Congressional Research Service Reports - 249 Matching Results

Search Results

Freedom of Information Act (FOIA) Amendments: 109th Congress
No Description Available.
Freedom of Information Act (FOIA) Amendments: 109th Congress
No Description Available.
Informing Congress: The Role of the Executive in Times of War and Military Conflict, 1941-2001
No Description Available.
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets
This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
Balancing Scientific Publication and National Security Concerns: Issues for Congress
There is a lack of consensus regarding the best method of balancing scientific publishing and national security. The current federal policy, as described in National Security Decision Directive 189, is that fundamental research should remain unrestricted and that in the rare case where it is necessary to restrict such information, classification is the appropriate vehicle to do so. Other mechanisms restrict international information flow, where Export Administration Regulations (EAR) and International Traffic in Arms Regulations (ITAR) control export of items and technical information on specific lists. Both EAR and ITAR contain a fundamental research exclusion, but this exclusion is lost if prepublication review of research results for sensitive information occurs.
Criminal Prohibitions on the Publication of Classified Defense Information
This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of previous legislative efforts to criminalize the unauthorized disclosure of classified information.
Military Service Records and Unit Histories: A Guide to Locating Sources
No Description Available.
Protection of Classified Information by Congress: Practices and Proposals
No Description Available.
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets
This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
Intelligence Identities Protection Act
This report summarizes the Intelligence Identities Protection Act, P.L. 97-200, enacted by Congress in 1982 to address the unauthorized disclosure of information that exposes covert U.S. intelligence agents.
"Sensitive but Unclassified" Information and Other Controls: Policy and Options for Scientific and Technical Information
This report traces the evolution of "sensitive but unclassified" or SBU-related controls; summarizes actions taken to protect certain types of scientific and technical information; describes critiques of some control policies; and summarizes proposals and actions, including congressional, executive and other initiatives, to clarify these issues and develop policies that serve various stakeholders. It also raises issues that may warrant further attention.
Department of Veteran Affairs: Information Security and Information Technology Management Reorganization
On May 3, 2006, the home of a Department of Veterans Affairs (VA) data analyst was burglarized, resulting in the theft of a laptop computer and an external data storage device that was reported to contain personal information on more than 26 million veterans and United States military personnel. The VA Secretary testified that he was not informed of the incident until May 16, 2006, almost two weeks after the data had been stolen. VA publicly announced the theft on May 22. On June 29, VA announced that the stolen laptop computer and external hard drive had been recovered intact and that, based on a forensic examination conducted by the Federal Bureau of Investigation (FBI), the files on the external hard drive had not been compromised.
Protection of Security-Related Information
No Description Available.
Protection of Classified Information by Congress: Practices and Proposals
No Description Available.
Floor Consideration of Conference Reports in the House
This report explains the steps in the legislative process of the conference reports.
Government Access to Phone Calling Activity and Related Records: Legal Authorities
This report summarizes statutory authorities regarding access by the Government, for either foreign intelligence or law enforcement purposes, to information related to telephone calling patterns or practices.
The Obama Administration's Open Government Initiative: Issues for Congress
This report reviews the objectives delineated in President Obama's Open Government Initiative (OGI) and examines the expectations placed on agencies to meet these objectives. This report reviews department and agency attempts to implement Obama Administration initiatives that seek to make the federal government more transparent, participatory, and collaborative. The report then analyzes options for congressional action in this area.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of recent legislation relevant to the issue as well as some previous efforts to criminalize the unauthorized disclosure of classified information.
Government Access to Phone Calling Activity and Related Records: Legal Authorities
This report summarizes legal authorities regarding access by the government, for either foreign intelligence or law enforcement purposes, to information related to telephone calling patterns or practices. Where pertinent, it also discusses statutory prohibitions against accessing or disclosing such information, along with relevant exceptions to those prohibitions.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers that would be capable of addressing the problems and issues the government needed to solve and study.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization Wikileaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals.
The Obama Administration's Open Government Initiative: Issues for Congress
This report reviews and discusses President Obama's Open Government Initiative and the Open Government Directive. The report then analyzes both agency response to the OGI and the OGD, and examines whether the OGD's requirements can meet the stated goals of the Administration. The report discusses the three central tenets of the Administration's OGD--transparency, public participation, and collaboration--and analyzes each one individually to determine whether agencies are meeting these requirements and whether the requirements may improve the effectiveness of the federal government.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counterterrorism intelligence activities as part of what the Bush Administration termed the global war on terror. Some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congressional intelligence committees. This report examines the legislative background surrounding covert action and poses several related policy questions.
Presidential Libraries: The Federal System and Related Legislation
This report provides a brief overview of the federal presidential libraries system and tracks the progress of related legislation.
Covert Action: Legislative Background and Possible Policy Questions
This report examines the statutory procedures governing covert action and associated questions to consider.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Covert Action: Legislative Background and Possible Policy Questions
This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. It also examines the statutory procedures governing covert action and associated questions to consider.
The Changing Demographic Profile of the United States
This report discusses the demographic profile of the United States and highlights demographic changes that have occurred since 1950 to illustrate how trends may affect the demographics of the U.S. through 2050.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. Support of IT R&D began because the government had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
The federal government has long played a key role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider.
Protection of Classified Information by Congress: Practices and Proposals
This report discusses safeguards in place to protect conterolled information and proposals for change of some of the mechanisms in place. Congress uses classified national security and other controlled information to fulfill its constitutional responsibilities, particularly overseeing the executive, appropriating funds, and legislating public policy.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of recent legislation relevant to the issue as well as some previous efforts to criminalize the unauthorized disclosure of classified information.
Covert Action: Legislative Background and Possible Policy Questions
This report examines the statutory procedures governing covert action and associated questions to consider. Published reports have suggested that the Pentagon has expanded its counter-terrorism intelligence activities, and some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congressional intelligence committees.
Government Access to Phone Calling Activity and Related Records: Legal Authorities
This report summarizes legal authorities regarding access by the government, for either foreign intelligence or law enforcement purposes, to information related to telephone calling patterns or practices. Where pertinent, it also discusses statutory prohibitions against accessing or disclosing such information, along with relevant exceptions to those prohibitions.
The Congressional Research Service and the American Legislative Process
The Legislative Reference Service, it was charged with responding to congressional requests for information. For more than 50 years, this department assisted Congress primarily by providing facts and publications and by transmitting research and analysis done largely by other government agencies, private organizations, and individual scholars. In 1970, Congress enacted a law transforming the Legislative Reference Service into the Congressional Research Service (CRS) and directing CRS to devote more of its efforts and increased resources to performing research and analysis that assists Congress in direct support of the legislative process.
Military Service Records and Unit Histories: A Guide to Locating Sources
This report is a guide to locating individual service records and military unit histories from the American Revolution to the present.
Critical Infrastructure: The National Asset Database
The purpose of this report is to discuss the National Asset Database: what is in it, how it is populated, what the Database apparently is, what it is not, and how it is intended to be used. The report also discusses some of the issues on which Congress could focus its oversight, including appropriation bill language.
Oversight of Dual-Use Biological Research: The National Science Advisory Board for Biosecurity
No Description Available.
The Congressional Research Service and the American Legislative Process
The Legislative Reference Service, it was charged with responding to congressional requests for information. For more than 50 years, this department assisted Congress primarily by providing facts and publications and by transmitting research and analysis done largely by other government agencies, private organizations, and individual scholars. In 1970, Congress enacted a law transforming the Legislative Reference Service into the Congressional Research Service (CRS) and directing CRS to devote more of its efforts and increased resources to performing research and analysis that assists Congress in direct support of the legislative process.