You limited your search to:

 Collection: Congressional Research Service Reports
Access to Government Information in the United States
The U.S. Constitution makes no specific allowance for any one of the three branches of the federal government to have access to information held by the others. No provision in the U.S. Constitution expressly establishes a procedure for public access to government information. Congress has legislated various public access laws. Among these laws are two records access statutes, The Freedom of Information Act, the Privacy Act, and two meetings access statutes, the Federal Advisory Committee Act, and the Government in the Sunshine Act. This report offers an overview of the four information access laws noted above, and provides citations to additional resources related to these tools. digital.library.unt.edu/ark:/67531/metadc29513/
Secrecy Versus Openness: New Proposed Arrangements for Balancing Competing Needs
No Description digital.library.unt.edu/ark:/67531/metacrs5933/
Secrecy Versus Openness: New Proposed Arrangements for Balancing Competing Needs
No Description digital.library.unt.edu/ark:/67531/metacrs5932/
Sensitive Security Information (SSI) and Transportation Security: Background and Controversies
No Description digital.library.unt.edu/ark:/67531/metacrs5931/
Sensitive Security Information and Transportation Security: Issues and Congressional Options
No Description digital.library.unt.edu/ark:/67531/metacrs5929/
Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative: Background and Issues for Congress
This report describes the NSI, the rationale for the sharing of terrorism-related SARs, and how the NSI seeks to achieve this objective. It examines the privacy and civil liberties concerns raised by the initiative and identifies other oversight issues for Congress. digital.library.unt.edu/ark:/67531/metadc83930/
Federal Depository Library Program: Issues for Congress
A history and overview of current issues regarding the Federal Depository Library Program (FDLP). digital.library.unt.edu/ark:/67531/metadc85399/
Appropriations Bills: What is Report Language?
When the Senate or House Appropriations Committee reports an appropriations bill to the full Senate or House, respectively, the committee typically publishes a committee report explaining the bill. This fact sheet provides a brief overview of what these reports entail and the language used within them. digital.library.unt.edu/ark:/67531/metacrs7624/
“Gang of Four” Congressional Intelligence Notifications
"Gang of Four" intelligence notifications are oral briefings on sensitive non-covert action intelligence activities (including intelligence collection programs) that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. digital.library.unt.edu/ark:/67531/metadc99008/
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well. digital.library.unt.edu/ark:/67531/metadc29519/
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well. digital.library.unt.edu/ark:/67531/metadc29518/
"Gang of Four" Congressional Intelligence Notifications
"Gang of Four" intelligence notifications generally are oral briefings of certain particularly sensitive non-covert action intelligence activities, including principally, but not exclusively, intelligence collection programs, that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times, but not always, to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. digital.library.unt.edu/ark:/67531/metadc26184/
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well. digital.library.unt.edu/ark:/67531/metadc29520/
Conference Reports and Joint Explanatory Statements
The conference report presents the formal legislative language on which the conference committee has agreed. The joint explanatory statement explains the various elements of the conferees’ agreement in relation to the positions that the House and Senate had committed to the conference committee. digital.library.unt.edu/ark:/67531/metacrs3963/
Conference Reports and Joint Explanatory Statements
The conference report presents the formal legislative language on which the conference committee has agreed. The joint explanatory statement explains the various elements of the conferees’ agreement in relation to the positions that the House and Senate had committed to the conference committee. digital.library.unt.edu/ark:/67531/metacrs1479/
The Changing Demographic Profile of the United States
As noted by the Population Reference Bureau, “The U.S. is getting bigger, older, and more diverse.” The objective of this report is to highlight some of the demographic changes that have already occurred since 1950 and to illustrate how these and future trends will reshape the nation in the decades to come (through 2050). This report discusses the current and projected demographic changes if policymakers accelerate efforts to address and adapt to the changing population profile as it relates to a number of essential domains, such as work, retirement, and pensions, private wealth and income security, and the health and well-being of the aging population. digital.library.unt.edu/ark:/67531/metacrs9276/
Intelligence Identities Protection Act
No Description digital.library.unt.edu/ark:/67531/metacrs5060/
Managing Secrecy: Security Classification Reform - The Government Secrecy Act Proposal
No Description digital.library.unt.edu/ark:/67531/metacrs705/
Security Classification Policy and Procedure: E.O. 12958, as Amended
No Description digital.library.unt.edu/ark:/67531/metacrs6258/
Military Service Records and Unit Histories: A Guide to Locating Sources
No Description digital.library.unt.edu/ark:/67531/metacrs9874/
Nuclear Weapons Complex Reconfiguration: Analysis of an Energy Department Task Force Report
No Description digital.library.unt.edu/ark:/67531/metacrs9210/
Military Service Records and Unit Histories: A Guide to Locating Sources
This report is a guide to locating individual service records and military unit histories from the American Revolution to the present. This guide provides referral information for locating individual service records of discharged and deceased veterans. It includes information regarding locating and obtaining active service records. Also included are relevant addresses and websites of government agencies, historical associations, and a select bibliography. digital.library.unt.edu/ark:/67531/metacrs10261/
