You limited your search to:

 Resource Type: Report
 Collection: Congressional Research Service Reports
Intelligence Estimates: How Useful to Congress?

Intelligence Estimates: How Useful to Congress?

Date: November 24, 2010
Creator: Best, Jr., Richard A.
Description: National Intelligence Estimates (NIEs) are often of considerable interest to many Members of Congress. NIEs address issues of major national security importance which may require congressional action. However, NIEs have occasionally proved unreliable because they were based on insufficient evidence or contained faulty analysis. This report explores this issue and discusses the NIE process and its relevance to congressional policymaking.
Contributing Partner: UNT Libraries Government Documents Department
Sensitive Covert Action Notifications: Oversight Options for Congress

Sensitive Covert Action Notifications: Oversight Options for Congress

Date: July 7, 2009
Creator: Cumming, Alfred
Description: With Congress considering a possible change regarding sensitive covert action policy, this memorandum describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examine both the impact of such notifications on congressional oversight as well as options that Congress might consider to possibly improve oversight.
Contributing Partner: UNT Libraries Government Documents Department
The National Intelligence Council (NIC): Issues and Options for Congress

The National Intelligence Council (NIC): Issues and Options for Congress

Date: December 27, 2011
Creator: Best, Richard A., Jr.
Description: It is the purpose of this report to describe the statutory provisions that authorize the NIC, provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight.
Contributing Partner: UNT Libraries Government Documents Department
The Intelligence Appropriations Process: Issues for Congress

The Intelligence Appropriations Process: Issues for Congress

Date: November 9, 2011
Creator: Best, Richard A., Jr.
Description: The intelligence appropriations process remains complicated and not well understood, but intelligence is an important and sizable part of the federal budget and will undoubtedly be addressed as Congress considers various alternatives for spending. This report reviews the intelligence appropriations process, describes various changes that have been proposed, and analyzes the issues associated with the proposals.
Contributing Partner: UNT Libraries Government Documents Department
Sensitive Covert Action Notifications: Oversight Options for Congress

Sensitive Covert Action Notifications: Oversight Options for Congress

Date: April 6, 2011
Creator: Cumming, Alfred
Description: Legislation enacted in 1980 gave the executive branch authority to limit advance notification of especially-sensitive covert actions to eight Members of Congress (called the "Gang of Eight") when the President determines that it is essential to limit prior notice in order to meet extraordinary circumstances affecting U.S. vital interests. This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
Contributing Partner: UNT Libraries Government Documents Department
Airborne Intelligence, Surveillance and Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs

Airborne Intelligence, Surveillance and Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs

Date: December 1, 2000
Creator: Best Jr., Richard A
Description: Among airborne intelligence, surveillance, and reconaissance (ISR) platforms, the U-2 Dragon Lady and the RQ-4A Global Hawk are especially valuable. This report discusses how best to use existing and planned manned and unmanned ISR aircraft to most effectively satisfy the Department of Defense's (Dod) requirements for timely and accurate information on enemy forces.
Contributing Partner: UNT Libraries Government Documents Department
National Security Letters: Proposals in the 112th Congress

National Security Letters: Proposals in the 112th Congress

Date: February 1, 2011
Creator: Doyle, Charles
Description: This report reprints the text of the five National Security Letter (NSL) statutes as they now appear and as they appeared prior to amendment by the USA PATRIOT Act.
Contributing Partner: UNT Libraries Government Documents Department
National Security Letters: Proposals in the 112th Congress

National Security Letters: Proposals in the 112th Congress

Date: June 30, 2011
Creator: Doyle, Charles
Description: This report reprints the text of the five National Security Letter (NSL) statutes as they now appear and as they appeared prior to amendment by the USA PATRIOT Act (to which form they would be returned under S.1125 and H.R. 1805). NSLs are roughly comparable to administrative subpoenas. Various intelligence agencies use them to demand certain customer information from communications providers, financial institutions, and consumer credit reporting agencies under the Right to Financial Privacy Act, the Fair Credit Reporting Act, the National Security Act, and the Electronic Communications Privacy Act.
Contributing Partner: UNT Libraries Government Documents Department
Intelligence Issues for Congress

Intelligence Issues for Congress

Date: April 10, 2006
Creator: Best Jr., Richard A
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Domestic Intelligence in the United Kingdom: Applicability of the MI-5 Model to the United States

Domestic Intelligence in the United Kingdom: Applicability of the MI-5 Model to the United States

Date: May 19, 2003
Creator: Masse, Todd M
Description: This paper summarizes pending legislation relating to domestic intelligence, briefly explains the jurisdiction and functions of MI-5, and describes some of the factors that may be relevant to a discussion regarding the applicability of the MI-5 domestic intelligence model to the United States.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 3 4 5 NEXT LAST