Search Results

open access

Court-Ordered Access to Smart Phones: In Brief

Description: This report specifically examines certain encryption issues that have been raised in the investigation of the December 2, 2015, terrorist attack in San Bernardino, CA. This report highlights certain issues that policymakers may examine as they follow the ongoing dispute between law enforcement and technology companies, and it focuses on questions related to the government's request.
Date: February 23, 2016
Creator: Finklea, Kristin; Thompson, Richard M., II & Jaikaran, Chris
Partner: UNT Libraries Government Documents Department
open access

Covert Action and Clandestine Activities of the Intelligence Community: Selected Definitions in Brief

Description: This report provides definitions of clandestine versus covert intelligence activities and discusses what agencies are authorized to undertake which types of intelligence. It also covers military intelligence terms that are different than ones used by civilian government activities.
Date: April 25, 2018
Creator: DeVine, Michael E. & Peters, Heidi M.
Partner: UNT Libraries Government Documents Department
open access

Covert Action and Clandestine Activities of the Intelligence Community: Selected Notification Requirements in Brief

Description: This report discusses the requirements for notifying Congress of covert action and clandestine activities of the intelligence community and activities of the military. These requirements originated from instances in the 1970s when media disclosure of past intelligence abuses underscored reasons for Congress taking a more active role in oversight. Over time, these requirements were written into statute or became custom.
Date: May 7, 2018
Creator: DeVine, Michael E. & Peters, Heidi M.
Partner: UNT Libraries Government Documents Department
open access

Covert Action: Legislative Background and Possible Policy Questions

Description: Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities wi… more
Date: July 6, 2009
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department
open access

Covert Action: Legislative Background and Possible Policy Questions

Description: Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counterterrorism intelligence activities as part of what the Bush Administration termed the global war on terror. Some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congr… more
Date: April 10, 2013
Creator: Erwin, Marshall C.
Partner: UNT Libraries Government Documents Department
open access

Covert Action: Legislative Background and Possible Policy Questions

Description: This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. It also examines the statutory procedures governing covert action and associated questions to consider.
Date: April 6, 2011
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department
open access

Covert Action: Legislative Background and Possible Policy Questions

Description: Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities wi… more
Date: December 27, 2011
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department
open access

Covert Action: Legislative Background and Possible Policy Questions

Description: This report examines the statutory procedures governing covert action and associated questions to consider. Published reports have suggested that the Pentagon has expanded its counter-terrorism intelligence activities, and some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congres… more
Date: February 9, 2009
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of previous legislative efforts to criminalize the unauthorized disclosure of classified information.
Date: June 24, 2013
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the… more
Date: October 18, 2010
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including … more
Date: January 10, 2011
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the… more
Date: December 6, 2010
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the… more
Date: September 8, 2011
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including … more
Date: June 26, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: The recent online publication of classified defense documents by the organization Wikileaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organiz… more
Date: September 10, 2010
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

CRS Issue Statement on Intelligence Policy

Description: This report contains the distinction between foreign and law enforcement intelligence that remain important when civil liberties and privacy rights of U.S. persons are involved.
Date: January 15, 2010
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Selected Legal Issues

Description: This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also discusses the degree to which federal law may preempt state law.
Date: March 14, 2012
Creator: Liu, Edward C.; Stevens, Gina; Ruane, Kathleen Ann; Dolan, Alissa M. & Thompson, Richard M., II
Partner: UNT Libraries Government Documents Department
open access

The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

Description: This report provides an overview of the DHS IE both at headquarters and within the components. It examines how DHS IE is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options for Congress to consider on these issues.
Date: March 19, 2010
Creator: Randol, Mark A.
Partner: UNT Libraries Government Documents Department
open access

The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

Description: This report provides an overview of Department of Homeland Security Intelligence (DHSI) both at headquarters and within the components. It examines how DHSI is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; and support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options that Congress … more
Date: May 27, 2009
Creator: Randol, Mark A.
Partner: UNT Libraries Government Documents Department
open access

Department of Veteran Affairs: Information Security and Information Technology Management Reorganization

Description: On May 3, 2006, the home of a Department of Veterans Affairs (VA) data analyst was burglarized, resulting in the theft of a laptop computer and an external data storage device that was reported to contain personal information on more than 26 million veterans and United States military personnel. The VA Secretary testified that he was not informed of the incident until May 16, 2006, almost two weeks after the data had been stolen. VA publicly announced the theft on May 22. On June 29, VA announc… more
Date: August 14, 2006
Creator: Panangala, Sidath Viranga
Partner: UNT Libraries Government Documents Department
open access

Digital Surveillance: The Communications Assistance for Law Enforcement Act

Description: The Communications Assistance for Law Enforcement Act (CALEA, P.L. 103- 414, 47 USC 1001-1010), enacted October 25, 1994, is intended to preserve the ability of law enforcement officials to conduct electronic surveillance effectively and efficiently despite the deployment of new digital technologies and wireless services that have altered the character of electronic surveillance. CALEA requires telecommunications carriers to modify their equipment, facilities, and services, wherever reasonably … more
Date: August 3, 2005
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department
open access

Digital Surveillance: The Communications Assistance for Law Enforcement Act

Description: The Communications Assistance for Law Enforcement Act (CALEA, P.L. 103- 414, 47 USC 1001-1010), enacted October 25, 1994, is intended to preserve the ability of law enforcement officials to conduct electronic surveillance effectively and efficiently despite the deployment of new digital technologies and wireless services that have altered the character of electronic surveillance. CALEA requires telecommunications carriers to modify their equipment, facilities, and services, wherever reasonably … more
Date: May 10, 2006
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department
Back to Top of Screen