You limited your search to:

 Collection: Congressional Research Service Reports
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs1829/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3182/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3183/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3184/
Intelligence to Counter Terrorism: Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs2505/
Intelligence to Counter Terrorism: Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs2506/
Intelligence to Counter Terrorism: Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs4267/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs8098/
Airborne Intelligence, Surveillance and Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs
Among airborne intelligence, surveillance, and reconaissance (ISR) platforms, the U-2 Dragon Lady and the RQ-4A Global Hawk are especially valuable. This report discusses how best to use existing and planned manned and unmanned ISR aircraft to most effectively satisfy the Department of Defense's (Dod) requirements for timely and accurate information on enemy forces. digital.library.unt.edu/ark:/67531/metacrs1354/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5964/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5965/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6266/
Encryption Export Controls
This report discusses encryption export controls, beginning with background on the development and use of encryption, and continuing with a description of export controls imposed under the Arms Export Control Act (AECA) and the Export Administration Act (EAA); a discussion of recent federal court rulings in First Amendment challenges to AECA and EAA regulations; and a summary of 106th Congress legislation aimed at liberalizing law and policy affecting encryption exports. digital.library.unt.edu/ark:/67531/metacrs1830/
Domestic Intelligence in the United Kingdom: Applicability of the MI-5 Model to the United States
This paper summarizes pending legislation relating to domestic intelligence, briefly explains the jurisdiction and functions of MI-5, and describes some of the factors that may be relevant to a discussion regarding the applicability of the MI-5 domestic intelligence model to the United States. digital.library.unt.edu/ark:/67531/metacrs5057/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3185/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3187/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3186/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3188/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs3189/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5049/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5050/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5051/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5052/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5053/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5054/
Intelligence Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs5055/
The National Intelligence Council: Issues and Options for Congress
The purpose of this report to describe the statutory provisions that authorize the National Intelligence Council (NIC), provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight. digital.library.unt.edu/ark:/67531/metadc689155/
National Security Letters in Foreign Intelligence Investigations: Legal Background and Recent Amendments
This report discusses the National Security Letters (NSLs), which seek customer and consumer transaction information in national security investigations from communications providers, financial institutions, and credit agencies. digital.library.unt.edu/ark:/67531/metadc689431/
Sensitive Covert Action Notifications: Oversight Options for Congress
Legislation enacted in 1980 gave the executive branch authority to limit advance notification of especially-sensitive covert actions to eight Members of Congress (called the "Gang of Eight") when the President determines that it is essential to limit prior notice in order to meet extraordinary circumstances affecting U.S. vital interests. This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight. digital.library.unt.edu/ark:/67531/metadc97976/
National Security Letters: Proposals in the 112th Congress
This report reprints the text of the five National Security Letter (NSL) statutes as they now appear and as they appeared prior to amendment by the USA PATRIOT Act. digital.library.unt.edu/ark:/67531/metadc103116/
National Security Letters: Proposals in the 112th Congress
This report reprints the text of the five National Security Letter (NSL) statutes as they now appear and as they appeared prior to amendment by the USA PATRIOT Act (to which form they would be returned under S.1125 and H.R. 1805). NSLs are roughly comparable to administrative subpoenas. Various intelligence agencies use them to demand certain customer information from communications providers, financial institutions, and consumer credit reporting agencies under the Right to Financial Privacy Act, the Fair Credit Reporting Act, the National Security Act, and the Electronic Communications Privacy Act. digital.library.unt.edu/ark:/67531/metadc96683/
The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress
This report provides an overview of Department of Homeland Security Intelligence (DHSI) both at headquarters and within the components. It examines how DHSI is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; and support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options that Congress may consider on certain issues. digital.library.unt.edu/ark:/67531/metadc700796/
The National Intelligence Council: Issues and Options for Congress
This report to describe the statutory provisions that authorize the National Intelligence Council (NIC), provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight. digital.library.unt.edu/ark:/67531/metadc700905/
