You limited your search to:

 Collection: Congressional Research Service Reports
9/11 Commission Recommendations: Intelligence Budget
This report identifies the main recommendations of the 9/11 Commission with respect to the intelligence budget. This report also describes the intelligence budget process under current law to explain the effect of these recommendations and presents the current budget authorities of the Director of Central Intelligence, as well as budget provisions in two bills, S. 2774 and H.R. 5040, that include all Commission recommendations. digital.library.unt.edu/ark:/67531/metacrs5981/
Airborne Intelligence, Surveillance and Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs
Among airborne intelligence, surveillance, and reconaissance (ISR) platforms, the U-2 Dragon Lady and the RQ-4A Global Hawk are especially valuable. This report discusses how best to use existing and planned manned and unmanned ISR aircraft to most effectively satisfy the Department of Defense's (Dod) requirements for timely and accurate information on enemy forces. digital.library.unt.edu/ark:/67531/metacrs1354/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc463419/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc463446/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc462791/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc463207/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc462180/
Arms Shipments to Iran
No Description digital.library.unt.edu/ark:/67531/metacrs9063/
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets
This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority. digital.library.unt.edu/ark:/67531/metacrs8458/
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets
This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority. digital.library.unt.edu/ark:/67531/metacrs1138/
Comparison of 9/11 Commission Recommended Intelligence Reforms, Roberts Draft Bill, H.R. 4104, S. 190, S. 1520, S. 6, H.R. 4584, and Current Law
This report, the first of two reports, presents side-by-side comparisons of the 9/11 Commission recommendations and legislation proposed by Senators Feinstein, Bob Graham, Daschle, and Roberts; and Representatives Harman and Goss, and relevant provisions of current law. A second report (CRS Report RL32601) presents a side-by-side comparison of the 9/11 Commission recommendations and legislation proposed by Senators Collins, Lieberman, and McCain; President Bush; and relevant provisions of current law. digital.library.unt.edu/ark:/67531/metacrs8008/
Comparison of 9/11 Commission Recommended Intelligence Reforms, S. 2845, S. 2774, H.R. 5024, Administration Proposal, H.R. 10, Current Law
This report, the second of two reports, presents side-by-side comparisons of the 9/11 Commission recommendations and current law and legislation proposed by Senators Collins and Lieberman (S. 2845) and unanimously approved by the Senate Governmental Affairs Committee on September 22, 2004, as amended; House Speaker Dennis Hastert (H.R. 10), as reported out be the House Committee on Rules; Senators McCain and Lieberman (S. 2774); Representative Pelosi (H.R. 5024); and President Bush. CRS Report RL32600 presents side-by-side comparisons of the 9/11 Commission recommendations and current law; and legislation proposed by Senators Feinstein, Bob Graham, Daschle, and Roberts; President Bush; and relevant provisions of current law. digital.library.unt.edu/ark:/67531/metacrs5979/
Comparison of 9/11 Commission Recommended Intelligence Reforms, S. 2845, S. 2774, H.R. 5024, Administration Proposal, H.R. 10, Current Law
This report, the second of two reports, presents side-by-side comparisons of the 9/11 Commission recommendations and current law and legislation proposed by Senators Collins and Lieberman (S. 2845) and unanimously approved by the Senate Governmental Affairs Committee on September 22, 2004, as amended; House Speaker Dennis Hastert (H.R. 10), as reported out be the House Committee on Rules; Senators McCain and Lieberman (S. 2774); Representative Pelosi (H.R. 5024); and President Bush. CRS Report RL32600 presents side-by-side comparisons of the 9/11 Commission recommendations and current law; and legislation proposed by Senators Feinstein, Bob Graham, Daschle, and Roberts; President Bush; and relevant provisions of current law. digital.library.unt.edu/ark:/67531/metacrs5980/
Congress as a Consumer of Intelligence Information
This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address in the 111th Congress. digital.library.unt.edu/ark:/67531/metadc462929/
Congress as a Consumer of Intelligence Information
This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address during the second session of the 111th Congress. digital.library.unt.edu/ark:/67531/metadc462949/
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report describes the current select committees on intelligence; characteristics and a model for a possible joint committee; recent actions by Congress; and obstacles affecting legislative oversight in the field. digital.library.unt.edu/ark:/67531/metadc87285/
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report, to be updated as events dictate, describes the current select committees on intelligence; characteristics and a model for a possible joint committee; recent actions by Congress; and obstacles affecting legislative oversight in the field. digital.library.unt.edu/ark:/67531/metadc84042/
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report, to be updated as events dictate, describes the current select committees on intelligence; characteristics and a model for a possible joint committee; recent actions by Congress; and obstacles affecting legislative oversight in the field. digital.library.unt.edu/ark:/67531/metadc86646/
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report examines other actions and alternatives affecting congressional oversight in the field. digital.library.unt.edu/ark:/67531/metadc463049/
