You limited your search to:

 Decade: 2010-2019
 Collection: Congressional Research Service Reports
Sensitive Covert Action Notifications: Oversight Options for Congress

Sensitive Covert Action Notifications: Oversight Options for Congress

Date: April 6, 2011
Creator: Cumming, Alfred
Description: Legislation enacted in 1980 gave the executive branch authority to limit advance notification of especially-sensitive covert actions to eight Members of Congress (called the "Gang of Eight") when the President determines that it is essential to limit prior notice in order to meet extraordinary circumstances affecting U.S. vital interests. This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
Contributing Partner: UNT Libraries Government Documents Department
National Security Letters: Proposals in the 112th Congress

National Security Letters: Proposals in the 112th Congress

Date: February 1, 2011
Creator: Doyle, Charles
Description: This report reprints the text of the five National Security Letter (NSL) statutes as they now appear and as they appeared prior to amendment by the USA PATRIOT Act.
Contributing Partner: UNT Libraries Government Documents Department
National Security Letters: Proposals in the 112th Congress

National Security Letters: Proposals in the 112th Congress

Date: June 30, 2011
Creator: Doyle, Charles
Description: This report reprints the text of the five National Security Letter (NSL) statutes as they now appear and as they appeared prior to amendment by the USA PATRIOT Act (to which form they would be returned under S.1125 and H.R. 1805). NSLs are roughly comparable to administrative subpoenas. Various intelligence agencies use them to demand certain customer information from communications providers, financial institutions, and consumer credit reporting agencies under the Right to Financial Privacy Act, the Fair Credit Reporting Act, the National Security Act, and the Electronic Communications Privacy Act.
Contributing Partner: UNT Libraries Government Documents Department
Paris Attacks and "Going Dark": Intelligence-Related Issues to Consider

Paris Attacks and "Going Dark": Intelligence-Related Issues to Consider

Date: November 19, 2015
Creator: Miles, Anne Daugherty
Description: This report discusses intelligence efforts on tracking numerous individuals involved in the deadly assault in Paris on November 13, 2015.
Contributing Partner: UNT Libraries Government Documents Department
Renewed Crypto Wars?

Renewed Crypto Wars?

Date: February 9, 2016
Creator: Finklea, Kristin
Description: This report briefly examines renewed tensions between tech companies and the government regarding encryption "back doors" and how quickly-advancing technologies could impact law enforcement investigations.
Contributing Partner: UNT Libraries Government Documents Department
The U.S. Intelligence Community: Selected Cross-Cutting Issues

The U.S. Intelligence Community: Selected Cross-Cutting Issues

Date: April 12, 2016
Creator: Miles, Anne D.
Description: This report focuses on cross-cutting management issues that affect the Intelligence Community's (IC's) ability to counter "pervasive and emerging threats" to the United States and balance resources both appropriately and wisely. The Director of National Intelligence (DNI) is charged with integrating the community of intelligence agencies so that they operate effectively as one team.
Contributing Partner: UNT Libraries Government Documents Department
Intelligence Whistleblower Protections: In Brief

Intelligence Whistleblower Protections: In Brief

Date: October 23, 2014
Creator: Perry, Rodney M.
Description: This report describes three sources of Intelligence Community (IC) whistleblower protection including the Intelligence Community Whistleblower Protection Act of 1998 (ICWPA), Presidential Policy Directive 19 (PPD-19), and Title VI of the Intelligence Authorization Act for Fiscal Year 2014 (Title VI). Generally speaking, whistleblowers are those who expose misconduct (e.g., fraud, abuse, or illegal activity) within an organization. In the context of the IC, whistleblowers are generally employees or contractors of federal intelligence agencies who bring to light information on agency wrongdoings.
Contributing Partner: UNT Libraries Government Documents Department
Intelligence Issues for Congress

Intelligence Issues for Congress

Date: July 9, 2010
Creator: Best, Richard A., Jr.
Description: This report discusses the efforts currently underway to improve coordination and encourage better analysis amongst the various agencies within the U.S. Intelligence Community, especially with regard to the ongoing and prominent issue of international terrorism. In particular, this report addresses the false intelligence regarding Iraqi weapons of mass destruction and the current efforts in Iraq and Iran in general.
Contributing Partner: UNT Libraries Government Documents Department
Intelligence Issues for Congress

Intelligence Issues for Congress

Date: August 6, 2010
Creator: Best, Richard A., Jr.
Description: This report discusses the efforts currently underway to improve coordination and encourage better analysis amongst the various agencies within the U.S. Intelligence Community, especially with regard to the ongoing and prominent issue of international terrorism. In particular, this report addresses the false intelligence regarding Iraqi weapons of mass destruction and the current efforts in Iraq and Iran in general.
Contributing Partner: UNT Libraries Government Documents Department
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: March 2, 2010
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department