Search Results

China: Suspected Acquisition of U.S. Nuclear Weapon Secrets
This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
Balancing Scientific Publication and National Security Concerns: Issues for Congress
There is a lack of consensus regarding the best method of balancing scientific publishing and national security. The current federal policy, as described in National Security Decision Directive 189, is that fundamental research should remain unrestricted and that in the rare case where it is necessary to restrict such information, classification is the appropriate vehicle to do so. Other mechanisms restrict international information flow, where Export Administration Regulations (EAR) and International Traffic in Arms Regulations (ITAR) control export of items and technical information on specific lists. Both EAR and ITAR contain a fundamental research exclusion, but this exclusion is lost if prepublication review of research results for sensitive information occurs.
"Sensitive but Unclassified" Information and Other Controls: Policy and Options for Scientific and Technical Information
This report traces the evolution of "sensitive but unclassified" or SBU-related controls; summarizes actions taken to protect certain types of scientific and technical information; describes critiques of some control policies; and summarizes proposals and actions, including congressional, executive and other initiatives, to clarify these issues and develop policies that serve various stakeholders. It also raises issues that may warrant further attention.
Protection of Classified Information by Congress: Practices and Proposals
No Description Available.
Federal Enterprise Architecture and E-Government: Issues for Information Technology Management
This report discusses government efforts to increase efficiency. One approach being implemented to reduce duplicative spending and improve cross-agency collaboration is the use of enterprise architecture (EA) planning across the federal government. An EA serves as a blueprint of the business operations of an organization, and the information and technology needed to carry out these functions.
Government Access to Phone Calling Activity and Related Records: Legal Authorities
This report summarizes statutory authorities regarding access by the Government, for either foreign intelligence or law enforcement purposes, to information related to telephone calling patterns or practices.
Nuclear Weapons Complex Reconfiguration: Analysis of an Energy Department Task Force Report
No Description Available.
Oversight of Dual-Use Biological Research: The National Science Advisory Board for Biosecurity
This report discusses the risks involved in federally funding "dual-use" biological research, which can apply to the creation of both biological countermeasures and biological weapons, and the establishment of the National Science Advisory Board for Biosecurity (NSABB) to aid in assessing these risk.
The Changing Demographic Profile of the United States
As noted by the Population Reference Bureau, “The U.S. is getting bigger, older, and more diverse.” The objective of this report is to highlight some of the demographic changes that have already occurred since 1950 and to illustrate how these and future trends will reshape the nation in the decades to come (through 2050). This report discusses the current and projected demographic changes if policymakers accelerate efforts to address and adapt to the changing population profile as it relates to a number of essential domains, such as work, retirement, and pensions, private wealth and income security, and the health and well-being of the aging population.
Countries of the World and International Organizations: Sources of Information
This report provides a selection of materials for locating information on foreign countries and international organizations. In the general information section, it presents sources giving an overview of politics, economics, and recent history. A specialized information section cites sources on human rights, immigration, international organizations, military strengths, terrorism, and other topics. Included are titles of some of the most frequently consulted bibliographic sources that are available for use in many libraries. Electronic information on foreign countries is also provided, via the Internet, by agencies of the federal government, international organizations, and related sources. Included is a list of foreign chanceries located in Washington, D.C.
Military Service Records and Unit Histories: A Guide to Locating Sources
This report is a guide to locating individual service records and military unit histories from the American Revolution to the present.
The Congressional Research Service and the American Legislative Process
The Legislative Reference Service, it was charged with responding to congressional requests for information. For more than 50 years, this department assisted Congress primarily by providing facts and publications and by transmitting research and analysis done largely by other government agencies, private organizations, and individual scholars. In 1970, Congress enacted a law transforming the Legislative Reference Service into the Congressional Research Service (CRS) and directing CRS to devote more of its efforts and increased resources to performing research and analysis that assists Congress in direct support of the legislative process.
Critical Infrastructure: The National Asset Database
The purpose of this report is to discuss the National Asset Database: what is in it, how it is populated, what the Database apparently is, what it is not, and how it is intended to be used. The report also discusses some of the issues on which Congress could focus its oversight, including appropriation bill language.
Protection of Security-Related Information
No Description Available.
