Search Results

Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Government Collection of Private Information: Background and Issues Related to the USA PATRIOT Act Reauthorization
This report discusses the history of constitutional interpretations and legislative responses relevant to the collection of private information for criminal investigation, foreign intelligence gathering, and national security purposes.
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS).
Government Collection of Private Information: Background and Issues Related to the USA PATRIOT Act Reauthorization
This report discusses the history of constitutional interpretations and legislative responses relevant to the collection of private information for criminal investigation, foreign intelligence gathering, and national security purposes.
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS).
"Gang of Four" Congressional Intelligence Notifications
This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Sensitive Covert Action Notifications: Oversight Options for Congress
This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
Intelligence Issues for Congress
This report discusses the efforts currently underway to improve coordination and encourage better analysis amongst the various agencies within the U.S. Intelligence Community, especially with regard to the ongoing and prominent issue of international terrorism. In particular, this report addresses the false intelligence regarding Iraqi weapons of mass destruction and the current efforts in Iraq and Iran in general.
National Security Letters in Foreign Intelligence Investigations: Legal Background and Recent Amendments
This report discusses the National Security Letters (NSLs), which seek customer and consumer transaction information in national security investigations from communications providers, financial institutions, and credit agencies.
The National Intelligence Council: Issues and Options for Congress
The purpose of this report to describe the statutory provisions that authorize the National Intelligence Council (NIC), provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight.
Intelligence Authorization Legislation: Status and Challenges
This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities.
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS).
Sensitive Covert Action Notifications: Oversight Options for Congress
This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
"Gang of Four" Congressional Intelligence Notifications
This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
"Gang of Four" Congressional Intelligence Notifications
"Gang of Four" intelligence notifications generally are oral briefings of certain particularly sensitive non-covert action intelligence activities, including principally, but not exclusively, intelligence collection programs, that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times, but not always, to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Sensitive Covert Action Notifications: Oversight Options for Congress
With Congress considering a possible change regarding sensitive covert action policy, this memorandum describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examine both the impact of such notifications on congressional oversight as well as options that Congress might consider to possibly improve oversight.
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider.
Intelligence Issues for Congress
This report discusses the efforts currently underway to improve coordination and encourage better analysis amongst the various agencies within the U.S. Intelligence Community, especially with regard to the ongoing and prominent issue of international terrorism. In particular, this report addresses the false intelligence regarding Iraqi weapons of mass destruction and the current efforts in Iraq and Iran in general.
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress
This report provides an overview of Department of Homeland Security Intelligence (DHSI) both at headquarters and within the components. It examines how DHSI is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; and support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options that Congress may consider on certain issues.
Intelligence Issues for Congress
This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters.
The National Intelligence Council: Issues and Options for Congress
This report to describe the statutory provisions that authorize the National Intelligence Council (NIC), provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight.
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Intelligence Authorization Legislation: Status and Challenges
This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities.
Covert Action: Legislative Background and Possible Policy Questions
This report examines the statutory procedures governing covert action and associated questions to consider. Published reports have suggested that the Pentagon has expanded its counter-terrorism intelligence activities, and some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congressional intelligence committees.
Government Access to Phone Calling Activity and Related Records: Legal Authorities
This report summarizes legal authorities regarding access by the government, for either foreign intelligence or law enforcement purposes, to information related to telephone calling patterns or practices. Where pertinent, it also discusses statutory prohibitions against accessing or disclosing such information, along with relevant exceptions to those prohibitions.
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS).
Congress as a Consumer of Intelligence Information
This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address in the 111th Congress.
Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches
This report provides a potential conceptual model of how to frame homeland security intelligence (HSINT), including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). Although the HSIC's members are diffused across the nation, they share a common counterterrorism interest. The proliferation of intelligence and information fusion centers across the country indicate that state and local leaders believe there is value to centralizing intelligence gathering and analysis in a manner that assists them in preventing and responding to local manifestations of terrorist threats to their people, infrastructure, and other assets. At the policy and operational levels, the communication and integration of federal HSINT efforts with these state and local fusion centers will likely remain an important priority and future challenge.
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Covert Action: Legislative Background and Possible Policy Questions
This report examines the statutory procedures governing covert action and associated questions to consider.
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS).
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report examines other actions and alternatives affecting congressional oversight in the field.
