You limited your search to:

 Collection: Congressional Research Service Reports
Security Classification Policy and Procedure: E.O. 12958, as Amended

Security Classification Policy and Procedure: E.O. 12958, as Amended

Date: December 31, 2009
Creator: Kosar, Kevin R.
Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Contributing Partner: UNT Libraries Government Documents Department
Overview of Constitutional Challenges to NSA Collection Activities and Recent Developments

Overview of Constitutional Challenges to NSA Collection Activities and Recent Developments

Date: April 1, 2014
Creator: Liu, Edward C.; Nolan, Andrew & Thompson, Richard M., II
Description: This report focuses on two main National Security Agency (NSA) collection activities approved by the Foreign Intelligence Surveillance Court (FISC) established under the Foreign Intelligence Surveillance Act (FISA) of 1978. The first is the bulk collection of telephony metadata for domestic and international telephone calls. The second involves the interception of Internet-based communications and is targeted at foreigners who are not within the United States, but may also inadvertently acquire the communications of U.S. persons.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Selected Legal Issues

Cybersecurity: Selected Legal Issues

Date: March 14, 2012
Creator: Liu, Edward, C.; Stevens, Gina; Ruane, Kathleen Ann; Dolan, Alissa M. & Thompson, Richard M. II
Description: This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also discusses the degree to which federal law may preempt state law.
Contributing Partner: UNT Libraries Government Documents Department
Domestic Intelligence in the United Kingdom: Applicability of the MI-5 Model to the United States

Domestic Intelligence in the United Kingdom: Applicability of the MI-5 Model to the United States

Date: May 19, 2003
Creator: Masse, Todd M
Description: This paper summarizes pending legislation relating to domestic intelligence, briefly explains the jurisdiction and functions of MI-5, and describes some of the factors that may be relevant to a discussion regarding the applicability of the MI-5 domestic intelligence model to the United States.
Contributing Partner: UNT Libraries Government Documents Department
Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches

Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches

Date: August 18, 2006
Creator: Masse, Todd M
Description: None
Contributing Partner: UNT Libraries Government Documents Department
9/11 Commission Recommendations: Intelligence Budget

9/11 Commission Recommendations: Intelligence Budget

Date: September 27, 2004
Creator: Nicola, Thomas J.
Description: This report identifies the main recommendations of the 9/11 Commission with respect to the intelligence budget. This report also describes the intelligence budget process under current law to explain the effect of these recommendations and presents the current budget authorities of the Director of Central Intelligence, as well as budget provisions in two bills, S. 2774 and H.R. 5040, that include all Commission recommendations.
Contributing Partner: UNT Libraries Government Documents Department
Encryption Technology: Congressional Issues

Encryption Technology: Congressional Issues

Date: July 9, 1998
Creator: Nunno, Richard M
Description: This report discusses primarily, the controversy over encryption concerns what access the government should have to encrypted stored computer data or electronic communications (voice and data, wired and wireless) for law enforcement purposes.
Contributing Partner: UNT Libraries Government Documents Department
Department of Veteran Affairs: Information Security and Information Technology Management Reorganization

Department of Veteran Affairs: Information Security and Information Technology Management Reorganization

Date: August 14, 2006
Creator: Panangala, Sidath Viranga
Description: On May 3, 2006, the home of a Department of Veterans Affairs (VA) data analyst was burglarized, resulting in the theft of a laptop computer and an external data storage device that was reported to contain personal information on more than 26 million veterans and United States military personnel. The VA Secretary testified that he was not informed of the incident until May 16, 2006, almost two weeks after the data had been stolen. VA publicly announced the theft on May 22. On June 29, VA announced that the stolen laptop computer and external hard drive had been recovered intact and that, based on a forensic examination conducted by the Federal Bureau of Investigation (FBI), the files on the external hard drive had not been compromised.
Contributing Partner: UNT Libraries Government Documents Department
Arms Shipments to Iran

Arms Shipments to Iran

Date: April 3, 1987
Creator: Preece, Richard M
Description: None
Contributing Partner: UNT Libraries Government Documents Department
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions

The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions

Date: April 16, 2012
Creator: Reese, Shawn
Description: The U.S. Secret Service has two missions: criminal investigations and protection. This report looks at the history of the organization and purpose as it relates to Congress.
Contributing Partner: UNT Libraries Government Documents Department