Search Results

Prevalence of Mental Illness in the United States: Data Sources and Information
This report briefly describes the methodology and results of three large surveys that provide national prevalence estimates of diagnosable mental illness: the National Comorbidity Survey Replication (NCS-R), the National Comorbidity Survey Replication Adolescent Supplement (NCS-A), and the National Survey on Drug Use and Health (NSDUH). This report presents prevalence estimates of any mental illness and serious mental illness based on each survey and ends with a brief discussion of how these prevalence estimates might inform policy discussions.
Government Access to Phone Calling Activity and Related Records: Legal Authorities
This report summarizes legal authorities regarding access by the government, for either foreign intelligence or law enforcement purposes, to information related to telephone calling patterns or practices. Where pertinent, it also discusses statutory prohibitions against accessing or disclosing such information, along with relevant exceptions to those prohibitions.
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider.
Director of National Intelligence Statutory Authorities: Status and Proposals
This report discusses the Director of National Intelligence (DNI) position created by the Intelligence Reform and Terrorism Prevention Act of 2004 (P.L. 108-458). It includes an overview of the authorities granted to the DNI by legislation in 2004 and later as well as the varying opinions of Congress regarding new DNI authorities, as well as related legislation from FY2010 through FY2012.
Director of National Intelligence Statutory Authorities: Status and Proposals
This report discusses the Director of National Intelligence (DNI) position created by the Intelligence Reform and Terrorism Prevention Act of 2004 (P.L. 108-458). It includes an overview of the authorities granted to the DNI by legislation in 2004 and later as well as the varying opinions of Congress regarding new DNI authorities, as well as related legislation from FY2010 through FY2012.
Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative: Background and Issues for Congress
This report describes the NSI, the rationale for the sharing of terrorism-related SARs, and how the NSI seeks to achieve this objective. It examines the privacy and civil liberties concerns raised by the initiative and identifies other oversight issues for Congress.
The Congressional Research Service and the American Legislative Process
The Legislative Reference Service, it was charged with responding to congressional requests for information. For more than 50 years, this department assisted Congress primarily by providing facts and publications and by transmitting research and analysis done largely by other government agencies, private organizations, and individual scholars. In 1970, Congress enacted a law transforming the Legislative Reference Service into the Congressional Research Service (CRS) and directing CRS to devote more of its efforts and increased resources to performing research and analysis that assists Congress in direct support of the legislative process.
Congressional Liaison Offices of Selected Federal Agencies
This report provides a list of roughly 200 congressional liaison offices, and is intended to help congressional offices in placing telephone calls and addressing correspondence to government agencies.
Congressional Liaison Offices of Selected Federal Agencies
Report that offer a list of 200 congressional liaison offices.
Congressional Liaison Offices of Selected Federal Agencies
This report provides a list of roughly 200 congressional liaison offices with phone numbers, addresses, and other contact information.
Congressional Liaison Offices of Selected Federal Agencies
This list of about 200 congressional liaison offices is intended to help congressional offices in placing telephone calls and addressing correspondence to government agencies. Entries are arranged alphabetically in four sections: legislative branch; judicial branch; executive branch; and agencies, boards, and commissions.
Congressional Liaison Offices of Selected Federal Agencies
This report provides a list of roughly 200 congressional liaison offices with phone numbers, addresses, and other contact information.
Congressional Liaison Offices of Selected Federal Agencies
This report provides a list of roughly 200 congressional liaison offices with phone numbers, addresses, and other contact information.
Congressional Liaison Offices of Selected Federal Agencies
This report provides a list of roughly 200 congressional liaison offices with phone numbers, addresses, and other contact information.
Congressional Liaison Offices of Selected Federal Agencies
This report provides a list of roughly 200 congressional liaison offices with phone numbers, addresses, and other contact information.
Congressional Liaison Offices of Selected Federal Agencies
This report provides a list of roughly 200 congressional liaison offices with phone numbers, addresses, and other contact information.
Congressional Liaison Offices of Selected Federal Agencies
This report lists about 200 congressional liaison offices and is intended to help congressional offices in placing telephone calls and addressing correspondence to government agencies. The information was supplied by the appropriate agency and is current as of the date of publication. Entries are arranged alphabetically in four sections: legislative branch; judicial branch; executive branch; and agencies, boards, and commissions.
Congress as a Consumer of Intelligence Information
This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address during the second session of the 111th Congress.
Covert Action: Legislative Background and Possible Policy Questions
This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. It also examines the statutory procedures governing covert action and associated questions to consider.
