You limited your search to:

 Collection: Congressional Research Service Reports
Digital Surveillance: The Communications Assistance for Law Enforcement Act
The Communications Assistance for Law Enforcement Act (CALEA, P.L. 103- 414, 47 USC 1001-1010), enacted October 25, 1994, is intended to preserve the ability of law enforcement officials to conduct electronic surveillance effectively and efficiently despite the deployment of new digital technologies and wireless services that have altered the character of electronic surveillance. CALEA requires telecommunications carriers to modify their equipment, facilities, and services, wherever reasonably achievable, to ensure that they are able to comply with authorized electronic surveillance actions. digital.library.unt.edu/ark:/67531/metacrs7259/
Intelligence Reform Implementation at the Federal Bureau of Investigation: Issues and Options for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs7797/
Libraries and the USA PATRIOT Act
No Description digital.library.unt.edu/ark:/67531/metacrs7460/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs8098/
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets
This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority. digital.library.unt.edu/ark:/67531/metacrs8458/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs8448/
National Security Letters in Foreign Intelligence Investigations: Legal Background and Recent Amendments
No Description digital.library.unt.edu/ark:/67531/metacrs10850/
National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments
No Description digital.library.unt.edu/ark:/67531/metacrs10849/
Oversight of Dual-Use Biological Research: The National Science Advisory Board for Biosecurity
No Description digital.library.unt.edu/ark:/67531/metacrs9212/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs8692/
Intelligence Reform at the Department of Energy: Policy Issues and Organizational Alternatives
No Description digital.library.unt.edu/ark:/67531/metacrs9170/
Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping
No Description digital.library.unt.edu/ark:/67531/metacrs9218/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs8926/
Digital Surveillance: The Communications Assistance for Law Enforcement Act
The Communications Assistance for Law Enforcement Act (CALEA, P.L. 103- 414, 47 USC 1001-1010), enacted October 25, 1994, is intended to preserve the ability of law enforcement officials to conduct electronic surveillance effectively and efficiently despite the deployment of new digital technologies and wireless services that have altered the character of electronic surveillance. CALEA requires telecommunications carriers to modify their equipment, facilities, and services, wherever reasonably achievable, to ensure that they are able to comply with authorized electronic surveillance actions. digital.library.unt.edu/ark:/67531/metacrs9149/
Government Access to Phone Calling Activity and Related Records: Legal Authorities
No Description digital.library.unt.edu/ark:/67531/metacrs9164/
Intelligence Issues for Congress
To address the challenges facing the U.S. Intelligence Community in the 21st century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis. In December 2004, the Intelligence Reform and Terrorism Prevention Act was signed, providing for a Director of National Intelligence (DNI) with substantial authorities to manage the national intelligence effort. Making cooperation effective presents substantial leadership and managerial challenges. International terrorism in particular presents a difficult analytical challenge. Counterterrorism requires the close coordination of intelligence and law enforcement agencies, but there remain many institutional and procedural issues that complicate cooperation between the two sets of agencies. digital.library.unt.edu/ark:/67531/metacrs10307/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs9479/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs9852/
Department of Veteran Affairs: Information Security and Information Technology Management Reorganization
On May 3, 2006, the home of a Department of Veterans Affairs (VA) data analyst was burglarized, resulting in the theft of a laptop computer and an external data storage device that was reported to contain personal information on more than 26 million veterans and United States military personnel. The VA Secretary testified that he was not informed of the incident until May 16, 2006, almost two weeks after the data had been stolen. VA publicly announced the theft on May 22. On June 29, VA announced that the stolen laptop computer and external hard drive had been recovered intact and that, based on a forensic examination conducted by the Federal Bureau of Investigation (FBI), the files on the external hard drive had not been compromised. digital.library.unt.edu/ark:/67531/metacrs9513/
Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches
No Description digital.library.unt.edu/ark:/67531/metacrs9515/
Terrorist Surveillance Act of 2006: S. 3931 and Title II of S. 3929, the Terrorist Tracking, Identification, and Prosecution Act of 2006
No Description digital.library.unt.edu/ark:/67531/metacrs9565/
Protection of Security-Related Information
No Description digital.library.unt.edu/ark:/67531/metacrs9566/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs10188/
Intelligence Spending: Public Disclosure Issues
This report describes the constituent parts of the intelligence budget, past practice in handling intelligence authorizations and appropriations, the arguments that have been advanced for and against making intelligence spending totals public, a legal analysis of these issues, and a review of the implications of post-Cold War developments on the question. It also describes past congressional interest in keeping intelligence spending totals secret. digital.library.unt.edu/ark:/67531/metadc26040/
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report, to be updated as events dictate, examines other actions and alternatives affecting congressional oversight in the field. digital.library.unt.edu/ark:/67531/metadc463221/
Satellite Surveillance: Domestic Issues