The Freedom of Information Act and Nondisclosure Provisions in Other Federal Laws
This report discusses Congressional considerations regarding how to balance the federal government's growing need for sensitive or confidential business information, the public's right of access to information about government activities, and the private sector's interest in keeping its sensitive or proprietary information protected from public disclosure. The report discusses this issue in light of particularly the Freedom of Information Act (FOIA) and other similar legislation. digital.library.unt.edu/ark:/67531/metadc31370/
Congressional Access to Executive Branch Information: Legislative Tools
This report begins by reviewing the precedents established during the Washington Administration for withholding documents from Congress. Close examination reveals that the scope of presidential privilege is often exaggerated. Congress had access to more documentation than is commonly believed and might have had more had it pressed for it. Subsequent sections focus on various forms of congressional leverage: the power of the purse, the power to impeach, issuing congressional subpoenas, holding executive officials in contempt, House resolutions of inquiry, GAO investigations, and blocking nominations, all of which may force executive officials to release documents they would otherwise want to keep private and confidential. Even if Presidents announce perfectly plausible grounds for withholding documents, they may have to comply with the congressional will to achieve other more important goals. digital.library.unt.edu/ark:/67531/metacrs6983/
The Department of State's Patterns of Global Terrorism Report: Trends, State Sponsors, and Related Issues
This report highlights trends and data found in the State Department’s annual Patterns of Global Terrorism report, (Patterns 2003) and addresses selected issues relating to its content. digital.library.unt.edu/ark:/67531/metacrs5794/
U.S. Public Diplomacy: Legislative Proposals to Amend Prohibitions on Disseminating Materials to Domestic Audiences
This report looks at amendments to the Smith-Mundt Act, proposed by the 112th Congress that would restate provisions to exclude any ban on domestic dissemination of international information materials prepared for foreign public available to a domestic audience. The original legislation was also amended in 1972, and a 1985 provision, popularly known as the Zorinsky Amendment, prohibited domestic dissemination of international information materials and products. digital.library.unt.edu/ark:/67531/metadc122261/
The Protection of Classified Information: The Legal Framework
This report provides an overview of the relationship between executive and legislative authority over national security information, and summarizes the current laws that form the legal framework protecting classified information, including current executive orders and some agency regulations pertaining to the handling of unauthorized disclosures of classified information by government officers and employees. The report also summarizes criminal laws that pertain specifically to the unauthorized disclosure of classified information. digital.library.unt.edu/ark:/67531/metadc122339/
Military Service Records and Unit Histories: A Guide to Locating Sources
This guide provides information on locating military unit histories and individual service records of discharged, retired, and deceased military personnel. It includes contact information for military history centers, websites for additional sources of research, and a bibliography of other publications. digital.library.unt.edu/ark:/67531/metadc99123/
"Gang of Four" Congressional Intelligence Notifications
Report that reviews the history of the Gang of Four intelligence notification process and compares this procedure with that of the "Gang of Eight" notification procedure. digital.library.unt.edu/ark:/67531/metadc227648/
Federal Enterprise Architecture and E-Government: Issues for Information Technology Management
No Description digital.library.unt.edu/ark:/67531/metacrs9154/
Protection of Classified Information by Congress: Practices and Proposals
This report discusses safeguards in place to protect conterolled information and proposals for change of some of the mechanisms in place. Congress uses classified national security and other controlled information to fulfill its constitutional responsibilities, particularly overseeing the executive, appropriating funds, and legislating public policy. digital.library.unt.edu/ark:/67531/metadc94174/
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
The federal government has long played a key role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study. digital.library.unt.edu/ark:/67531/metadc84061/
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider. digital.library.unt.edu/ark:/67531/metadc84067/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of recent legislation relevant to the issue as well as some previous efforts to criminalize the unauthorized disclosure of classified information. digital.library.unt.edu/ark:/67531/metadc93844/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act. digital.library.unt.edu/ark:/67531/metadc93843/
Analysis of Ten Selected Science and Technology Policy Studies
Since the end of the Cold War in the early 1990s, a number of reports have been prepared on a broad range of science and technology (S&T) policy issues, most notably dealing with national research and development (R&D) goals, priorities, and budgets, and university-government-industry relationships. This report discusses and analyzes ten of these S&T reports. digital.library.unt.edu/ark:/67531/metacrs481/
Intelligence Identities Protection Act
This report summarizes the Intelligence Identities Protection Act, P.L. 97-200, enacted by Congress in 1982 to address the unauthorized disclosure of information that exposes covert U.S. intelligence agents. digital.library.unt.edu/ark:/67531/metadc103236/
The Changing Demographic Profile of the United States
This report discusses the demographic profile of the United States and highlights demographic changes that have occurred since 1950 to illustrate how trends may affect the demographics of the U.S. through 2050. digital.library.unt.edu/ark:/67531/metadc99088/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act. digital.library.unt.edu/ark:/67531/metadc31369/
