You limited your search to:

 Decade: 2000-2009
 Collection: Congressional Research Service Reports
9/11 Commission Recommendations: Intelligence Budget

9/11 Commission Recommendations: Intelligence Budget

Date: September 27, 2004
Creator: Nicola, Thomas J.
Description: This report identifies the main recommendations of the 9/11 Commission with respect to the intelligence budget. This report also describes the intelligence budget process under current law to explain the effect of these recommendations and presents the current budget authorities of the Director of Central Intelligence, as well as budget provisions in two bills, S. 2774 and H.R. 5040, that include all Commission recommendations.
Contributing Partner: UNT Libraries Government Documents Department
Airborne Intelligence, Surveillance and Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs

Airborne Intelligence, Surveillance and Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs

Date: December 1, 2000
Creator: Best Jr., Richard A & Bolkcom, Christopher
Description: Among airborne intelligence, surveillance, and reconaissance (ISR) platforms, the U-2 Dragon Lady and the RQ-4A Global Hawk are especially valuable. This report discusses how best to use existing and planned manned and unmanned ISR aircraft to most effectively satisfy the Department of Defense's (Dod) requirements for timely and accurate information on enemy forces.
Contributing Partner: UNT Libraries Government Documents Department
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: October 29, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: March 16, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: January 6, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: December 23, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets

China: Suspected Acquisition of U.S. Nuclear Weapon Secrets

Date: February 1, 2006
Creator: Kan, Shirley A
Description: This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
Contributing Partner: UNT Libraries Government Documents Department
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets

China: Suspected Acquisition of U.S. Nuclear Weapon Secrets

Date: December 20, 2000
Creator: Kan, Shirley A
Description: This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
Contributing Partner: UNT Libraries Government Documents Department
Comparison of 9/11 Commission Recommended Intelligence Reforms, Roberts Draft Bill, H.R. 4104, S. 190, S. 1520, S. 6, H.R. 4584, and Current Law

Comparison of 9/11 Commission Recommended Intelligence Reforms, Roberts Draft Bill, H.R. 4104, S. 190, S. 1520, S. 6, H.R. 4584, and Current Law

Date: October 6, 2004
Creator: Cumming, Alfred
Description: This report, the first of two reports, presents side-by-side comparisons of the 9/11 Commission recommendations and legislation proposed by Senators Feinstein, Bob Graham, Daschle, and Roberts; and Representatives Harman and Goss, and relevant provisions of current law. A second report (CRS Report RL32601) presents a side-by-side comparison of the 9/11 Commission recommendations and legislation proposed by Senators Collins, Lieberman, and McCain; President Bush; and relevant provisions of current law.
Contributing Partner: UNT Libraries Government Documents Department
Comparison of 9/11 Commission Recommended Intelligence Reforms, S. 2845, S. 2774, H.R. 5024, Administration Proposal, H.R. 10, Current Law

Comparison of 9/11 Commission Recommended Intelligence Reforms, S. 2845, S. 2774, H.R. 5024, Administration Proposal, H.R. 10, Current Law

Date: September 28, 2004
Creator: Cumming, Alfred
Description: This report, the second of two reports, presents side-by-side comparisons of the 9/11 Commission recommendations and current law and legislation proposed by Senators Collins and Lieberman (S. 2845) and unanimously approved by the Senate Governmental Affairs Committee on September 22, 2004, as amended; House Speaker Dennis Hastert (H.R. 10), as reported out be the House Committee on Rules; Senators McCain and Lieberman (S. 2774); Representative Pelosi (H.R. 5024); and President Bush. CRS Report RL32600 presents side-by-side comparisons of the 9/11 Commission recommendations and current law; and legislation proposed by Senators Feinstein, Bob Graham, Daschle, and Roberts; President Bush; and relevant provisions of current law.
Contributing Partner: UNT Libraries Government Documents Department
Comparison of 9/11 Commission Recommended Intelligence Reforms, S. 2845, S. 2774, H.R. 5024, Administration Proposal, H.R. 10, Current Law

