You limited your search to:

 Collection: Congressional Research Service Reports
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report, to be updated as events dictate, describes the current select committees on intelligence; characteristics and a model for a possible joint committee; recent actions by Congress; and obstacles affecting legislative oversight in the field. digital.library.unt.edu/ark:/67531/metadc86646/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc463419/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc463446/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc462791/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc463207/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc462180/
A Joint Committee on Intelligence: Proposals and Options from the 9/11 Commission and Others
This report first describes the current select committees on intelligence and briefly covers the former Joint Committee on Atomic Energy. It then sets forth proposed characteristics for a Joint Committee on Intelligence, their differences, and their pros and cons; it also discusses alternatives for congressional oversight in the field. This report will be updated as events dictate. digital.library.unt.edu/ark:/67531/metacrs5976/
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report examines other actions and alternatives affecting congressional oversight in the field. digital.library.unt.edu/ark:/67531/metadc463049/
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report, to be updated as events dictate, examines other actions and alternatives affecting congressional oversight in the field. digital.library.unt.edu/ark:/67531/metadc463221/
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets
This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority. digital.library.unt.edu/ark:/67531/metacrs8458/
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets
This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority. digital.library.unt.edu/ark:/67531/metacrs1138/
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well. digital.library.unt.edu/ark:/67531/metadc29520/
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well. digital.library.unt.edu/ark:/67531/metadc29519/
Overview of Constitutional Challenges to NSA Collection Activities and Recent Developments
This report focuses on two main National Security Agency (NSA) collection activities approved by the Foreign Intelligence Surveillance Court (FISC) established under the Foreign Intelligence Surveillance Act (FISA) of 1978. The first is the bulk collection of telephony metadata for domestic and international telephone calls. The second involves the interception of Internet-based communications and is targeted at foreigners who are not within the United States, but may also inadvertently acquire the communications of U.S. persons. digital.library.unt.edu/ark:/67531/metadc284472/
Cybersecurity: Selected Legal Issues
This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also discusses the degree to which federal law may preempt state law. digital.library.unt.edu/ark:/67531/metadc86609/
Domestic Intelligence in the United Kingdom: Applicability of the MI-5 Model to the United States
This paper summarizes pending legislation relating to domestic intelligence, briefly explains the jurisdiction and functions of MI-5, and describes some of the factors that may be relevant to a discussion regarding the applicability of the MI-5 domestic intelligence model to the United States. digital.library.unt.edu/ark:/67531/metacrs5057/
Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches
No Description digital.library.unt.edu/ark:/67531/metacrs9515/
9/11 Commission Recommendations: Intelligence Budget
This report identifies the main recommendations of the 9/11 Commission with respect to the intelligence budget. This report also describes the intelligence budget process under current law to explain the effect of these recommendations and presents the current budget authorities of the Director of Central Intelligence, as well as budget provisions in two bills, S. 2774 and H.R. 5040, that include all Commission recommendations. digital.library.unt.edu/ark:/67531/metacrs5981/
Reform of the Foreign Intelligence Surveillance Courts: Procedural and Operational Changes
This report begins with an overview of both the FISC and the FISA Court of Review, including the jurisdiction of these courts, how the judges are appointed, and the FISC's practices and procedures for reviewing and issuing surveillance orders. The report then discusses the scope and underlying legal principles behind congressional regulation of the procedures of the federal courts, and applies those principles with respect to the various proposals to reform the FISA judicial review process. digital.library.unt.edu/ark:/67531/metadc462811/
Encryption Technology: Congressional Issues
This report discusses primarily, the controversy over encryption concerns what access the government should have to encrypted stored computer data or electronic communications (voice and data, wired and wireless) for law enforcement purposes. digital.library.unt.edu/ark:/67531/metacrs728/
Department of Veteran Affairs: Information Security and Information Technology Management Reorganization
