A compilation of online documents and databases related to cybersecurity is presented by the Congressional Research Service in Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources, November 14, 2017.
Other new and updated publications from CRS include the following.
A Primer on U.S. Immigration Policy, November 14, 2017
Defense Primer: Department of Defense Maintenance Depots, CRS In Focus, November 7, 2017
Potential Effects of a U.S. NAFTA Withdrawal: Agricultural Markets, November 13, 2017
State Exports to NAFTA Countries for 2016, CRS memorandum, n.d., October 24, 2017
Membership of the 115th Congress: A Profile, updated November 13, 2017
Drought in the United States: Causes and Current Understanding, updated November 9, 2017
Impact of the Budget Control Act Discretionary Spending Caps on a Continuing Resolution, CRS Insight, November 14, 2017
Saudi Arabia: Background and U.S. Relations, updated November 14, 2017
Jordan: Background and U.S. Relations, updated November 14, 2017
The Latest Chapter in Insider Trading Law: Major Circuit Decision Expands Scope of Liability for Trading on a “Tip”, CRS Legal Sidebar, November 14, 2017
In Any Way, Shape, or Form? What Qualifies As “Any Court” under the Gun Control Act?, CRS Legal Sidebar, November 14, 2017
Generalized System of Preferences: Overview and Issues for Congress, updated November 14, 2017
Trade Promotion Authority (TPA): Frequently Asked Questions, updated November 14, 2017
The Article V Convention to Propose Constitutional Amendments: Current Developments, November 15, 2017
This DOE Office has been achieving DOGE’s stated mission of billion dollar savings for decades. Now government leaders may close its doors.
Direct File redefined what IRS service could look like, with real-time help and data-driven improvements. Let’s apply that bar elsewhere.
At this inflection point, the choice is not between speed and safety but between ungoverned acceleration and a calculated momentum that allows our strategic AI advantage to be both sustained and secured.
Improved detection could strengthen deterrence, but only if accompanying hazards—automation bias, model hallucinations, exploitable software vulnerabilities, and the risk of eroding assured second‑strike capability—are well managed.