Comparison of 9/11 Commission Recommended Intelligence Reforms, S. 2845, S. 2774, H.R. 5024, Administration Proposal, H.R. 10, Current Law

Date: October 6, 2004
Creator: Cumming, Alfred
Description: This report, the second of two reports, presents side-by-side comparisons of the 9/11 Commission recommendations and current law and legislation proposed by Senators Collins and Lieberman (S. 2845) and unanimously approved by the Senate Governmental Affairs Committee on September 22, 2004, as amended; House Speaker Dennis Hastert (H.R. 10), as reported out be the House Committee on Rules; Senators McCain and Lieberman (S. 2774); Representative Pelosi (H.R. 5024); and President Bush. CRS Report RL32600 presents side-by-side comparisons of the 9/11 Commission recommendations and current law; and legislation proposed by Senators Feinstein, Bob Graham, Daschle, and Roberts; President Bush; and relevant provisions of current law.
Contributing Partner: UNT Libraries Government Documents Department
Congress as a Consumer of Intelligence Information

Congress as a Consumer of Intelligence Information

Date: January 15, 2009
Creator: Cumming, Alfred
Description: This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address in the 111th Congress.
Contributing Partner: UNT Libraries Government Documents Department
Congressional Oversight of Intelligence: Current Structure and Alternatives

Congressional Oversight of Intelligence: Current Structure and Alternatives

Date: September 16, 2008
Creator: Kaiser, Frederick M.
Description: This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report examines other actions and alternatives affecting congressional oversight in the field.
Contributing Partner: UNT Libraries Government Documents Department
Congressional Oversight of Intelligence: Current Structure and Alternatives

Congressional Oversight of Intelligence: Current Structure and Alternatives

Date: May 9, 2008
Creator: Kaiser, Frederick M.
Description: This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report, to be updated as events dictate, examines other actions and alternatives affecting congressional oversight in the field.
Contributing Partner: UNT Libraries Government Documents Department
Consolidating Intelligence Appropriation and Authorization in a Single Committee: 9/11 Commission Recommendation and Alternatives

Consolidating Intelligence Appropriation and Authorization in a Single Committee: 9/11 Commission Recommendation and Alternatives

Date: October 29, 2004
Creator: Streeter, Sandy
Description: This report focuses on the commission’s proposal, to consolidate appropriation and authorization functions in the existing Senate and House Select Intelligence Committees. The report (1) describes the proposal; (2) compares it to the existing committee system; (3) describes a 19th century precedent for consolidation; (4) provides selected arguments in favor of consolidation as well as against; (5) discusses two alternatives to consolidating authorization and appropriation functions: a Joint Committee on Intelligence and separate intelligence appropriations subcommittees in the Senate and House Committees on Appropriations; and (6) describes current legislation.
Contributing Partner: UNT Libraries Government Documents Department
Counterintelligence Reform at the Department of Energy: Policy Issues and Organizational Alternatives

Counterintelligence Reform at the Department of Energy: Policy Issues and Organizational Alternatives

Date: March 8, 2005
Creator: Cumming, Alfred
Description: Lapses in the Department of Energy’s (DOE) security and counterintelligence program have plagued DOE since 1977, when the Department was established through the merger of 40 government organizations, including the Energy Research and Development Administration and the Federal Energy Administration.1 Some policymakers expected the new agency to focus the government’s energy-related enterprises almost solely on the energy crisis. Others saw DOE as an unsuccessful attempt to fuse vastly diverse organizations, many with significantly different, if not conflicting missions.
Contributing Partner: UNT Libraries Government Documents Department
Covert Action: Legislative Background and Possible Policy Questions

Covert Action: Legislative Background and Possible Policy Questions

Date: December 1, 2008
Creator: Cumming, Alfred
Description: This report examines the statutory procedures governing covert action and associated questions to consider.
Contributing Partner: UNT Libraries Government Documents Department
Covert Action: Legislative Background and Possible Policy Questions