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report, to be updated as events dictate, examines other actions and alternatives affecting congressional oversight in the field. digital.library.unt.edu/ark:/67531/metadc463221/
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report describes the Select Committees on Intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. digital.library.unt.edu/ark:/67531/metadc503567/
Consolidating Intelligence Appropriation and Authorization in a Single Committee: 9/11 Commission Recommendation and Alternatives
This report focuses on the commission’s proposal, to consolidate appropriation and authorization functions in the existing Senate and House Select Intelligence Committees. The report (1) describes the proposal; (2) compares it to the existing committee system; (3) describes a 19th century precedent for consolidation; (4) provides selected arguments in favor of consolidation as well as against; (5) discusses two alternatives to consolidating authorization and appropriation functions: a Joint Committee on Intelligence and separate intelligence appropriations subcommittees in the Senate and House Committees on Appropriations; and (6) describes current legislation. digital.library.unt.edu/ark:/67531/metacrs7581/
Counterintelligence Reform at the Department of Energy: Policy Issues and Organizational Alternatives
Lapses in the Department of Energy’s (DOE) security and counterintelligence program have plagued DOE since 1977, when the Department was established through the merger of 40 government organizations, including the Energy Research and Development Administration and the Federal Energy Administration.1 Some policymakers expected the new agency to focus the government’s energy-related enterprises almost solely on the energy crisis. Others saw DOE as an unsuccessful attempt to fuse vastly diverse organizations, many with significantly different, if not conflicting missions. digital.library.unt.edu/ark:/67531/metacrs6267/
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider. digital.library.unt.edu/ark:/67531/metadc84067/
Covert Action: Legislative Background and Possible Policy Questions
This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. It also examines the statutory procedures governing covert action and associated questions to consider. digital.library.unt.edu/ark:/67531/metadc98079/
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider. digital.library.unt.edu/ark:/67531/metadc26250/
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counterterrorism intelligence activities as part of what the Bush Administration termed the global war on terror. Some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congressional intelligence committees. This report examines the legislative background surrounding covert action and poses several related policy questions. digital.library.unt.edu/ark:/67531/metadc461909/
Covert Action: Legislative Background and Possible Policy Questions
This report examines the statutory procedures governing covert action and associated questions to consider. digital.library.unt.edu/ark:/67531/metadc463117/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act. digital.library.unt.edu/ark:/67531/metadc31369/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of recent legislation relevant to the issue as well as some previous efforts to criminalize the unauthorized disclosure of classified information. digital.library.unt.edu/ark:/67531/metadc31474/
Criminal Prohibitions on the Publication of Classified Defense Information
This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of previous legislative efforts to criminalize the unauthorized disclosure of classified information. digital.library.unt.edu/ark:/67531/metadc227681/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of recent legislation relevant to the issue as well as some previous efforts to criminalize the unauthorized disclosure of classified information. digital.library.unt.edu/ark:/67531/metadc93844/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act. digital.library.unt.edu/ark:/67531/metadc93843/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act. digital.library.unt.edu/ark:/67531/metadc29606/
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization Wikileaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. digital.library.unt.edu/ark:/67531/metadc491198/
Cybersecurity: Selected Legal Issues
This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also discusses the degree to which federal law may preempt state law. digital.library.unt.edu/ark:/67531/metadc86609/
The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress
This report provides an overview of the DHS IE both at headquarters and within the components. It examines how DHS IE is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options for Congress to consider on these issues. digital.library.unt.edu/ark:/67531/metadc503324/
Department of Veteran Affairs: Information Security and Information Technology Management Reorganization
On May 3, 2006, the home of a Department of Veterans Affairs (VA) data analyst was burglarized, resulting in the theft of a laptop computer and an external data storage device that was reported to contain personal information on more than 26 million veterans and United States military personnel. The VA Secretary testified that he was not informed of the incident until May 16, 2006, almost two weeks after the data had been stolen. VA publicly announced the theft on May 22. On June 29, VA announced that the stolen laptop computer and external hard drive had been recovered intact and that, based on a forensic examination conducted by the Federal Bureau of Investigation (FBI), the files on the external hard drive had not been compromised. digital.library.unt.edu/ark:/67531/metacrs9513/
Digital Surveillance: The Communications Assistance for Law Enforcement Act
