You limited your search to:

 Collection: Congressional Research Service Reports
The Protection of Classified Information: The Legal Framework

The Protection of Classified Information: The Legal Framework

Date: January 10, 2011
Creator: Elsea, Jennifer K.
Description: This report provides an overview of the relationship between executive and legislative authority over national security information, and summarizes the current laws that form the legal framework protecting classified information, including current executive orders and some agency regulations pertaining to the handling of unauthorized disclosures of classified information by government officers and employees. The report also summarizes criminal laws that pertain specifically to the unauthorized disclosure of classified information.
Contributing Partner: UNT Libraries Government Documents Department
Presidential Claims of Executive Privilege: History, Law, Practice, and Recent Developments

Presidential Claims of Executive Privilege: History, Law, Practice, and Recent Developments

Date: August 21, 2012
Creator: Garvey, Todd & Dolan, Alissa M.
Description: This report discusses the background of claims of executive privilege, ending with a look into how President Obama has used them.
Contributing Partner: UNT Libraries Government Documents Department
Intelligence Identities Protection Act

Intelligence Identities Protection Act

Date: January 28, 2011
Creator: Elsea, Jennifer K.
Description: This report summarizes the Intelligence Identities Protection Act, P.L. 97-200, enacted by Congress in 1982 to address the unauthorized disclosure of information that exposes covert U.S. intelligence agents.
Contributing Partner: UNT Libraries Government Documents Department
“Gang of Four” Congressional Intelligence Notifications

“Gang of Four” Congressional Intelligence Notifications

Date: March 18, 2011
Creator: Cumming, Alfred
Description: "Gang of Four" intelligence notifications are oral briefings on sensitive non-covert action intelligence activities (including intelligence collection programs) that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Contributing Partner: UNT Libraries Government Documents Department
The Changing Demographic Profile of the United States

The Changing Demographic Profile of the United States

Date: March 31, 2011
Creator: Shrestha, Laura B. & Heisler, Elayne J.
Description: This report discusses the demographic profile of the United States and highlights demographic changes that have occurred since 1950 to illustrate how trends may affect the demographics of the U.S. through 2050.
Contributing Partner: UNT Libraries Government Documents Department
The State Secrets Privilege: Preventing the Disclosure of Sensitive National Security Information During Civil Litigation

The State Secrets Privilege: Preventing the Disclosure of Sensitive National Security Information During Civil Litigation

Date: March 28, 2011
Creator: Garvey, Todd & Liu, Edward, C.
Description: This report presents an overview of the protections afforded by the state secrets privilege; a discussion of some of the many unresolved issues associated with the privilege; and a selection of high-profile examples of how the privilege has been applied in practice.
Contributing Partner: UNT Libraries Government Documents Department
Military Service Records and Unit Histories: A Guide to Locating Sources

Military Service Records and Unit Histories: A Guide to Locating Sources

Date: July 26, 2012
Creator: Gomez-Granger, Julissa & Leland, Anne
Description: This guide provides information on locating military unit histories and individual service records of discharged, retired, and deceased military personnel. It includes contact information for military history centers, websites for additional sources of research, and a bibliography of other publications.
Contributing Partner: UNT Libraries Government Documents Department
Covert Action: Legislative Background and Possible Policy Questions

Covert Action: Legislative Background and Possible Policy Questions

Date: April 6, 2011
Creator: Cumming, Alfred
Description: This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. It also examines the statutory procedures governing covert action and associated questions to consider.
Contributing Partner: UNT Libraries Government Documents Department
Sensitive Covert Action Notifications: Oversight Options for Congress

Sensitive Covert Action Notifications: Oversight Options for Congress

Date: April 6, 2011
Creator: Cumming, Alfred
Description: Legislation enacted in 1980 gave the executive branch authority to limit advance notification of especially-sensitive covert actions to eight Members of Congress (called the "Gang of Eight") when the President determines that it is essential to limit prior notice in order to meet extraordinary circumstances affecting U.S. vital interests. This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
Contributing Partner: UNT Libraries Government Documents Department
Publishing Scientific Papers with Potential Security Risks: Issues for Congress

Publishing Scientific Papers with Potential Security Risks: Issues for Congress

Date: July 12, 2012
Creator: Gottron, Frank & Shea, Dana A.
Description: This report discusses the publication of federally-funded research results including positive aspects (wide dissemination that may drive innovation, job creation, technology development, and the advance of science), and the negatives (that some research results could also be used for malicious purposes). This report describes the underlying controversy, the potential benefits and harms of publishing these manuscripts, the actions taken by domestic and international stakeholders, and options to improve the way research is handled to minimize security concerns.
Contributing Partner: UNT Libraries Government Documents Department