Covert Action: Legislative Background and Possible Policy Questions

Date: July 6, 2009
Creator: Cumming, Alfred
Description: Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider.
Contributing Partner: UNT Libraries Government Documents Department
Covert Action: Legislative Background and Possible Policy Questions

Covert Action: Legislative Background and Possible Policy Questions

Date: February 9, 2009
Creator: Cumming, Alfred
Description: This report examines the statutory procedures governing covert action and associated questions to consider. Published reports have suggested that the Pentagon has expanded its counter-terrorism intelligence activities, and some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congressional intelligence committees.
Contributing Partner: UNT Libraries Government Documents Department
The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

Date: May 27, 2009
Creator: Randol, Mark A.
Description: This report provides an overview of Department of Homeland Security Intelligence (DHSI) both at headquarters and within the components. It examines how DHSI is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; and support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options that Congress may consider on certain issues.
Contributing Partner: UNT Libraries Government Documents Department
Department of Veteran Affairs: Information Security and Information Technology Management Reorganization

Department of Veteran Affairs: Information Security and Information Technology Management Reorganization

Date: August 14, 2006
Creator: Panangala, Sidath Viranga
Description: On May 3, 2006, the home of a Department of Veterans Affairs (VA) data analyst was burglarized, resulting in the theft of a laptop computer and an external data storage device that was reported to contain personal information on more than 26 million veterans and United States military personnel. The VA Secretary testified that he was not informed of the incident until May 16, 2006, almost two weeks after the data had been stolen. VA publicly announced the theft on May 22. On June 29, VA announced that the stolen laptop computer and external hard drive had been recovered intact and that, based on a forensic examination conducted by the Federal Bureau of Investigation (FBI), the files on the external hard drive had not been compromised.
Contributing Partner: UNT Libraries Government Documents Department
Digital Surveillance: The Communications Assistance for Law Enforcement Act

Digital Surveillance: The Communications Assistance for Law Enforcement Act

Date: August 3, 2005
Creator: Figliola, Patricia Moloney
Description: The Communications Assistance for Law Enforcement Act (CALEA, P.L. 103- 414, 47 USC 1001-1010), enacted October 25, 1994, is intended to preserve the ability of law enforcement officials to conduct electronic surveillance effectively and efficiently despite the deployment of new digital technologies and wireless services that have altered the character of electronic surveillance. CALEA requires telecommunications carriers to modify their equipment, facilities, and services, wherever reasonably achievable, to ensure that they are able to comply with authorized electronic surveillance actions.
Contributing Partner: UNT Libraries Government Documents Department
Digital Surveillance: The Communications Assistance for Law Enforcement Act

Digital Surveillance: The Communications Assistance for Law Enforcement Act

Date: May 10, 2006
Creator: Figliola, Patricia Moloney
Description: The Communications Assistance for Law Enforcement Act (CALEA, P.L. 103- 414, 47 USC 1001-1010), enacted October 25, 1994, is intended to preserve the ability of law enforcement officials to conduct electronic surveillance effectively and efficiently despite the deployment of new digital technologies and wireless services that have altered the character of electronic surveillance. CALEA requires telecommunications carriers to modify their equipment, facilities, and services, wherever reasonably achievable, to ensure that they are able to comply with authorized electronic surveillance actions.
Contributing Partner: UNT Libraries Government Documents Department
The Director of National Intelligence and Intelligence Analysis

The Director of National Intelligence and Intelligence Analysis

Date: February 11, 2005
Creator: Best Jr., Richard A
Description: The 9/11 Commission made a number of recommendations to improve the quality of intelligence analysis. A key recommendation was the establishment of a Director of National Intelligence (DNI) position to manage the national intelligence effort and serve as the principal intelligence adviser to the President — along with a separate director of the Central Intelligence Agency. Subsequently, the Intelligence Reform and Terrorism Prevention Act of 2004, P.L. 108-458, made the DNI the principal adviser to the President on intelligence and made the DNI responsible for coordinating communitywide intelligence estimates. Some observers note that separating the DNI from the analytical offices may complicate the overall analytical effort.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 3 4 5 NEXT LAST