Search Results

open access

Intelligence Community Whistleblower Protections: In Brief

Description: This report describes various sources of Intelligence Community (IC) whistleblower protections. Generally speaking, whistleblowers are those who expose misconduct (e.g., fraud, abuse, or illegal activity) within an organization. In the context of the IC, whistleblowers are generally employees or contractors of federal intelligence agencies who bring to light information on agency wrongdoings.
Date: October 18, 2018
Creator: DeVine, Michael E.
Partner: UNT Libraries Government Documents Department
open access

Intelligence Community Spending: Trends and Issues

Description: This report examines Intelligence Community (IC) funding over the past several decades, with an emphasis on the period from 2007-2019--the period in which total National Intelligence Program (NIP) and Military Intelligence Program (MIP) spending dollars have been publicly disclosed on an annual basis. Intelligence-related spending (such as the Homeland Security Intelligence Program) that does not fall within the NIP and MIP is outside the scope of this report.
Date: June 18, 2018
Creator: DeVine, Michael E.
Partner: UNT Libraries Government Documents Department
open access

Intelligence Planning, Programming, Budgeting and Evaluation Process (IPPBE)

Description: This report describes the phases of the Intelligence Planning, Programming, Budgeting and Evaluation Process (IPPBE). The Intelligence Community (IC) uses IPPBE to identify requirements and allocate resources that produce IC capabilities (e.g., human intelligence, signals intelligence, and geospatial intelligence) throughout development and execution of the National Intelligence Program (NIP) and budget. The NIP addresses priorities described in national security-related strategy documents such… more
Date: May 30, 2018
Creator: DeVine, Michael E.
Partner: UNT Libraries Government Documents Department
open access

Covert Action and Clandestine Activities of the Intelligence Community: Selected Notification Requirements in Brief

Description: This report discusses the requirements for notifying Congress of covert action and clandestine activities of the intelligence community and activities of the military. These requirements originated from instances in the 1970s when media disclosure of past intelligence abuses underscored reasons for Congress taking a more active role in oversight. Over time, these requirements were written into statute or became custom.
Date: May 7, 2018
Creator: DeVine, Michael E. & Peters, Heidi M.
Partner: UNT Libraries Government Documents Department
open access

Covert Action and Clandestine Activities of the Intelligence Community: Selected Definitions in Brief

Description: This report provides definitions of clandestine versus covert intelligence activities and discusses what agencies are authorized to undertake which types of intelligence. It also covers military intelligence terms that are different than ones used by civilian government activities.
Date: April 25, 2018
Creator: DeVine, Michael E. & Peters, Heidi M.
Partner: UNT Libraries Government Documents Department
open access

HPSCI Memorandum Sparks Debate Over FISA Application Requirements

Description: This report discusses the Foreign Intelligence Surveillance Act (FISA) and its authority to allow the government to undertake electronic surveillance programs of people suspected of engaging in foreign intelligence activity along with recent debate regarding the issue.
Date: February 14, 2018
Creator: Liu, Edward C.
Partner: UNT Libraries Government Documents Department
open access

The Balkans and Russia

Description: This report discusses relations between Russia and the Balkan countries of southeast Europe. Efforts by Russia to gain influence and hinder the Balkan countries in their relations with the EU through "soft power" and intelligence activities are discussed.
Date: January 31, 2018
Creator: Morelli, Vincent L.
Partner: UNT Libraries Government Documents Department
open access

Memorandum: Summary of the Substantive Provisions of S. 2010, the FISA Amendments Reauthorization Act of 2017 and H.R. 3989, The USA Liberty Act of 2017

Description: This report summarizes the substantive provisions of S. 2010, the FISA Amendments Reauthorization Act of 2017, as reported by the Senate Select Committee on Intelligence on October 25, 2017, and H.R. 3989, the USA Liberty Act of 2017, as ordered to be reported by the House Judiciary Committee on November 8, 2017. Both bills primarily amend and reauthorize Title VII of the Foreign Intelligence Surveillance Act of 1978 (FISA).
Date: November 16, 2017
Creator: Liu, Edward C.
Partner: UNT Libraries Government Documents Department
open access

