You limited your search to:

 Decade: 2000-2009
 Year: 2009
 Collection: Congressional Research Service Reports
Sensitive Covert Action Notifications: Oversight Options for Congress

Sensitive Covert Action Notifications: Oversight Options for Congress

Date: July 7, 2009
Creator: Cumming, Alfred
Description: With Congress considering a possible change regarding sensitive covert action policy, this memorandum describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examine both the impact of such notifications on congressional oversight as well as options that Congress might consider to possibly improve oversight.
Contributing Partner: UNT Libraries Government Documents Department
Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches

Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches

Date: January 14, 2009
Creator: Randol, Mark A.
Description: This report provides a potential conceptual model of how to frame homeland security intelligence (HSINT), including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). Although the HSIC's members are diffused across the nation, they share a common counterterrorism interest. The proliferation of intelligence and information fusion centers across the country indicate that state and local leaders believe there is value to centralizing intelligence gathering and analysis in a manner that assists them in preventing and responding to local manifestations of terrorist threats to their people, infrastructure, and other assets. At the policy and operational levels, the communication and integration of federal HSINT efforts with these state and local fusion centers will likely remain an important priority and future challenge.
Contributing Partner: UNT Libraries Government Documents Department
Security Classification Policy and Procedure: E.O. 12958, as Amended

Security Classification Policy and Procedure: E.O. 12958, as Amended

Date: June 4, 2009
Creator: Kosar, Kevin R.
Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Contributing Partner: UNT Libraries Government Documents Department
"Gang of Four" Congressional Intelligence Notifications

"Gang of Four" Congressional Intelligence Notifications

Date: July 14, 2009
Creator: Cumming, Alfred
Description: "Gang of Four" intelligence notifications generally are oral briefings of certain particularly sensitive non-covert action intelligence activities, including principally, but not exclusively, intelligence collection programs, that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times, but not always, to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Contributing Partner: UNT Libraries Government Documents Department
Security Classification Policy and Procedure: E.O. 12958, as Amended

Security Classification Policy and Procedure: E.O. 12958, as Amended

Date: December 31, 2009
Creator: Kosar, Kevin R.
Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Contributing Partner: UNT Libraries Government Documents Department
Intelligence Issues for Congress

Intelligence Issues for Congress

Date: April 20, 2009
Creator: Best, Jr., Richard A.
Description: This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters.
Contributing Partner: UNT Libraries Government Documents Department
Intelligence Issues for Congress

Intelligence Issues for Congress

Date: July 6, 2009
Creator: Best, Jr., Richard A.
Description: This report discusses the efforts currently underway to improve coordination and encourage better analysis amongst the various agencies within the U.S. Intelligence Community, especially with regard to the ongoing and prominent issue of international terrorism. In particular, this report addresses the false intelligence regarding Iraqi weapons of mass destruction and the current efforts in Iraq and Iran in general.
Contributing Partner: UNT Libraries Government Documents Department
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: October 29, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: March 16, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: January 6, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 NEXT LAST