that operate within the bounds of a contract (or charter) with a state or local government. Because public charters operate through this separate agreement rather than…
Learn MoreThe main goal of copyright law is to spur the growth and spread of knowledge by encouraging authors to create new works. Copyright protections are critical to many areas of…
Learn More