The Communications Assistance for Law Enforcement Act (CALEA, P.L. 103- 414, 47 USC 1001-1010), enacted October 25, 1994, is intended to preserve the ability of law enforcement officials to conduct electronic surveillance effectively and efficiently despite the deployment of new digital technologies and wireless services that have altered the character of electronic surveillance. CALEA requires telecommunications carriers to modify their equipment, facilities, and services, wherever reasonably achievable, to ensure that they are able to comply with authorized electronic surveillance actions. digital.library.unt.edu/ark:/67531/metacrs9149/
Digital Surveillance: The Communications Assistance for Law Enforcement Act
The Communications Assistance for Law Enforcement Act (CALEA, P.L. 103- 414, 47 USC 1001-1010), enacted October 25, 1994, is intended to preserve the ability of law enforcement officials to conduct electronic surveillance effectively and efficiently despite the deployment of new digital technologies and wireless services that have altered the character of electronic surveillance. CALEA requires telecommunications carriers to modify their equipment, facilities, and services, wherever reasonably achievable, to ensure that they are able to comply with authorized electronic surveillance actions. digital.library.unt.edu/ark:/67531/metacrs7259/
The Director of National Intelligence and Intelligence Analysis
The 9/11 Commission made a number of recommendations to improve the quality of intelligence analysis. A key recommendation was the establishment of a Director of National Intelligence (DNI) position to manage the national intelligence effort and serve as the principal intelligence adviser to the President — along with a separate director of the Central Intelligence Agency. Subsequently, the Intelligence Reform and Terrorism Prevention Act of 2004, P.L. 108-458, made the DNI the principal adviser to the President on intelligence and made the DNI responsible for coordinating communitywide intelligence estimates. Some observers note that separating the DNI from the analytical offices may complicate the overall analytical effort. digital.library.unt.edu/ark:/67531/metacrs10109/
Director of National Intelligence: Statutory Authorities
In passing the Intelligence Reform and Terrorism Prevention Act of 2004 (P.L. 108-458) in late 2004, Congress approved the most comprehensive reform of the U.S. Intelligence Community since its establishment over 50 years ago. Principal among enacted changes was the establishment of a new position of the Director of National Intelligence (DNI) to manage the Intelligence Community. Some observers have questioned whether the new statute provides the DNI the necessary authorities to effectively manage the Community. digital.library.unt.edu/ark:/67531/metacrs6269/
Domestic Intelligence in the United Kingdom: Applicability of the MI-5 Model to the United States
This paper summarizes pending legislation relating to domestic intelligence, briefly explains the jurisdiction and functions of MI-5, and describes some of the factors that may be relevant to a discussion regarding the applicability of the MI-5 domestic intelligence model to the United States. digital.library.unt.edu/ark:/67531/metacrs5057/
Encryption Export Controls
This report discusses encryption export controls, beginning with background on the development and use of encryption, and continuing with a description of export controls imposed under the Arms Export Control Act (AECA) and the Export Administration Act (EAA); a discussion of recent federal court rulings in First Amendment challenges to AECA and EAA regulations; and a summary of 106th Congress legislation aimed at liberalizing law and policy affecting encryption exports. digital.library.unt.edu/ark:/67531/metacrs1830/
Encryption Technology: Congressional Issues
This report discusses primarily, the controversy over encryption concerns what access the government should have to encrypted stored computer data or electronic communications (voice and data, wired and wireless) for law enforcement purposes. digital.library.unt.edu/ark:/67531/metacrs728/
FBI Intelligence Reform Since September 11, 2001: Issues and Options for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5967/
FBI Intelligence Reform Since September 11, 2001: Issues and Options for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5968/
The Federal Bureau of Investigation and Terrorism Investigations
This report provides background information on key elements of the FBI terrorism investigative process, based on publicly available information. This report sets forth possible considerations for Congress as it executes its oversight role, including the extent to which intelligence has been integrated into FBI operations to support its counterterrorism mission and the progress the Bureau has made on its intelligence reform initiatives. digital.library.unt.edu/ark:/67531/metadc462980/
The Foreign Intelligence Surveillance Act: A Sketch of Selected Issues
This report briefly outlines three issues relating to electronic surveillance under the Foreign Intelligence Surveillance Act (FISA) and touches upon some of the perspectives reflected in the ongoing debate. These issues include the inherent and often dynamic tension between national security and civil liberties, particularly rights of privacy and free speech; the need for the intelligence community to be able to efficiently and effectively collect foreign intelligence information from the communications of foreign persons located outside the United States in a changing, fast-paced, and technologically sophisticated international environment or from United States persons abroad, and the differing approaches suggested to meet this need; and limitations of liability for those electronic communication service providers who furnish aid to the federal government in its foreign intelligence collection. Two constitutional provisions, in particular, are implicated in this debate — the Fourth and First Amendments. This report briefly examines these issues and sets them in context. digital.library.unt.edu/ark:/67531/metadc462237/
The Foreign Intelligence Surveillance Act: An Overview of the Statutory Framework and Recent Judicial Decisions
No Description digital.library.unt.edu/ark:/67531/metacrs8022/
FIRST PREV 1 2 3 4 5 NEXT LAST