Search Results

The Federal Funding Accountability and Transparency Act: Implementation and Proposed Amendments
This report initially discusses the background of the Federal Funding Accountability and Transparency Act (FFATA). It then discusses the act's provisions, noting what types of assistance are part of the new website, the primary sources of the data, and deadlines for implementation. The report then identifies and discusses issues that have been raised regarding the act that might affect its implementation. Finally, it examines legislation proposed in the 110th Congress that would significantly expand the information accessible through USAspending.gov.
The Federal Funding Accountability and Transparency Act (S. 2590): Overview and Comparison with H.R. 5060
In an attempt to expand oversight of federal spending, including earmarks, S. 2590 would provide the public with access to an online database containing information about entities that are awarded federal grants, loans, and contracts. This report summarizes S. 2590, compares it to H.R. 5060, and outlines the arguments in favor of the bill and those critical of it. The final section discusses the implications of using the Federal Assistance Award Data System (FAADS) and the Federal Procurement Data System (FPDS) to populate the bill’s proposed database.
Where to Get Publications from The Executive and Independent Agencies: A Directory of Sources for Official Documents
This is a directory of sources that congressional offices may use to obtain publications from the Executive Office of the President, the executive departments, and the independent agencies and commissions of the federal government. Also included is information on the Superintendent of Documents, the U.S. Government Printing Office, and the federal government’s printing policies; suggestions on what to do when a publication is out of print; and information on where copies of government publications may be obtained on the Internet.
Model Cities: Selected References 1968-1969
This report provides a bibliography of resources related to the U.S. Department of Housing and Urban Development's (HUB) Model Cities program which were published between 1968 and 1969. It includes pamphlets, articles, and government publications.
Protection of Classified Information by Congress: Practices and Proposals
This report discusses safeguards in place to protect conterolled information and proposals for change of some of the mechanisms in place. Congress uses classified national security and other controlled information to fulfill its constitutional responsibilities, particularly overseeing the executive, appropriating funds, and legislating public policy.
Protection of Classified Information by Congress: Practices and Proposals
This report discusses safeguards in place to protect controlled information and proposals for change of some of the mechanisms in place. Congress uses classified national security and other controlled information to fulfill its constitutional responsibilities, particularly overseeing the executive, appropriating funds, and legislating public policy.
Protection of Classified Information by Congress: Practices and Proposals
No Description Available.
Protection of Classified Information by Congress: Practices and Proposals
The protection of classified national security and other controlled information is of concern not only to the executive branch - which determines what information is to be safeguarded, for the most part - but also to Congress, which uses the information to fulfill its constitutional responsibilities. It has established mechanisms to safeguard controlled information in its custody, although these arrangements have varied over time between the two chambers and among panels in each. This report explores and analyzes said mechanisms. It also discusses various proposals for standardization of and modifications to current policies.
Protection of Classified Information by Congress: Practices and Proposals
The protection of classified national security and other controlled information is of concern not only to the executive branch, which determines what information is to be safeguarded, for the most part,1 but also to Congress, which uses such information to fulfill its constitutional responsibilities. As a result, Congress has established procedures and mechanisms to protect controlled information in its custody. These arrangements, however, differ between the House and the Senate and among panels in each chamber. The Senate, for instance, has established an Office of Senate Security to centralize responsibility for personnel and information security, whereas the House has not created a counterpart. Proposals to change the system, some of which could prove controversial or costly, usually seek to set uniform standards or increase requirements for access. This report will be updated as conditions require.
Protection of Classified Information by Congress: Practices and Proposals
No Description Available.
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets
This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets
This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
"Sensitive But Unclassified" and Other Federal Security Controls on Scientific and Technical Information: History and Current Controversy
This report (1) summarizes provisions of several laws and regulations, including the Patent Law, the Atomic Energy Act, International Traffic in Arms Control regulations, the USA PATRIOT Act (P.L. 107-56), the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (P.L. 107-188), and the Homeland Security Act (P.L. 107-296), that permit the federal government to restrict disclosure of scientific and technical information that could harm national security; (2) describes the development of federal controls on “sensitive but unclassified” (SBU) scientific and technical information; (3) summarizes current controversies about White House policy on “Sensitive But Unclassified Information,” and “Sensitive Homeland Security Information” (SHSI) issued in March 2002; and (4) identifies controversial issues which might affect the development of Office of Management and Budget (OMB) and agency guidelines for sensitive unclassified information, which are expected to be released during 2003.
"Sensitive But Unclassified" and Other Federal Security Controls on Scientific and Technical Information: History and Current Controversy
This report (1) summarizes provisions of several laws and regulations, including the Patent Law, the Atomic Energy Act, International Traffic in Arms Control regulations, the USA PATRIOT Act (P.L. 107-56), the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (P.L. 107-188), and the Homeland Security Act (P.L. 107-296), that permit the federal government to restrict disclosure of scientific and technical information that could harm national security; (2) describes the development of federal controls on “sensitive but unclassified” (SBU) scientific and technical information; (3) summarizes current controversies about White House policy on “Sensitive But Unclassified Information,” and “Sensitive Homeland Security Information” (SHSI) issued in March 2002; and (4) identifies controversial issues which might affect the development of Office of Management and Budget (OMB) and agency guidelines for sensitive unclassified information, which are expected to be released during 2003.
