You limited your search to:

 Collection: Congressional Research Service Reports
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions

The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions

Date: October 3, 2008
Creator: Reese, Shawn
Description: This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS).
Contributing Partner: UNT Libraries Government Documents Department
Covert Action: Legislative Background and Possible Policy Questions

Covert Action: Legislative Background and Possible Policy Questions

Date: December 1, 2008
Creator: Cumming, Alfred
Description: This report examines the statutory procedures governing covert action and associated questions to consider.
Contributing Partner: UNT Libraries Government Documents Department
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: January 6, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department
Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches

Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches

Date: January 14, 2009
Creator: Randol, Mark A.
Description: This report provides a potential conceptual model of how to frame homeland security intelligence (HSINT), including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). Although the HSIC's members are diffused across the nation, they share a common counterterrorism interest. The proliferation of intelligence and information fusion centers across the country indicate that state and local leaders believe there is value to centralizing intelligence gathering and analysis in a manner that assists them in preventing and responding to local manifestations of terrorist threats to their people, infrastructure, and other assets. At the policy and operational levels, the communication and integration of federal HSINT efforts with these state and local fusion centers will likely remain an important priority and future challenge.
Contributing Partner: UNT Libraries Government Documents Department
Congress as a Consumer of Intelligence Information

Congress as a Consumer of Intelligence Information

Date: January 15, 2009
Creator: Cumming, Alfred
Description: This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address in the 111th Congress.
Contributing Partner: UNT Libraries Government Documents Department
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions

The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions

Date: January 23, 2009
Creator: Reese, Shawn
Description: This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS).
Contributing Partner: UNT Libraries Government Documents Department
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Date: March 16, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Contributing Partner: UNT Libraries Government Documents Department
Intelligence Issues for Congress

Intelligence Issues for Congress

Date: April 20, 2009
Creator: Best, Jr., Richard A.
Description: This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters.
Contributing Partner: UNT Libraries Government Documents Department
Security Classification Policy and Procedure: E.O. 12958, as Amended

Security Classification Policy and Procedure: E.O. 12958, as Amended

Date: June 4, 2009
Creator: Kosar, Kevin R.
Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Contributing Partner: UNT Libraries Government Documents Department
Covert Action: Legislative Background and Possible Policy Questions

Covert Action: Legislative Background and Possible Policy Questions

Date: July 6, 2009
Creator: Cumming, Alfred
Description: Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider.
Contributing Partner: UNT Libraries Government Documents Department