You limited your search to:

 Country: United States
 Decade: 2000-2009
 Collection: Congressional Research Service Reports
Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches

Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches

Date: January 14, 2009
Creator: Randol, Mark A.
Description: This report provides a potential conceptual model of how to frame homeland security intelligence (HSINT), including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). Although the HSIC's members are diffused across the nation, they share a common counterterrorism interest. The proliferation of intelligence and information fusion centers across the country indicate that state and local leaders believe there is value to centralizing intelligence gathering and analysis in a manner that assists them in preventing and responding to local manifestations of terrorist threats to their people, infrastructure, and other assets. At the policy and operational levels, the communication and integration of federal HSINT efforts with these state and local fusion centers will likely remain an important priority and future challenge.
Contributing Partner: UNT Libraries Government Documents Department
Security Classification Policy and Procedure: E.O. 12958, as Amended

Security Classification Policy and Procedure: E.O. 12958, as Amended

Date: June 4, 2009
Creator: Kosar, Kevin R.
Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Contributing Partner: UNT Libraries Government Documents Department
Security Classification Policy and Procedure: E.O. 12958, as Amended

Security Classification Policy and Procedure: E.O. 12958, as Amended

Date: December 31, 2009
Creator: Kosar, Kevin R.
Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Contributing Partner: UNT Libraries Government Documents Department
Security Classification Policy and Procedure: E.O. 12958, as Amended

Security Classification Policy and Procedure: E.O. 12958, as Amended

Date: May 14, 2003
Creator: Relyea, Harold C.
Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Contributing Partner: UNT Libraries Government Documents Department
The Foreign Intelligence Surveillance Act: A Sketch of Selected Issues

The Foreign Intelligence Surveillance Act: A Sketch of Selected Issues

Date: July 7, 2008
Creator: Bazan, Elizabeth B.
Description: This report briefly outlines three issues relating to electronic surveillance under the Foreign Intelligence Surveillance Act (FISA) and touches upon some of the perspectives reflected in the ongoing debate. These issues include the inherent and often dynamic tension between national security and civil liberties, particularly rights of privacy and free speech; the need for the intelligence community to be able to efficiently and effectively collect foreign intelligence information from the communications of foreign persons located outside the United States in a changing, fast-paced, and technologically sophisticated international environment or from United States persons abroad, and the differing approaches suggested to meet this need; and limitations of liability for those electronic communication service providers who furnish aid to the federal government in its foreign intelligence collection. Two constitutional provisions, in particular, are implicated in this debate — the Fourth and First Amendments. This report briefly examines these issues and sets them in context.
Contributing Partner: UNT Libraries Government Documents Department
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: October 29, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department
Intelligence Issues for Congress

Intelligence Issues for Congress

Date: July 11, 2008
Creator: Best, Richard A., Jr.
Description: This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters.
Contributing Partner: UNT Libraries Government Documents Department
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: March 16, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions

The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions

Date: July 31, 2008
Creator: Reese, Shawn
Description: This report frames potential policy questions concerning the U.S. Secret Service's (USSS) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS).
Contributing Partner: UNT Libraries Government Documents Department
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: January 6, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 3 NEXT LAST