Department of Veteran Affairs: Information Security and Information Technology Management Reorganization
On May 3, 2006, the home of a Department of Veterans Affairs (VA) data analyst was burglarized, resulting in the theft of a laptop computer and an external data storage device that was reported to contain personal information on more than 26 million veterans and United States military personnel. The VA Secretary testified that he was not informed of the incident until May 16, 2006, almost two weeks after the data had been stolen. VA publicly announced the theft on May 22. On June 29, VA announced that the stolen laptop computer and external hard drive had been recovered intact and that, based on a forensic examination conducted by the Federal Bureau of Investigation (FBI), the files on the external hard drive had not been compromised.
The Federal Funding Accountability and Transparency Act (S. 2590): Overview and Comparison with H.R. 5060
In an attempt to expand oversight of federal spending, including earmarks, S. 2590 would provide the public with access to an online database containing information about entities that are awarded federal grants, loans, and contracts. This report summarizes S. 2590, compares it to H.R. 5060, and outlines the arguments in favor of the bill and those critical of it. The final section discusses the implications of using the Federal Assistance Award Data System (FAADS) and the Federal Procurement Data System (FPDS) to populate the bill’s proposed database.
Iraq: Map Sources
This report identifies selected websites for maps of Iraq, including government, library, and organizational websites. Maps of the Middle East, Iraq, facilities used by U.S. forces in the Gulf, and U.S. government humanitarian assistance and reconstruction activities in Iraq are also provided.
Military Service Records and Unit Histories: A Guide to Locating Sources
This report is a guide to locating individual service records and military unit histories from the American Revolution to the present.
Freedom of Information Act (FOIA) Amendments: 109th Congress
Enacted in 1966, the Freedom of Information Act (FOIA) was designed to enable any person -- individual or corporate, regardless of citizenship -- to request, without explanation or justification, presumptive access to existing, identifiable, unpublished, executive branch agency records on any topic. The statute specified nine categories of information that may be permissibly exempted from the rule of disclosure. Disputes over the accessibility of requested records could be ultimately settled in court. The statute has become a somewhat popular tool of inquiry and information gathering for various quarters of American society. This report details the history of the Act, as well as relevant legislation and incidences and the efforts to amend the Act.
Military Service Records and Unit Histories: A Guide to Locating Sources
This report is a guide to locating individual service records and military unit histories from the American Revolution to the present. This guide provides referral information for locating individual service records of discharged and deceased veterans. It includes information regarding locating and obtaining active service records. Also included are relevant addresses and websites of government agencies, historical associations, and a select bibliography.
Iraq: Map Sources
This report identifies selected websites for maps of Iraq, including government, library, and organizational websites. Maps of the Middle East, Iraq, facilities used by U.S. forces in the Gulf, and U.S. government humanitarian assistance and reconstruction activities in Iraq are also provided.
Protection of Classified Information by Congress: Practices and Proposals
The protection of classified national security and other controlled information is of concern not only to the executive branch - which determines what information is to be safeguarded, for the most part - but also to Congress, which uses the information to fulfill its constitutional responsibilities. It has established mechanisms to safeguard controlled information in its custody, although these arrangements have varied over time between the two chambers and among panels in each. This report explores and analyzes said mechanisms. It also discusses various proposals for standardization of and modifications to current policies.
Federal Rulemaking: The Role of the Office of Information and Regulatory Affairs
This report discusses the Paperwork Reduction Act of 1980, which created the Office of Information and Regulatory Affairs (OIRA) within the Office of Management and Budget (OMB). This report addresses OIRA's responsibilities, controversies related to OIRA, and possible legislative issues involving OIRA, including increasing or decreasing the office's funding and staffing, and improvements in the transparency of OIRA's review process.
"Gang of Four" Congressional Intelligence Notifications
"Gang of Four" intelligence notifications generally are oral briefings of certain particularly sensitive non-covert action intelligence activities, including principally, but not exclusively, intelligence collection programs, that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times, but not always, to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider.
Intelligence Spending: Public Disclosure Issues
This report describes the constituent parts of the intelligence budget, past practice in handling intelligence authorizations and appropriations, the arguments that have been advanced for and against making intelligence spending totals public, a legal analysis of these issues, and a review of the implications of post-Cold War developments on the question. It also describes past congressional interest in keeping intelligence spending totals secret.
Presidential Libraries: The Federal System and Related Legislation
Through the National Archives and Records Administration, the federal government currently manages and maintains 12 presidential libraries. Inaugurated with the Presidential Libraries Act of 1955, these entities are privately constructed on behalf of former Presidents and, upon completion, are deeded to the federal government. This report provides a brief overview of the federal presidential libraries system and tracks the progress of related legislation.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act.