The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions
This report frames potential policy questions concerning the U.S. Secret Service's (USSS) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS).
Intelligence Issues for Congress
This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters.
The Foreign Intelligence Surveillance Act: A Sketch of Selected Issues
This report briefly outlines three issues relating to electronic surveillance under the Foreign Intelligence Surveillance Act (FISA) and touches upon some of the perspectives reflected in the ongoing debate. These issues include the inherent and often dynamic tension between national security and civil liberties, particularly rights of privacy and free speech; the need for the intelligence community to be able to efficiently and effectively collect foreign intelligence information from the communications of foreign persons located outside the United States in a changing, fast-paced, and technologically sophisticated international environment or from United States persons abroad, and the differing approaches suggested to meet this need; and limitations of liability for those electronic communication service providers who furnish aid to the federal government in its foreign intelligence collection. Two constitutional provisions, in particular, are implicated in this debate — the Fourth and First Amendments. This report briefly examines these issues and sets them in context.
The Foreign Intelligence Surveillance Act: An Overview of Selected Issues
This report briefly outlines some of the perspectives reflected in the ongoing debate related to the Foreign Intelligence Surveillance Act (FISA) focusing on three issues: tension between national security and civil liberties, collection of foreign intelligence information from foreign persons, and limitations on liability for telecommunications providers furnishing aid to the government.
Satellite Surveillance: Domestic Issues
This report provides background on the development of intelligence satellites and identifies the roles various agencies play in their management and use. Issues surrounding the current policy and proposed changes are discussed, including the findings of an Independent Study Group (ISG) with respect to the increased sharing of satellite intelligence data. There follows a discussion of legal considerations, including whether satellite reconnaissance might constitute a "search" within the meaning of the Fourth Amendment; an overview of statutory authorities, as well as restrictions that might apply; and a brief description of executive branch authorities and Department of Defense directives that might apply. The report concludes by suggesting policy issues Congress may consider as it deliberates the potential advantages and pitfalls that may be encountered in expanding the role of satellite intelligence for homeland security purposes.
The Foreign Intelligence Surveillance Act: Comparison of the Senate Amendment to H.R. 3773 and the House Amendment to the Senate Amendment to H.R. 3773
This report provides an overview and review of legislative activity related to the Foreign Intelligence Surveillance Act (FISA). It also includes a detailed side-by-side comparison of the proposals to address FISA concerns: Senate Amendment to H.R. 3773 and the House Amendment to the Senate Amendment to H.R. 3773.
Intelligence Issues for Congress
This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters.
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report, to be updated as events dictate, examines other actions and alternatives affecting congressional oversight in the field.
Digital Surveillance: The Communications Assistance for Law Enforcement Act
This report provides a brief overview of the communications assistance for Law Enforcement Act.
The Foreign Intelligence Surveillance Act: An Overview of the Statutory Framework and U.S. Foreign Intelligence Surveillance Court and U.S. Foreign Intelligence Surveillance Court of Review Decisions
This report discusses the Foreign Intelligence Surveillance Act (FISA), the USA PATRIOT Act of 2001, and other related amendments that were included in the Intelligence Authorization Act for Fiscal Year 2002.
Intelligence Spending: Public Disclosure Issues
This report describes the constituent parts of the intelligence budget, past practice in handling intelligence authorizations and appropriations, the arguments that have been advanced for and against making intelligence spending totals public, a legal analysis of these issues, and a review of the implications of post-Cold War developments on the question. It also describes past congressional interest in keeping intelligence spending totals secret.
Intelligence Issues for Congress
This report discusses legislative initiatives to address the challenges facing the U.S. Intelligence Community in the 21st century.
Protection of Security-Related Information
No Description Available.
Terrorist Surveillance Act of 2006: S. 3931 and Title II of S. 3929, the Terrorist Tracking, Identification, and Prosecution Act of 2006
No Description Available.
Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches
Although the activities involved in homeland security intelligence (HSINT) itself are not new, the relative importance of state, local, and private sector stakeholders; the awareness of how law enforcement information might protect national security; and the importance attached to homeland security intelligence have all increased substantially since the events of September 11, 2001. This report provides a potential conceptual model of how to frame HSINT, including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). While this community may not necessarily be a useful construct from a management perspective, it is nevertheless a community as traditionally defined. Although the HSIC’s members are diffused across the nation, they share a common counterterrorism interest.
Back to Top of Screen