Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

Sensitive Covert Action Notifications: Oversight Options for Congress

Description: With Congress considering a possible change regarding sensitive covert action policy, this memorandum describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examine both the impact of such notifications on congressional oversight as well as options that Congress might consider to possibly improve oversight.
Date: July 7, 2009
Creator: Cumming, Alfred
Item Type: Report
Partner: UNT Libraries Government Documents Department

Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches

Description: This report provides a potential conceptual model of how to frame homeland security intelligence (HSINT), including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). Although the HSIC's members are diffused across the nation, they share a common counterterrorism interest. The proliferation of intelligence and information fusion centers across the country indicate that state and local leaders believe there is value to centralizing intelligence gathering and analysis in a manner that assists them in preventing and responding to local manifestations of terrorist threats to their people, infrastructure, and other assets. At the policy and operational levels, the communication and integration of federal HSINT efforts with these state and local fusion centers will likely remain an important priority and future challenge.
Date: January 14, 2009
Creator: Randol, Mark A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Intelligence Authorization Legislation: Status and Challenges

Description: This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities.
Date: February 24, 2009
Creator: Best, Richard A., Jr.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Intelligence Authorization Legislation: Status and Challenges

Description: This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities.
Date: August 26, 2009
Creator: Best, Richard A., Jr.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Government Collection of Private Information: Background and Issues Related to the USA PATRIOT Act Reauthorization

Description: This report discusses the history of constitutional interpretations and legislative responses relevant to the collection of private information for criminal investigation, foreign intelligence gathering, and national security purposes.
Date: December 23, 2009
Creator: Henning, Anna C.; Bazan, Elizabeth B.; Doyle, Charles & Liu, Edward C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Government Collection of Private Information: Background and Issues Related to the USA PATRIOT Act Reauthorization

Description: This report discusses the history of constitutional interpretations and legislative responses relevant to the collection of private information for criminal investigation, foreign intelligence gathering, and national security purposes.
Date: December 9, 2009
Creator: Henning, Anna C.; Bazan, Elizabeth B.; Doyle, Charles & Liu, Edward C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

The National Intelligence Council: Issues and Options for Congress

Description: The purpose of this report to describe the statutory provisions that authorize the National Intelligence Council (NIC), provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight.
Date: September 2, 2009
Creator: Best, Richard A., Jr.
Item Type: Report
Partner: UNT Libraries Government Documents Department

The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

Description: This report provides an overview of Department of Homeland Security Intelligence (DHSI) both at headquarters and within the components. It examines how DHSI is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; and support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options that Congress may consider on certain issues.
Date: May 27, 2009
Creator: Randol, Mark A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

The National Intelligence Council: Issues and Options for Congress

Description: This report to describe the statutory provisions that authorize the National Intelligence Council (NIC), provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight.
Date: April 10, 2009
Creator: Best, Richard A., Jr.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Date: October 29, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Date: March 16, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Date: January 6, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Date: December 23, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Congress as a Consumer of Intelligence Information

Description: This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address in the 111th Congress.
Date: January 15, 2009
Creator: Cumming, Alfred
Item Type: Report
Partner: UNT Libraries Government Documents Department

"Gang of Four" Congressional Intelligence Notifications

Description: This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Date: July 20, 2009
Creator: Cumming, Alfred
Item Type: Report
Partner: UNT Libraries Government Documents Department

"Gang of Four" Congressional Intelligence Notifications

Description: "Gang of Four" intelligence notifications generally are oral briefings of certain particularly sensitive non-covert action intelligence activities, including principally, but not exclusively, intelligence collection programs, that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times, but not always, to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Date: July 14, 2009
Creator: Cumming, Alfred
Item Type: Report
Partner: UNT Libraries Government Documents Department

Sensitive Covert Action Notifications: Oversight Options for Congress

Description: This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
Date: September 25, 2009
Creator: Cumming, Alfred
Item Type: Report
Partner: UNT Libraries Government Documents Department

Sensitive Covert Action Notifications: Oversight Options for Congress

Description: This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
Date: July 30, 2009
Creator: Cumming, Alfred
Item Type: Report
Partner: UNT Libraries Government Documents Department

Intelligence Issues for Congress

Description: This report discusses the efforts currently underway to improve coordination and encourage better analysis amongst the various agencies within the U.S. Intelligence Community, especially with regard to the ongoing and prominent issue of international terrorism. In particular, this report addresses the false intelligence regarding Iraqi weapons of mass destruction and the current efforts in Iraq and Iran in general.
Date: September 18, 2009
Creator: Best, Richard A., Jr.
Item Type: Report
Partner: UNT Libraries Government Documents Department

"Gang of Four" Congressional Intelligence Notifications

Description: This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Date: September 25, 2009
Creator: Cumming, Alfred
Item Type: Report
Partner: UNT Libraries Government Documents Department

Security Classification Policy and Procedure: E.O. 12958, as Amended

Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Date: June 4, 2009
Creator: Kosar, Kevin R.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Security Classification Policy and Procedure: E.O. 12958, as Amended

Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Date: December 31, 2009
Creator: Kosar, Kevin R.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Intelligence Issues for Congress

Description: This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters.
Date: April 20, 2009
Creator: Best, Richard A., Jr.
Item Type: Report
Partner: UNT Libraries Government Documents Department