You limited your search to:

 Collection: Congressional Research Service Reports
Congressional Liaison Offices of Selected Federal Agencies
This report provides a list of roughly 200 congressional liaison offices with phone numbers, addresses, and other contact information. digital.library.unt.edu/ark:/67531/metadc462196/
Congressional Liaison Offices of Selected Federal Agencies
This report provides a list of roughly 200 congressional liaison offices with phone numbers, addresses, and other contact information. digital.library.unt.edu/ark:/67531/metadc501725/
Congressional Liaison Offices of Selected Federal Agencies
This list of about 200 congressional liaison offices is intended to help congressional offices in placing telephone calls and addressing correspondence to government agencies. Entries are arranged alphabetically in four sections: legislative branch; judicial branch; executive branch; and agencies, boards, and commissions. digital.library.unt.edu/ark:/67531/metadc503522/
Congressional Liaison Offices of Selected Federal Agencies
Report that offer a list of 200 congressional liaison offices. digital.library.unt.edu/ark:/67531/metadc227623/
Congress as a Consumer of Intelligence Information
This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address in the 111th Congress. digital.library.unt.edu/ark:/67531/metadc462929/
Congress as a Consumer of Intelligence Information
This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address during the second session of the 111th Congress. digital.library.unt.edu/ark:/67531/metadc462949/
Covert Action: Legislative Background and Possible Policy Questions
This report examines the statutory procedures governing covert action and associated questions to consider. digital.library.unt.edu/ark:/67531/metadc463117/
Covert Action: Legislative Background and Possible Policy Questions
This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. It also examines the statutory procedures governing covert action and associated questions to consider. digital.library.unt.edu/ark:/67531/metadc98079/
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider. digital.library.unt.edu/ark:/67531/metadc26250/
"Gang of Four" Congressional Intelligence Notifications
This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. digital.library.unt.edu/ark:/67531/metadc463326/
"Gang of Four" Congressional Intelligence Notifications
This report reviews the history of the Gang of Four intelligence notification process and compares this procedure with that of the "Gang of Eight" notification procedure. digital.library.unt.edu/ark:/67531/metadc505518/
"Gang of Four" Congressional Intelligence Notifications
"Gang of Four" intelligence notifications generally are oral briefings of certain particularly sensitive non-covert action intelligence activities, including principally, but not exclusively, intelligence collection programs, that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times, but not always, to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. digital.library.unt.edu/ark:/67531/metadc26184/
“Gang of Four” Congressional Intelligence Notifications
"Gang of Four" intelligence notifications are oral briefings on sensitive non-covert action intelligence activities (including intelligence collection programs) that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. digital.library.unt.edu/ark:/67531/metadc99008/
"Gang of Four" Congressional Intelligence Notifications
This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. digital.library.unt.edu/ark:/67531/metadc689418/
Sensitive Covert Action Notifications: Oversight Options for Congress
This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight. digital.library.unt.edu/ark:/67531/metadc505440/
Sensitive Covert Action Notifications: Oversight Options for Congress
This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight. digital.library.unt.edu/ark:/67531/metadc689246/
Sensitive Covert Action Notifications: Oversight Options for Congress
This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight. digital.library.unt.edu/ark:/67531/metadc689273/
Sensitive Covert Action Notifications: Oversight Options for Congress
Legislation enacted in 1980 gave the executive branch authority to limit advance notification of especially-sensitive covert actions to eight Members of Congress (called the "Gang of Eight") when the President determines that it is essential to limit prior notice in order to meet extraordinary circumstances affecting U.S. vital interests. This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight. digital.library.unt.edu/ark:/67531/metadc97976/
Conference Reports and Joint Explanatory Statements
This report discusses the function of conference reports and joint explanatory statements in Congress. The conference report presents the formal legislative language on which the conference committee has agreed. The joint explanatory statement explains the various elements of the conferees' agreement in relation to the positions that the House and Senate had committed to the conference committee. digital.library.unt.edu/ark:/67531/metadc689175/
Military Service Records and Unit Histories: A Guide to Locating Sources
This guide provides information on locating military unit histories and individual service records of discharged, retired, and deceased military personnel. It includes contact information for military history centers, websites for additional sources of research, and a bibliography of other publications. digital.library.unt.edu/ark:/67531/metadc503560/
U.S. Merchandise Trade Data: 1948-2002
No Description digital.library.unt.edu/ark:/67531/metacrs3511/
U.S. Merchandise Trade Data: 1948-2002
No Description digital.library.unt.edu/ark:/67531/metacrs5546/
U.S. Merchandise Trade Statistics: 1948-2000
No Description digital.library.unt.edu/ark:/67531/metacrs1993/
U.S. Merchandise Trade Statistics: 1948-2001
No Description digital.library.unt.edu/ark:/67531/metacrs3512/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization Wikileaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. digital.library.unt.edu/ark:/67531/metadc491198/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act. digital.library.unt.edu/ark:/67531/metadc31369/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of recent legislation relevant to the issue as well as some previous efforts to criminalize the unauthorized disclosure of classified information. digital.library.unt.edu/ark:/67531/metadc31474/
Criminal Prohibitions on the Publication of Classified Defense Information
This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of previous legislative efforts to criminalize the unauthorized disclosure of classified information. digital.library.unt.edu/ark:/67531/metadc227681/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of recent legislation relevant to the issue as well as some previous efforts to criminalize the unauthorized disclosure of classified information. digital.library.unt.edu/ark:/67531/metadc93844/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act. digital.library.unt.edu/ark:/67531/metadc93843/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act. digital.library.unt.edu/ark:/67531/metadc29606/