"Sensitive But Unclassified" and Other Federal Security Controls on Scientific and Technical Information: History and Current Controversy
This report (1) summarizes provisions of several laws and regulations, including the Patent Law, the Atomic Energy Act, International Traffic in Arms Control regulations, the USA PATRIOT Act (P.L. 107-56), the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (P.L. 107-188), and the Homeland SecurityAct (P.L. 107-296), that permit the federal government to restrict disclosure of scientific and technical information that could harm national security; (2) describes the development of federal controls on “sensitive but unclassified” (SBU) scientific and technical information; (3) summarizes current controversies about White House policy on “Sensitive But Unclassified Information,” and “Sensitive Homeland Security Information” (SHSI) issued in March 2002; and (4) identifies controversial issues which might affect the development of Office of Management and Budget (OMB) and agency guidelines for sensitive unclassified information, which are expected to be released during 2003.
"Sensitive but Unclassified" Information and Other Controls: Policy and Options for Scientific and Technical Information
This report traces the evolution of "sensitive but unclassified" or SBU-related controls; summarizes actions taken to protect certain types of scientific and technical information; describes critiques of some control policies; and summarizes proposals and actions, including congressional, executive and other initiatives, to clarify these issues and develop policies that serve various stakeholders. It also raises issues that may warrant further attention.
Classified Information Policy and Executive Order 13526
This report provides information on classified information policy, which also is called security classification policy and national security classification information policy. It discusses the history, costs, and agencies assigned roles in classified information policy. The report focuses on Executive Order 13526, which establishes much of the current policy, and the report identifies possible oversight issues for Congress.
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
A Bibliography of Books and Articles Published in 1974-1976 Pertinent to United States-West European Relations
This report contains an account and bibliography on United States and Western Europe relations and brief overview.
Government Collection of Private Information: Background and Issues Related to the USA PATRIOT Act Reauthorization in Brief
This report discusses the legal background associated with the sunset of various provisions of the USA PATRIOT Act and of subsequent related legislation.
The State Secrets Privilege and Other Limits on Litigation Involving Classified Information
This report provides an overview of the protections afforded to government organizations and officials by the state secrets privilege. The state secrets privilege, derived from common law, is an evidentiary privilege that allows the government to resist court-ordered disclosure of information during litigation if there is a reasonable danger that such disclosure would harm the national security of the United States.
Government Collection of Private Information: Background and Issues Related to the USA PATRIOT Act Reauthorization in Brief
This report discusses the legal background associated with the sunset of various provisions of the USA PATRIOT Act and of subsequent related legislation.
Organized Crime in the United States: Selected References, June 1967-June 1969
This report provides a bibliography of sources published between June 1967 and June 1969 related to organized crime in the United States divided by material type (books and documents, Congressional Record, magazine articles, and newspaper articles).
Researching Current Federal Legislation and Regulations: A Guide to Resources for Congressional Staff
This report is designed to introduce congressional staff to selected governmental and nongovernmental sources that are useful in tracking and obtaining information on federal legislation and regulations. It includes governmental sources, such as Congress.gov, the Government Publishing Office's Federal Digital System (FDsys), and U.S. Senate and House websites. Nongovernmental or commercial sources include resources such as HeinOnline and the Congressional Quarterly (CQ) websites. The report also highlights classes offered by the Congressional Research Service (CRS) and the Law Library of Congress.
Researching Current Federal Legislation and Regulations: A Guide to Resources for Congressional Staff
This report is designed to introduce congressional staff to selected governmental and nongovernmental sources that are useful in tracking and obtaining information on federal legislation and regulations. It includes governmental, nongovernmental, or commercial sources, and highlights classes offered by the Congressional Research Service (CRS) and the Law Library of Congress.
Researching Current Federal Legislation and Regulations: A Guide to Resources for Congressional Staff
This report is designed to introduce congressional staff to selected governmental and nongovernmental sources that are useful in tracking and obtaining information federal legislation and regulations. It includes governmental sources such as the Legislative Information System (LIS), THOMAS, the Government Printing Office's Federal Digital System (FDsys), and U.S. Senate and House websites. Nongovernmental or commercial sources include resources such as HeinOnline and the Congressional Quarterly (CQ) websites. It also highlights classes offered by the Congressional Research Service (CRS) and the Library of Congress Law Library.
The 2017 National Security Strategy: Issues for Congress
This report discusses the 2017 National Security Strategy (NSS) document released by the Trump Administration on December 18, 2017, and its major themes.
The 2018 National Defense Strategy
This report discusses the 2018 National Defense Strategy which lays out the goals and methods of the Defense Department for the year.
