Phi Beta Iota: High school version of the concept, neglects fact that the US Government does not do holistic analytics or true cost economics, loves regime change as a pay to play profit center for the banks, and lies to the public every single day while the Chinese whip our ass world-wide using peace, commerce, and friendship, the Ron Paul playbook.
The report addresses the use of executive orders, record preservation and clemency actions by the outgoing Administration, as well as cybersecurity, budget preparation, political appointments, and so forth. Essential reference.
In fact, the security clearance system itself is an expression of presidential authority. Its scope and operation are defined in an executive order (EO 12968), and its terms can be modified by the President at will. And if the President wished to grant access to classified information to a family member, for example, there would be no legal barrier to doing so.
Many wars or conflicts in U.S. history have federally designated “periods of war,” dates marking their beginning and ending. These dates are important for qualification for certain veterans’ pension or disability benefits. Confusion can occur because beginning and ending dates for “periods of war” in many nonofficial sources are often different from those given in treaties and other official sources of information, and armistice dates can be confused with termination dates. This report lists the beginning and ending dates for “periods of war” found in Title 38 of the Code of Federal Regulations, dealing with the Department of Veterans Affairs (VA). It also lists and differentiates other beginning dates given in declarations of war, as well as termination of hostilities dates and armistice and ending dates given in proclamations, laws, or treaties. The dates for the recent conflicts in Afghanistan and Iraq are included along with the official end date for Operation New Dawn in Iraq on December 15, 2011, and Operation Enduring Freedom on Afghanistan on December 28, 2014. This report will be updated when events warrant. For additional information, see the following: CRS Report RL31133, Declarations of War and Authorizations for the Use of Military Force: Historical Background and Legal Implications, by Jennifer K. Elsea and Matthew C. Weed, and CRS Report R42738, Instances of Use of United States Armed Forces Abroad, 1798 – 2015, by Barbara Salazar Torreon.
The amount of money sent by migrants in the U.S. to their home countries exceeded $432 billion in 2015, which is larger than official development assistance and more stable than private capital flows to these countries. See Remittances: Background and Issues for Congress, updated May 9, 2016.
There is widespread dissatisfaction with the organization and performance of the Department of Defense, a new Congressional Research Service report says, but no consensus on what to do about it. Driving the current debate, CRS says, are questions such as:
What are the constitutional limits on police use of force? What remedies are available when those limits are exceeded? And in light of recent episodes of police violence, how might the limits and the remedies be modified? Those questions are addressed in a new report from the Congressional Research Service.
Some 60 nations and partner organizations have made commitments to help counter the Islamic State with military forces or resources, according to a new report from the Congressional Research Service. But coalition efforts suffer from a lack of coherence, CRS said. “Without a single authority responsible for prioritizing and adjudicating between different multinational civilian and military lines of effort, different actors often work at cross-purposes without intending to do so.”
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics:
• policy overview
• National Strategy for Trusted Identities in Cyberspace (NSTIC)
• cloud computing and FedRAMP
• critical infrastructure
• cybercrime, data breaches, and data security
• national security, cyber espionage, and cyberwar (including Stuxnet)
• international efforts
• research and development (R&D)
In addition, the report lists selected cybersecurity-related websites for congressional and
government agencies, news, international organizations, and organizations or institutions.