“Gang of Four” Congressional Intelligence Notifications
"Gang of Four" intelligence notifications are oral briefings on sensitive non-covert action intelligence activities (including intelligence collection programs) that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
"Gang of Four" Congressional Intelligence Notifications
This report reviews the history of the Gang of Four intelligence notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Sensitive Covert Action Notifications: Oversight Options for Congress
This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
Sensitive Covert Action Notifications: Oversight Options for Congress
Legislation enacted in 1980 gave the executive branch authority to limit advance notification of especially-sensitive covert actions to eight Members of Congress (called the "Gang of Eight") when the President determines that it is essential to limit prior notice in order to meet extraordinary circumstances affecting U.S. vital interests. This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
Conference Reports and Joint Explanatory Statements
This report discusses the function of conference reports and joint explanatory statements in Congress. The conference report presents the formal legislative language on which the conference committee has agreed. The joint explanatory statement explains the various elements of the conferees' agreement in relation to the positions that the House and Senate had committed to the conference committee.
Military Service Records and Unit Histories: A Guide to Locating Sources
This guide provides information on locating military unit histories and individual service records of discharged, retired, and deceased military personnel. It includes contact information for military history centers, websites for additional sources of research, and a bibliography of other publications.
Intelligence Community Whistleblower Protections: In Brief
This report describes various sources of Intelligence Community (IC) whistleblower protections. Generally speaking, whistleblowers are those who expose misconduct (e.g., fraud, abuse, or illegal activity) within an organization. In the context of the IC, whistleblowers are generally employees or contractors of federal intelligence agencies who bring to light information on agency wrongdoings.
Criminal Prohibitions on the Publication of Classified Defense Information
This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of previous legislative efforts to criminalize the unauthorized disclosure of classified information.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of recent legislation relevant to the issue as well as some previous efforts to criminalize the unauthorized disclosure of classified information.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of recent legislation relevant to the issue as well as some previous efforts to criminalize the unauthorized disclosure of classified information.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization Wikileaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals.
Intelligence Identities Protection Act
This report summarizes the Intelligence Identities Protection Act, P.L. 97-200, enacted by Congress in 1982 to address the unauthorized disclosure of information that exposes covert U.S. intelligence agents. The act also provides exceptions and defenses to prosecution, makes provision for extraterritorial application for offenders who are U.S. citizens or permanent resident aliens, includes reporting requirements to Congress, and sets forth definitions of the terms used in the act.
Intelligence Identities Protection Act
This report summarizes the Intelligence Identities Protection Act, P.L. 97-200, enacted by Congress in 1982 to address the unauthorized disclosure of information that exposes covert U.S. intelligence agents.
The Protection of Classified Information: The Legal Framework
This report provides an overview of the relationship between executive and legislative authority over national security information, and summarizes the current laws that form the legal framework protecting classified information, including current executive orders and some agency regulations pertaining to the handling of unauthorized disclosures of classified information by government officers and employees. The report also summarizes criminal laws that pertain specifically to the unauthorized disclosure of classified information, as well as civil and administrative penalties. Finally, the report describes some recent developments in executive branch security policies and relevant legislative activity.
The Protection of Classified Information: The Legal Framework
This report provides an overview of the relationship between executive and legislative authority over national security information, and summarizes the current laws that form the legal framework protecting classified information -- including current executive orders and some agency regulations pertaining to the handling of unauthorized disclosures of classified information by government officers and employees. The report also summarizes criminal laws that pertain specifically to the unauthorized disclosure of classified information, as well as civil and administrative penalties, and some recent developments.
The Protection of Classified Information: The Legal Framework
This report provides an overview of the relationship between executive and legislative authority over national security information, and summarizes the current laws that form the legal framework protecting classified information, including current executive orders and some agency regulations pertaining to the handling of unauthorized disclosures of classified information by government officers and employees. The report also summarizes criminal laws that pertain specifically to the unauthorized disclosure of classified information.
The Protection of Classified Information: The Legal Framework
This report provides an overview of the relationship between executive and legislative authority over national security information, and summarizes the current laws that form the legal framework protecting classified information, including current executive orders and some agency regulations pertaining to the handling of unauthorized disclosures of classified information by government officers and employees. The report also summarizes criminal laws that pertain specifically to the unauthorized disclosure of classified information, as well as civil and administrative penalties. Finally, the report describes some recent developments in executive branch security policies and legislation currently before Congress (S. 3454).
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counterterrorism intelligence activities as part of what the Bush Administration termed the global war on terror. Some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congressional intelligence committees. This report examines the legislative background surrounding covert action and poses several related policy questions.
"Gang of Four" Congressional Intelligence Notifications
This report reviews the history of the Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. The "Gang of Eight" procedure is statutorily based and provides that the chairmen and ranking Members of the intelligence committee, along with the Speaker and minority leader of the House, and Senate majority and minority leaders--rather than the full membership of the intelligence committees-- are to receive prior notice of particularly sensitive covert action programs, if the President determines that limited access to such programs is essential to meet extraordinary circumstances affecting vital U.S. interests.
Sensitive Covert Action Notifications: Oversight Options for Congress
This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
The federal government has long played a key role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers that would be capable of addressing the problems and issues the government needed to solve and study.
Cybersecurity: FISMA Reform
This report briefly discusses current requirements under the Federal Information Security Management Act (FISMA) and two bills currently being considered by Congress that would revise the conditions and authority granted by FISMA.
Back to Top of Screen