Intelligence Identities Protection Act
This report summarizes the Intelligence Identities Protection Act, P.L. 97-200, enacted by Congress in 1982 to address the unauthorized disclosure of information that exposes covert U.S. intelligence agents. The act also provides exceptions and defenses to prosecution, makes provision for extraterritorial application for offenders who are U.S. citizens or permanent resident aliens, includes reporting requirements to Congress, and sets forth definitions of the terms used in the act. digital.library.unt.edu/ark:/67531/metadc462136/
Intelligence Identities Protection Act
This report summarizes the Intelligence Identities Protection Act, P.L. 97-200, enacted by Congress in 1982 to address the unauthorized disclosure of information that exposes covert U.S. intelligence agents. digital.library.unt.edu/ark:/67531/metadc103236/
The Protection of Classified Information: The Legal Framework
This report provides an overview of the relationship between executive and legislative authority over national security information, and summarizes the current laws that form the legal framework protecting classified information, including current executive orders and some agency regulations pertaining to the handling of unauthorized disclosures of classified information by government officers and employees. The report also summarizes criminal laws that pertain specifically to the unauthorized disclosure of classified information, as well as civil and administrative penalties. Finally, the report describes some recent developments in executive branch security policies and legislation currently before Congress (S. 3454). digital.library.unt.edu/ark:/67531/metadc491562/
The Protection of Classified Information: The Legal Framework
This report provides an overview of the relationship between executive and legislative authority over national security information, and summarizes the current laws that form the legal framework protecting classified information, including current executive orders and some agency regulations pertaining to the handling of unauthorized disclosures of classified information by government officers and employees. The report also summarizes criminal laws that pertain specifically to the unauthorized disclosure of classified information, as well as civil and administrative penalties. Finally, the report describes some recent developments in executive branch security policies and relevant legislative activity. digital.library.unt.edu/ark:/67531/metadc462798/
The Protection of Classified Information: The Legal Framework
This report provides an overview of the relationship between executive and legislative authority over national security information, and summarizes the current laws that form the legal framework protecting classified information, including current executive orders and some agency regulations pertaining to the handling of unauthorized disclosures of classified information by government officers and employees. The report also summarizes criminal laws that pertain specifically to the unauthorized disclosure of classified information. digital.library.unt.edu/ark:/67531/metadc122339/
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counterterrorism intelligence activities as part of what the Bush Administration termed the global war on terror. Some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congressional intelligence committees. This report examines the legislative background surrounding covert action and poses several related policy questions. digital.library.unt.edu/ark:/67531/metadc461909/
"Gang of Four" Congressional Intelligence Notifications
This report reviews the history of the Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. The "Gang of Eight" procedure is statutorily based and provides that the chairmen and ranking Members of the intelligence committee, along with the Speaker and minority leader of the House, and Senate majority and minority leaders--rather than the full membership of the intelligence committees-- are to receive prior notice of particularly sensitive covert action programs, if the President determines that limited access to such programs is essential to meet extraordinary circumstances affecting vital U.S. interests. digital.library.unt.edu/ark:/67531/metadc463194/
Sensitive Covert Action Notifications: Oversight Options for Congress
This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight. digital.library.unt.edu/ark:/67531/metadc463114/
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study. digital.library.unt.edu/ark:/67531/metadc272106/
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study. digital.library.unt.edu/ark:/67531/metadc462945/
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study. digital.library.unt.edu/ark:/67531/metadc505596/
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study. digital.library.unt.edu/ark:/67531/metadc228043/
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
The federal government has long played a key role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study. digital.library.unt.edu/ark:/67531/metadc84061/
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers that would be capable of addressing the problems and issues the government needed to solve and study. digital.library.unt.edu/ark:/67531/metadc490939/
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study. digital.library.unt.edu/ark:/67531/metadc505509/
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study. digital.library.unt.edu/ark:/67531/metadc700804/
Cybersecurity: FISMA Reform
This report briefly discusses current requirements under the Federal Information Security Management Act (FISMA) and two bills currently being considered by Congress that would revise the conditions and authority granted by FISMA. digital.library.unt.edu/ark:/67531/metadc491497/
Public Access to Data from Federally Funded Research: Provisions in OMB Circular A-110
The results of scientific studies are used in making many governmental policy decisions. While the studies are often published, the data on which they are based may not be, even for federally funded research. Before 1999, academic and nonprofit performers of such research were permitted but not required to make their data available to the public through provisions of the Freedom of Information Act (FOIA). In October 1998, a provision in P.L. 105-277 changed that, requiring that such data be made publicly available. This report provides background on the 1999 revisions to federal policy, a discussion of the impacts of those changes, and an analysis of the issues raised by them. digital.library.unt.edu/ark:/67531/metadc463492/
Iraq: Map Sources
This report identifies online sources for maps of Iraq, including government, library, and organizational websites. digital.library.unt.edu/ark:/67531/metadc491623/