Nuclear Weapons Complex Reconfiguration: Analysis of an Energy Department Task Force Report
No Description Available.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
Report discussing the federal government's role in the country's information technology (IT) research and development (R&D) activities.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. Support of IT R&D began because the government had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. Support of IT R&D began because the government had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers that would be capable of addressing the problems and issues the government needed to solve and study.
Critical Infrastructure Security: CRS Experts
This report contains a table which provides access to names and contact information for CRS experts on policy concerns relating to critical infrastructure security. Policy areas identified include: mission; security services; and specific sectors: assessing vulnerabilities, planning and implementation.
Critical Infrastructure: The National Asset Database
The purpose of this report is to discuss the National Asset Database: what is in it, how it is populated, what the Database apparently is, what it is not, and how it is intended to be used. The report also discusses some of the issues on which Congress could focus its oversight, including appropriation bill language.
Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA.
FY2005 Budget Documents: Internet Access and GPO Availability
Every year the President submits to Congress a series of volumes that provide the text of the President’s proposed budget for the coming fiscal year. Neither the Congressional Research Service (CRS) nor the Library of Congress can provide giveaway copies of these documents. This report provides brief descriptions of these budget volumes and related documents, together with Internet addresses, Government Printing Office (GPO) stock numbers, and prices to obtain these publications. It also tells how to find locations of government depository libraries, which can provide both printed copies for reference use and Internet access to the text.
Iraq: Map Sources
This report identifies selected Web sites for maps of Iraq. Selected government, library, and organizational Web site addresses are provided. Maps of the Middle East, Iraq, and the No-Fly Zone are also provided.
Iraq: Map Sources
This report identifies selected Web sites for maps of Iraq. Selected government, library, and organizational Web site addresses are provided. Maps of the Middle East, Iraq, the No-Fly Zone, and Facilities Used by U.S. Forces in the Gulf are also provided.
Iraq: Map Sources
This report identifies selected Web sites for maps of Iraq. Selected government, library, and organizational Web site addresses are provided. Maps of the Middle East, Iraq, the No-Fly Zone, and Facilities Used by U.S. Forces in the Gulf are also provided.
Iraq: Map Sources
This report identifies selected Web sites for maps of Iraq. Selected government, library, and organizational Web site addresses are provided. Maps of the Middle East, Iraq, Facilities Used by U.S. Forces in the Gulf, and USG Humanitarian Assistance and Reconstruction Activities in Iraq are also provided.
Appropriations for FY2003: Foreign Operations, Export Financing, and Related Programs
Annual report of the 2003 Fiscal Year detailing U.S. international affairs spending.
Lobbyists and Interest Groups: Sources of Information
Lobbyists and interest groups play an active role in the American legislative process. Information on lobbyist registrations and on interest groups in general is available from a variety of online and printed sources, including files available for public inspection. This report is a guide for locating governmental sources that maintain files on lobby groups, their registrations, and finances. Also included in this report are nongovernmental sources that offer background information on the lobbyists and interest groups who focus on legislation in Washington.
Department of Veteran Affairs: Information Security and Information Technology Management Reorganization
On May 3, 2006, the home of a Department of Veterans Affairs (VA) data analyst was burglarized, resulting in the theft of a laptop computer and an external data storage device that was reported to contain personal information on more than 26 million veterans and United States military personnel. The VA Secretary testified that he was not informed of the incident until May 16, 2006, almost two weeks after the data had been stolen. VA publicly announced the theft on May 22. On June 29, VA announced that the stolen laptop computer and external hard drive had been recovered intact and that, based on a forensic examination conducted by the Federal Bureau of Investigation (FBI), the files on the external hard drive had not been compromised.
The Department of State's Patterns of Global Terrorism Report: Trends, State Sponsors, and Related Issues
This report highlights trends and data found in the State Department’s annual Patterns of Global Terrorism report, (Patterns 2003) and addresses selected issues relating to its content.
Intelligence Whistleblower Protections: In Brief
This report describes three sources of Intelligence Community (IC) whistleblower protection including the Intelligence Community Whistleblower Protection Act of 1998 (ICWPA), Presidential Policy Directive 19 (PPD-19), and Title VI of the Intelligence Authorization Act for Fiscal Year 2014 (Title VI). Generally speaking, whistleblowers are those who expose misconduct (e.g., fraud, abuse, or illegal activity) within an organization. In the context of the IC, whistleblowers are generally employees or contractors of federal intelligence agencies who bring to light information on agency wrongdoings.
Congressional Printing: Background and Issues for Congress
This report provides an overview and analysis of issues related to the processing and distribution of congressional information by the Government Printing Office. Subsequent sections address several issues, including funding congressional printing, printing authorizations, current printing practices, and options for Congress. Finally, the report provides congressional printing appropriations, production, and distribution data in a number of tables.
Government Printing, Publications, and Digital Information Management: Issues and Challenges
This report examines three areas related to the production, distribution, retention, and management of government information in a primarily digital environment. These areas include the Joint Committee on Printing; the Federal Depository Library Program; and government information management in the future.
Back to Top of Screen