On May 3, 2006, the home of a Department of Veterans Affairs (VA) data analyst was burglarized, resulting in the theft of a laptop computer and an external data storage device that was reported to contain personal information on more than 26 million veterans and United States military personnel. The VA Secretary testified that he was not informed of the incident until May 16, 2006, almost two weeks after the data had been stolen. VA publicly announced the theft on May 22. On June 29, VA announced that the stolen laptop computer and external hard drive had been recovered intact and that, based on a forensic examination conducted by the Federal Bureau of Investigation (FBI), the files on the external hard drive had not been compromised. digital.library.unt.edu/ark:/67531/metacrs9513/
Arms Shipments to Iran
No Description digital.library.unt.edu/ark:/67531/metacrs9063/
Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches
This report provides a potential conceptual model of how to frame homeland security intelligence (HSINT), including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). Although the HSIC's members are diffused across the nation, they share a common counterterrorism interest. The proliferation of intelligence and information fusion centers across the country indicate that state and local leaders believe there is value to centralizing intelligence gathering and analysis in a manner that assists them in preventing and responding to local manifestations of terrorist threats to their people, infrastructure, and other assets. At the policy and operational levels, the communication and integration of federal HSINT efforts with these state and local fusion centers will likely remain an important priority and future challenge. digital.library.unt.edu/ark:/67531/metadc462063/
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
The U.S. Secret Service has two missions: criminal investigations and protection. This report looks at the history of the organization and purpose as it relates to Congress. digital.library.unt.edu/ark:/67531/metadc85477/
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc462764/
The U.S. Secret Service: History and Missions
This report discusses potential policy questions concerning the U.S. Secret Service through an examination of the Service's history and its statutory authorities, mission, and present activities within Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc306565/
The U.S. Secret Service: History and Missions
This report discusses potential policy questions concerning the U.S. Secret Service through an examination of the Service's history and its statutory authorities, mission, and present activities within Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc332961/
Secrecy Versus Openness: New Proposed Arrangements for Balancing Competing Needs
No Description digital.library.unt.edu/ark:/67531/metacrs5932/
Secrecy Versus Openness: New Proposed Arrangements for Balancing Competing Needs
No Description digital.library.unt.edu/ark:/67531/metacrs5933/
Security Classification Policy and Procedure: E.O. 12958, as Amended
No Description digital.library.unt.edu/ark:/67531/metacrs6258/
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well. digital.library.unt.edu/ark:/67531/metadc29518/
"Gang of Four" Congressional Intelligence Notifications
Report that reviews the history of the Gang of Four intelligence notification process and compares this procedure with that of the "Gang of Eight" notification procedure. digital.library.unt.edu/ark:/67531/metadc227648/
S.Res. 445: Senate Committee Reorganization for Homeland Security and Intelligence Matters
No Description digital.library.unt.edu/ark:/67531/metacrs5772/
Senate Select Committee on Intelligence: Term Limits and Assignment Limitations
No Description digital.library.unt.edu/ark:/67531/metacrs5982/
Oversight of Dual-Use Biological Research: The National Science Advisory Board for Biosecurity
No Description digital.library.unt.edu/ark:/67531/metacrs9212/
Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping
No Description digital.library.unt.edu/ark:/67531/metacrs9218/
Privacy: An Overview of Federal Statutes Governing Wiretapping and Electronic Eavesdropping
No Description digital.library.unt.edu/ark:/67531/metacrs6982/
Protection of Security-Related Information
No Description digital.library.unt.edu/ark:/67531/metacrs9566/
Consolidating Intelligence Appropriation and Authorization in a Single Committee: 9/11 Commission Recommendation and Alternatives
This report focuses on the commission’s proposal, to consolidate appropriation and authorization functions in the existing Senate and House Select Intelligence Committees. The report (1) describes the proposal; (2) compares it to the existing committee system; (3) describes a 19th century precedent for consolidation; (4) provides selected arguments in favor of consolidation as well as against; (5) discusses two alternatives to consolidating authorization and appropriation functions: a Joint Committee on Intelligence and separate intelligence appropriations subcommittees in the Senate and House Committees on Appropriations; and (6) describes current legislation. digital.library.unt.edu/ark:/67531/metacrs7581/
FIRST PREV 1 2 3 4 NEXT LAST