This report provides background on the development of intelligence satellites and identifies the roles various agencies play in their management and use. Issues surrounding the current policy and proposed changes are discussed, including the findings of an Independent Study Group (ISG) with respect to the increased sharing of satellite intelligence data. There follows a discussion of legal considerations, including whether satellite reconnaissance might constitute a "search" within the meaning of the Fourth Amendment; an overview of statutory authorities, as well as restrictions that might apply; and a brief description of executive branch authorities and Department of Defense directives that might apply. The report concludes by suggesting policy issues Congress may consider as it deliberates the potential advantages and pitfalls that may be encountered in expanding the role of satellite intelligence for homeland security purposes. digital.library.unt.edu/ark:/67531/metadc463237/
The Foreign Intelligence Surveillance Act: A Sketch of Selected Issues
This report briefly outlines three issues relating to electronic surveillance under the Foreign Intelligence Surveillance Act (FISA) and touches upon some of the perspectives reflected in the ongoing debate. These issues include the inherent and often dynamic tension between national security and civil liberties, particularly rights of privacy and free speech; the need for the intelligence community to be able to efficiently and effectively collect foreign intelligence information from the communications of foreign persons located outside the United States in a changing, fast-paced, and technologically sophisticated international environment or from United States persons abroad, and the differing approaches suggested to meet this need; and limitations of liability for those electronic communication service providers who furnish aid to the federal government in its foreign intelligence collection. Two constitutional provisions, in particular, are implicated in this debate — the Fourth and First Amendments. This report briefly examines these issues and sets them in context. digital.library.unt.edu/ark:/67531/metadc462237/
Intelligence Issues for Congress
This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters. digital.library.unt.edu/ark:/67531/metadc462342/
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc462764/
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report examines other actions and alternatives affecting congressional oversight in the field. digital.library.unt.edu/ark:/67531/metadc463049/
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc501658/
Covert Action: Legislative Background and Possible Policy Questions
This report examines the statutory procedures governing covert action and associated questions to consider. digital.library.unt.edu/ark:/67531/metadc463117/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc463207/
Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches
This report provides a potential conceptual model of how to frame homeland security intelligence (HSINT), including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). Although the HSIC's members are diffused across the nation, they share a common counterterrorism interest. The proliferation of intelligence and information fusion centers across the country indicate that state and local leaders believe there is value to centralizing intelligence gathering and analysis in a manner that assists them in preventing and responding to local manifestations of terrorist threats to their people, infrastructure, and other assets. At the policy and operational levels, the communication and integration of federal HSINT efforts with these state and local fusion centers will likely remain an important priority and future challenge. digital.library.unt.edu/ark:/67531/metadc462063/
Congress as a Consumer of Intelligence Information
This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address in the 111th Congress. digital.library.unt.edu/ark:/67531/metadc462929/
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc501891/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc462791/
Intelligence Issues for Congress
This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters. digital.library.unt.edu/ark:/67531/metadc26241/
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well. digital.library.unt.edu/ark:/67531/metadc29520/
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider. digital.library.unt.edu/ark:/67531/metadc26250/
Intelligence Issues for Congress
This report discusses the efforts currently underway to improve coordination and encourage better analysis amongst the various agencies within the U.S. Intelligence Community, especially with regard to the ongoing and prominent issue of international terrorism. In particular, this report addresses the false intelligence regarding Iraqi weapons of mass destruction and the current efforts in Iraq and Iran in general. digital.library.unt.edu/ark:/67531/metadc26242/
Sensitive Covert Action Notifications: Oversight Options for Congress
With Congress considering a possible change regarding sensitive covert action policy, this memorandum describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examine both the impact of such notifications on congressional oversight as well as options that Congress might consider to possibly improve oversight. digital.library.unt.edu/ark:/67531/metadc26180/
"Gang of Four" Congressional Intelligence Notifications
"Gang of Four" intelligence notifications generally are oral briefings of certain particularly sensitive non-covert action intelligence activities, including principally, but not exclusively, intelligence collection programs, that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times, but not always, to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. digital.library.unt.edu/ark:/67531/metadc26184/
"Gang of Four" Congressional Intelligence Notifications
This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. digital.library.unt.edu/ark:/67531/metadc463326/
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc501792/
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc501862/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc463446/
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc501871/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc462180/
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well. digital.library.unt.edu/ark:/67531/metadc29519/