You limited your search to:

 Collection: Congressional Research Service Reports
Airborne Intelligence, Surveillance and Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs
Among airborne intelligence, surveillance, and reconaissance (ISR) platforms, the U-2 Dragon Lady and the RQ-4A Global Hawk are especially valuable. This report discusses how best to use existing and planned manned and unmanned ISR aircraft to most effectively satisfy the Department of Defense's (Dod) requirements for timely and accurate information on enemy forces. digital.library.unt.edu/ark:/67531/metacrs1354/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs1829/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs8926/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs8448/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5049/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5965/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5964/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs8098/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5055/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5052/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5051/
Domestic Intelligence in the United Kingdom: Applicability of the MI-5 Model to the United States
This paper summarizes pending legislation relating to domestic intelligence, briefly explains the jurisdiction and functions of MI-5, and describes some of the factors that may be relevant to a discussion regarding the applicability of the MI-5 domestic intelligence model to the United States. digital.library.unt.edu/ark:/67531/metacrs5057/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5050/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5054/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5053/
Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches
No Description digital.library.unt.edu/ark:/67531/metacrs9515/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6266/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6372/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6371/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6379/
Intelligence to Counter Terrorism: Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs2505/
Intelligence to Counter Terrorism: Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs2506/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6402/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6401/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6404/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6403/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs8692/
Intelligence to Counter Terrorism: Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs4267/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs9852/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3185/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3182/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3187/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3188/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3184/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3189/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3186/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3183/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs7365/
Cybersecurity: Selected Legal Issues
This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also discusses the degree to which federal law may preempt state law. digital.library.unt.edu/ark:/67531/metadc86609/
National Security Letters: Proposals in the 112th Congress
This report reprints the text of the five National Security Letter (NSL) statutes as they now appear and as they appeared prior to amendment by the USA PATRIOT Act. digital.library.unt.edu/ark:/67531/metadc103116/
Reform of the Foreign Intelligence Surveillance Courts: A Brief Overview
This report discusses the recent disclosures of various National Security Agency (NSA) surveillance and data collection programs that have prompted increased attention on the government's collection of foreign intelligence. digital.library.unt.edu/ark:/67531/metadc284456/
The National Intelligence Council (NIC): Issues and Options for Congress
It is the purpose of this report to describe the statutory provisions that authorize the NIC, provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight. digital.library.unt.edu/ark:/67531/metadc83924/
The Intelligence Appropriations Process: Issues for Congress
The intelligence appropriations process remains complicated and not well understood, but intelligence is an important and sizable part of the federal budget and will undoubtedly be addressed as Congress considers various alternatives for spending. This report reviews the intelligence appropriations process, describes various changes that have been proposed, and analyzes the issues associated with the proposals. digital.library.unt.edu/ark:/67531/metadc83992/
National Security Letters: Proposals in the 112th Congress
This report reprints the text of the five National Security Letter (NSL) statutes as they now appear and as they appeared prior to amendment by the USA PATRIOT Act (to which form they would be returned under S.1125 and H.R. 1805). NSLs are roughly comparable to administrative subpoenas. Various intelligence agencies use them to demand certain customer information from communications providers, financial institutions, and consumer credit reporting agencies under the Right to Financial Privacy Act, the Fair Credit Reporting Act, the National Security Act, and the Electronic Communications Privacy Act. digital.library.unt.edu/ark:/67531/metadc96683/
Sensitive Covert Action Notifications: Oversight Options for Congress
Legislation enacted in 1980 gave the executive branch authority to limit advance notification of especially-sensitive covert actions to eight Members of Congress (called the "Gang of Eight") when the President determines that it is essential to limit prior notice in order to meet extraordinary circumstances affecting U.S. vital interests. This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight. digital.library.unt.edu/ark:/67531/metadc97976/
National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments
This report discusses the National Security Letters (NSLs), which seek customer and consumer transaction information in national security investigations from communications providers, financial institutions, and credit agencies. digital.library.unt.edu/ark:/67531/metadc491001/
Intelligence Authorization Legislation: Status and Challenges
This report assesses the effects of the absence of intelligence authorization legislation subsequent to FY2005 and indicate the substantial but limited effects of the FY2010 Intelligence Authorization Act (P.L. 111-259) digital.library.unt.edu/ark:/67531/metadc462008/
Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches
This report provides a potential conceptual model of how to frame homeland security intelligence (HSINT), including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). Although the HSIC's members are diffused across the nation, they share a common counterterrorism interest. The proliferation of intelligence and information fusion centers across the country indicate that state and local leaders believe there is value to centralizing intelligence gathering and analysis in a manner that assists them in preventing and responding to local manifestations of terrorist threats to their people, infrastructure, and other assets. At the policy and operational levels, the communication and integration of federal HSINT efforts with these state and local fusion centers will likely remain an important priority and future challenge. digital.library.unt.edu/ark:/67531/metadc462063/
Smartphone Data Encryption: A Renewed Boundary for Law Enforcement?
This report briefly examines new issues for law enforcement regarding data encryption and smartphones including cyber-criminals and Apple's new privacy policy that removes the back-doors that law enforcement used to be able to use to access user data. digital.library.unt.edu/ark:/67531/metadc462308/
Reform of the Foreign Intelligence Surveillance Courts: Procedural and Operational Changes
This report begins with an overview of both the FISC and the FISA Court of Review, including the jurisdiction of these courts, how the judges are appointed, and the FISC's practices and procedures for reviewing and issuing surveillance orders. The report then discusses the scope and underlying legal principles behind congressional regulation of the procedures of the federal courts, and applies those principles with respect to the various proposals to reform the FISA judicial review process. digital.library.unt.edu/ark:/67531/metadc462811/