Intelligence Spending: Public Disclosure Issues
This report describes the constituent parts of the intelligence budget, past practice in handling intelligence authorizations and appropriations, the arguments that have been advanced for and against making intelligence spending totals public, a legal analysis of these issues, and a review of the implications of post-Cold War developments on the question. It also describes past congressional interest in keeping intelligence spending totals secret. digital.library.unt.edu/ark:/67531/metadc26040/
Intelligence Whistleblower Protections: In Brief
This report describes three sources of Intelligence Community (IC) whistleblower protection including the Intelligence Community Whistleblower Protection Act of 1998 (ICWPA), Presidential Policy Directive 19 (PPD-19), and Title VI of the Intelligence Authorization Act for Fiscal Year 2014 (Title VI). Generally speaking, whistleblowers are those who expose misconduct (e.g., fraud, abuse, or illegal activity) within an organization. In the context of the IC, whistleblowers are generally employees or contractors of federal intelligence agencies who bring to light information on agency wrongdoings. digital.library.unt.edu/ark:/67531/metadc491255/
Intelligence Issues for Congress
This report discusses the efforts currently underway to improve coordination and encourage better analysis amongst the various agencies within the U.S. Intelligence Community, especially with regard to the ongoing and prominent issue of international terrorism. In particular, this report addresses the false intelligence regarding Iraqi weapons of mass destruction and the current efforts in Iraq and Iran in general. digital.library.unt.edu/ark:/67531/metadc491123/
Intelligence Issues for Congress
This report discusses the efforts currently underway to improve coordination and encourage better analysis amongst the various agencies within the U.S. Intelligence Community, especially with regard to the ongoing and prominent issue of international terrorism. In particular, this report addresses the false intelligence regarding Iraqi weapons of mass destruction and the current efforts in Iraq and Iran in general. digital.library.unt.edu/ark:/67531/metadc491308/
The Foreign Intelligence Surveillance Act: A Sketch of Selected Issues
This report briefly outlines three issues relating to electronic surveillance under the Foreign Intelligence Surveillance Act (FISA) and touches upon some of the perspectives reflected in the ongoing debate. These issues include the inherent and often dynamic tension between national security and civil liberties, particularly rights of privacy and free speech; the need for the intelligence community to be able to efficiently and effectively collect foreign intelligence information from the communications of foreign persons located outside the United States in a changing, fast-paced, and technologically sophisticated international environment or from United States persons abroad, and the differing approaches suggested to meet this need; and limitations of liability for those electronic communication service providers who furnish aid to the federal government in its foreign intelligence collection. Two constitutional provisions, in particular, are implicated in this debate — the Fourth and First Amendments. This report briefly examines these issues and sets them in context. digital.library.unt.edu/ark:/67531/metadc462237/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc463419/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc463446/
Intelligence Issues for Congress
This report gives an overview of current intelligence issues of interest to the 112th Congress. It includes background and analysis including most recent development, ongoing Congressional concerns, specific issues for the 112th Congress, and a summary of related legislation from the 109th through the 112th Congresses. digital.library.unt.edu/ark:/67531/metadc462371/
Intelligence Issues for Congress
This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters. digital.library.unt.edu/ark:/67531/metadc462342/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc462791/
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc462764/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc463207/
"Gang of Four" Congressional Intelligence Notifications
This report reviews the history of the Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. The "Gang of Eight" procedure is statutorily based and provides that the chairmen and ranking Members of the intelligence committee, along with the Speaker and minority leader of the House, and Senate majority and minority leaders--rather than the full membership of the intelligence committees-- are to receive prior notice of particularly sensitive covert action programs, if the President determines that limited access to such programs is essential to meet extraordinary circumstances affecting vital U.S. interests. digital.library.unt.edu/ark:/67531/metadc463194/
Intelligence, Surveillance, and Reconnaissance (ISR) Acquisition: Issues for Congress
This report discusses Congressional issues regarding Intelligence, Surveillance, and Reconnaissance (ISR) systems, which are integral components of both national policymaking and military operations, including counterterrorism operations. ISR systems are costly and complicated, and the relationships among organizations responsible for designing and operating these systems are equally complicated. digital.library.unt.edu/ark:/67531/metadc463134/
Sensitive Covert Action Notifications: Oversight Options for Congress
This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight. digital.library.unt.edu/ark:/67531/metadc463114/
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc462180/
Congress as a Consumer of Intelligence Information
This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address in the 111th Congress. digital.library.unt.edu/ark:/67531/metadc462929/