Intelligence Community Programs, Management, and Enduring Issues

Description: This report explains the management structure for the National Intelligence Program (NIP), and Military Intelligence Program (MIP), to include their two separate budget processes and the roles of the Director of National Intelligence and the Under Secretary of Defense (Intelligence). The concluding section of this report considers the ability of the U.S. government to make the best use of its intelligence-related resources when: (1) total intelligence spending is impossible to calculate; (2) it… more
Date: November 8, 2016
Creator: Daugherty Miles, Anne
Partner: UNT Libraries Government Documents Department
open access

Intelligence Community Spending: Trends and Issues

Description: This report examines Intelligence Community (IC) funding over the past several decades, with an emphasis on the period from 2007-2017--the period in which total national and military intelligence program (NIP and MIP) spending dollars have been publicly disclosed on an annual basis. Intelligence-related spending (such as the Homeland Security Intelligence Program) that does not fall within the NIP and MIP is outside the scope of this report.
Date: November 8, 2016
Creator: Daugherty Miles, Anne
Partner: UNT Libraries Government Documents Department
open access

The U.S. Intelligence Community: Selected Cross-Cutting Issues

Description: This report focuses on cross-cutting management issues that affect the Intelligence Community's (IC's) ability to counter "pervasive and emerging threats" to the United States and balance resources both appropriately and wisely. The Director of National Intelligence (DNI) is charged with integrating the community of intelligence agencies so that they operate effectively as one team.
Date: April 12, 2016
Creator: Miles, Anne D.
Partner: UNT Libraries Government Documents Department
open access

Court-Ordered Access to Smart Phones: In Brief

Description: This report specifically examines certain encryption issues that have been raised in the investigation of the December 2, 2015, terrorist attack in San Bernardino, CA. This report highlights certain issues that policymakers may examine as they follow the ongoing dispute between law enforcement and technology companies, and it focuses on questions related to the government's request.
Date: February 23, 2016
Creator: Finklea, Kristin; Thompson, Richard M., II & Jaikaran, Chris
Partner: UNT Libraries Government Documents Department
open access

Renewed Crypto Wars?

Description: This report briefly examines renewed tensions between tech companies and the government regarding encryption "back doors" and how quickly-advancing technologies could impact law enforcement investigations.
Date: February 9, 2016
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department
open access

The Intelligence Community and Its Use of Contractors: Congressional Oversight Issues

Description: The report examines, from an acquisition perspective, several reasons for interest in the intelligence community's (IC) use of contractors, notably, the types of functions contractors perform, whether the IC's acquisition workforce has the capacity to oversee contractors.
Date: August 18, 2015
Creator: Halchin, L. E.
Partner: UNT Libraries Government Documents Department
open access

Overview of Constitutional Challenges to NSA Collection Activities

Description: This report focuses on two main National Security Agency (NSA) collection activities approved by the Foreign Intelligence Surveillance Court (FISC) established under the Foreign Intelligence Surveillance Act (FISA) of 1978. The first is the bulk collection of telephony metadata for domestic and international telephone calls. The second involves the interception of Internet-based communications.
Date: May 21, 2015
Creator: Liu, Edward C. & Nolan, Andrew
Partner: UNT Libraries Government Documents Department
open access

Selected Issues in Homeland Security Policy for the 114th Congress

Description: This report outlines an array of homeland security issues that may come before the 114th Congress. After a brief discussion of the definitions of homeland security, the homeland security budget, and the role of homeland security actors in the intelligence community, the report divides the specific issues into four broad categories: Counterterrorism and Security Management, Border Security and Trade, Disaster Preparedness, Response, and Recovery, and DHS Management Issues.
Date: May 19, 2015
Creator: Painter, William L.
Partner: UNT Libraries Government Documents Department
open access

Perspectives on the Senate Select Committee on Intelligence (SSCI) Study and Enhanced Interrogation Techniques: In Brief

Description: Much of the discussion and debate following the December release of the Senate Select Committee on Intelligence (SSCI) Study of the Central Intelligence Agency's (CIA's) Detention and Interrogation (D&I) Program (SSCI Study) has focused on the CIA's use of Enhanced Interrogation Techniques (EITs) on certain individuals labeled "high value detainees" (HVDs). This report discusses views expressed by public officials, academics, and commentators in a variety of sources.
Date: May 14, 2015
Creator: Daugherty Miles, Anne
Partner: UNT Libraries Government Documents Department
Back to Top of Screen