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Access to Government Information in the United States
The U.S. Constitution makes no specific allowance for any one of the three branches of the federal government to have access to information held by the others. No provision in the U.S. Constitution expressly establishes a procedure for public access to government information. Congress has legislated various public access laws. Among these laws are two records access statutes, The Freedom of Information Act, the Privacy Act, and two meetings access statutes, the Federal Advisory Committee Act, and the Government in the Sunshine Act. This report offers an overview of the four information access laws noted above, and provides citations to additional resources related to these tools.
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
The Obama Administration's Open Government Initiative: Issues for Congress
This report reviews the objectives delineated in President Obama's Open Government Initiative (OGI) and examines the expectations placed on agencies to meet these objectives. This report reviews department and agency attempts to implement Obama Administration initiatives that seek to make the federal government more transparent, participatory, and collaborative. The report then analyzes options for congressional action in this area.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of recent legislation relevant to the issue as well as some previous efforts to criminalize the unauthorized disclosure of classified information.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act.
The Freedom of Information Act and Nondisclosure Provisions in Other Federal Laws
This report discusses Congressional considerations regarding how to balance the federal government's growing need for sensitive or confidential business information, the public's right of access to information about government activities, and the private sector's interest in keeping its sensitive or proprietary information protected from public disclosure. The report discusses this issue in light of particularly the Freedom of Information Act (FOIA) and other similar legislation.
The Congressional Research Service and the American Legislative Process
The Legislative Reference Service, it was charged with responding to congressional requests for information. For more than 50 years, this department assisted Congress primarily by providing facts and publications and by transmitting research and analysis done largely by other government agencies, private organizations, and individual scholars. In 1970, Congress enacted a law transforming the Legislative Reference Service into the Congressional Research Service (CRS) and directing CRS to devote more of its efforts and increased resources to performing research and analysis that assists Congress in direct support of the legislative process.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
The federal government has long played a key role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider.
Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative: Background and Issues for Congress
This report describes the NSI, the rationale for the sharing of terrorism-related SARs, and how the NSI seeks to achieve this objective. It examines the privacy and civil liberties concerns raised by the initiative and identifies other oversight issues for Congress.
Federal Depository Library Program: Issues for Congress
A history and overview of current issues regarding the Federal Depository Library Program (FDLP).
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of recent legislation relevant to the issue as well as some previous efforts to criminalize the unauthorized disclosure of classified information.
Protection of Classified Information by Congress: Practices and Proposals
This report discusses safeguards in place to protect conterolled information and proposals for change of some of the mechanisms in place. Congress uses classified national security and other controlled information to fulfill its constitutional responsibilities, particularly overseeing the executive, appropriating funds, and legislating public policy.
Freedom of Information Act (FOIA): Background and Policy Options for the 112th Congress
The Freedom of Information Act (FOIA; 5 U.S.C. §552) enables any person to access—without explanation or justification—certain existing, identifiable, unpublished, executive branch agency records. Pursuant to FOIA, the public has presumptive access to requested agency records unless the material falls within any of FOIA's nine categories of exemption from disclosure. This report discusses FOIA's history, examines its implementation, and provides potential policy approaches for Congress.
Covert Action: Legislative Background and Possible Policy Questions
This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. It also examines the statutory procedures governing covert action and associated questions to consider.
Sensitive Covert Action Notifications: Oversight Options for Congress
Legislation enacted in 1980 gave the executive branch authority to limit advance notification of especially-sensitive covert actions to eight Members of Congress (called the "Gang of Eight") when the President determines that it is essential to limit prior notice in order to meet extraordinary circumstances affecting U.S. vital interests. This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
Publishing Scientific Papers with Potential Security Risks: Issues for Congress
This report discusses the publication of federally-funded research results including positive aspects (wide dissemination that may drive innovation, job creation, technology development, and the advance of science), and the negatives (that some research results could also be used for malicious purposes). This report describes the underlying controversy, the potential benefits and harms of publishing these manuscripts, the actions taken by domestic and international stakeholders, and options to improve the way research is handled to minimize security concerns.
The Changing Demographic Profile of the United States
This report discusses the demographic profile of the United States and highlights demographic changes that have occurred since 1950 to illustrate how trends may affect the demographics of the U.S. through 2050.
Military Service Records and Unit Histories: A Guide to Locating Sources
This guide provides information on locating military unit histories and individual service records of discharged, retired, and deceased military personnel. It includes contact information for military history centers, websites for additional sources of research, and a bibliography of other publications.
Back to Top of Screen