You limited your search to:

 Collection: Congressional Research Service Reports
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: December 23, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department
A Joint Committee on Intelligence: Proposals and Options from the 9/11 Commission and Others

A Joint Committee on Intelligence: Proposals and Options from the 9/11 Commission and Others

Date: August 25, 2004
Creator: Kaiser, Frederick M
Description: This report first describes the current select committees on intelligence and briefly covers the former Joint Committee on Atomic Energy. It then sets forth proposed characteristics for a Joint Committee on Intelligence, their differences, and their pros and cons; it also discusses alternatives for congressional oversight in the field. This report will be updated as events dictate.
Contributing Partner: UNT Libraries Government Documents Department
Congressional Oversight of Intelligence: Current Structure and Alternatives

Congressional Oversight of Intelligence: Current Structure and Alternatives

Date: September 16, 2008
Creator: Kaiser, Frederick M.
Description: This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report examines other actions and alternatives affecting congressional oversight in the field.
Contributing Partner: UNT Libraries Government Documents Department
Congressional Oversight of Intelligence: Current Structure and Alternatives

Congressional Oversight of Intelligence: Current Structure and Alternatives

Date: May 9, 2008
Creator: Kaiser, Frederick M.
Description: This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report, to be updated as events dictate, examines other actions and alternatives affecting congressional oversight in the field.
Contributing Partner: UNT Libraries Government Documents Department
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets

China: Suspected Acquisition of U.S. Nuclear Weapon Secrets

Date: February 1, 2006
Creator: Kan, Shirley A
Description: This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
Contributing Partner: UNT Libraries Government Documents Department
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets

China: Suspected Acquisition of U.S. Nuclear Weapon Secrets

Date: December 20, 2000
Creator: Kan, Shirley A
Description: This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
Contributing Partner: UNT Libraries Government Documents Department
Security Classification Policy and Procedure: E.O. 12958, as Amended

Security Classification Policy and Procedure: E.O. 12958, as Amended

Date: June 4, 2009
Creator: Kosar, Kevin R.
Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Contributing Partner: UNT Libraries Government Documents Department
Security Classification Policy and Procedure: E.O. 12958, as Amended

Security Classification Policy and Procedure: E.O. 12958, as Amended

Date: December 31, 2009
Creator: Kosar, Kevin R.
Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Contributing Partner: UNT Libraries Government Documents Department
Overview of Constitutional Challenges to NSA Collection Activities and Recent Developments

Overview of Constitutional Challenges to NSA Collection Activities and Recent Developments

Date: April 1, 2014
Creator: Liu, Edward C.; Nolan, Andrew & Thompson, Richard M., II
Description: This report focuses on two main National Security Agency (NSA) collection activities approved by the Foreign Intelligence Surveillance Court (FISC) established under the Foreign Intelligence Surveillance Act (FISA) of 1978. The first is the bulk collection of telephony metadata for domestic and international telephone calls. The second involves the interception of Internet-based communications and is targeted at foreigners who are not within the United States, but may also inadvertently acquire the communications of U.S. persons.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Selected Legal Issues

Cybersecurity: Selected Legal Issues

Date: March 14, 2012
Creator: Liu, Edward, C.; Stevens, Gina; Ruane, Kathleen Ann; Dolan, Alissa M. & Thompson, Richard M. II
Description: This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also discusses the degree to which federal law may preempt state law.
Contributing Partner: UNT Libraries Government Documents Department