Balancing Scientific Publication and National Security Concerns: Issues for Congress
There is a lack of consensus regarding the best method of balancing scientific publishing and national security. The current federal policy, as described in National Security Decision Directive 189, is that fundamental research should remain unrestricted and that in the rare case where it is necessary to restrict such information, classification is the appropriate vehicle to do so. Other mechanisms restrict international information flow, where Export Administration Regulations (EAR) and International Traffic in Arms Regulations (ITAR) control export of items and technical information on specific lists. Both EAR and ITAR contain a fundamental research exclusion, but this exclusion is lost if prepublication review of research results for sensitive information occurs. digital.library.unt.edu/ark:/67531/metacrs6030/
Balancing Scientific Publication and National Security Concerns: Issues for Congress
There is a lack of consensus regarding the best method of balancing scientific publishing and national security. The current federal policy, as described in National Security Decision Directive 189, is that fundamental research should remain unrestricted and that in the rare case where it is necessary to restrict such information, classification is the appropriate vehicle to do so. Other mechanisms restrict international information flow, where Export Administration Regulations (EAR) and International Traffic in Arms Regulations (ITAR) control export of items and technical information on specific lists. Both EAR and ITAR contain a fundamental research exclusion, but this exclusion is lost if prepublication review of research results for sensitive information occurs. digital.library.unt.edu/ark:/67531/metacrs6029/
Balancing Scientific Publication and National Security Concerns: Issues for Congress
There is a lack of consensus regarding the best method of balancing scientific publishing and national security. The current federal policy, as described in National Security Decision Directive 189, is that fundamental research should remain unrestricted and that in the rare case where it is necessary to restrict such information, classification is the appropriate vehicle to do so. Other mechanisms restrict international information flow, where Export Administration Regulations (EAR) and International Traffic in Arms Regulations (ITAR) control export of items and technical information on specific lists. Both EAR and ITAR contain a fundamental research exclusion, but this exclusion is lost if prepublication review of research results for sensitive information occurs. digital.library.unt.edu/ark:/67531/metacrs5297/
Balancing Scientific Publication and National Security Concerns: Issues for Congress
There is a lack of consensus regarding the best method of balancing scientific publishing and national security. The current federal policy, as described in National Security Decision Directive 189, is that fundamental research should remain unrestricted and that in the rare case where it is necessary to restrict such information, classification is the appropriate vehicle to do so. Other mechanisms restrict international information flow, where Export Administration Regulations (EAR) and International Traffic in Arms Regulations (ITAR) control export of items and technical information on specific lists. Both EAR and ITAR contain a fundamental research exclusion, but this exclusion is lost if prepublication review of research results for sensitive information occurs. digital.library.unt.edu/ark:/67531/metacrs5298/
Balancing Scientific Publication and National Security Concerns: Issues for Congress
There is a lack of consensus regarding the best method of balancing scientific publishing and national security. The current federal policy, as described in National Security Decision Directive 189, is that fundamental research should remain unrestricted and that in the rare case where it is necessary to restrict such information, classification is the appropriate vehicle to do so. Other mechanisms restrict international information flow, where Export Administration Regulations (EAR) and International Traffic in Arms Regulations (ITAR) control export of items and technical information on specific lists. Both EAR and ITAR contain a fundamental research exclusion, but this exclusion is lost if prepublication review of research results for sensitive information occurs. digital.library.unt.edu/ark:/67531/metacrs8579/
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider. digital.library.unt.edu/ark:/67531/metadc26250/
Presidential Libraries: The Federal System and Related Legislation
Through the National Archives and Records Administration, the federal government currently manages and maintains 12 presidential libraries. Inaugurated with the Presidential Libraries Act of 1955, these entities are privately constructed on behalf of former Presidents and, upon completion, are deeded to the federal government. This report provides a brief overview of the federal presidential libraries system and tracks the progress of related legislation. digital.library.unt.edu/ark:/67531/metadc26307/
Protection of Classified Information by Congress: Practices and Proposals
The protection of classified national security and other controlled information is of concern not only to the executive branch - which determines what information is to be safeguarded, for the most part - but also to Congress, which uses the information to fulfill its constitutional responsibilities. It has established mechanisms to safeguard controlled information in its custody, although these arrangements have varied over time between the two chambers and among panels in each. This report explores and analyzes said mechanisms. It also discusses various proposals for standardization of and modifications to current policies. digital.library.unt.edu/ark:/67531/metacrs10558/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act. digital.library.unt.edu/ark:/67531/metadc29606/
Floor Consideration of Conference Reports in the Senate
No Description digital.library.unt.edu/ark:/67531/metacrs3978/
Floor Consideration of Conference Reports in the House
No Description digital.library.unt.edu/ark:/67531/metacrs3977/