Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

9/11 Commission Recommendations: Intelligence Budget

Description: This report identifies the main recommendations of the 9/11 Commission with respect to the intelligence budget. This report also describes the intelligence budget process under current law to explain the effect of these recommendations and presents the current budget authorities of the Director of Central Intelligence, as well as budget provisions in two bills, S. 2774 and H.R. 5040, that include all Commission recommendations.
Date: September 27, 2004
Creator: Nicola, Thomas J.
Partner: UNT Libraries Government Documents Department

Airborne Intelligence, Surveillance and Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs

Description: Among airborne intelligence, surveillance, and reconaissance (ISR) platforms, the U-2 Dragon Lady and the RQ-4A Global Hawk are especially valuable. This report discusses how best to use existing and planned manned and unmanned ISR aircraft to most effectively satisfy the Department of Defense's (Dod) requirements for timely and accurate information on enemy forces.
Date: December 1, 2000
Creator: Best, Richard A., Jr. & Bolkcom, Christopher
Partner: UNT Libraries Government Documents Department

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Date: October 29, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Partner: UNT Libraries Government Documents Department

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Date: March 16, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Partner: UNT Libraries Government Documents Department

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Date: January 6, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Partner: UNT Libraries Government Documents Department

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Date: December 23, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Partner: UNT Libraries Government Documents Department

China: Suspected Acquisition of U.S. Nuclear Weapon Secrets

Description: This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
Date: February 1, 2006
Creator: Kan, Shirley A.
Partner: UNT Libraries Government Documents Department

China: Suspected Acquisition of U.S. Nuclear Weapon Secrets

Description: This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
Date: December 20, 2000
Creator: Kan, Shirley A.
Partner: UNT Libraries Government Documents Department

Comparison of 9/11 Commission Recommended Intelligence Reforms, Roberts Draft Bill, H.R. 4104, S. 190, S. 1520, S. 6, H.R. 4584, and Current Law

Description: This report, the first of two reports, presents side-by-side comparisons of the 9/11 Commission recommendations and legislation proposed by Senators Feinstein, Bob Graham, Daschle, and Roberts; and Representatives Harman and Goss, and relevant provisions of current law. A second report (CRS Report RL32601) presents a side-by-side comparison of the 9/11 Commission recommendations and legislation proposed by Senators Collins, Lieberman, and McCain; President Bush; and relevant provisions of current law.
Date: October 6, 2004
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department

Comparison of 9/11 Commission Recommended Intelligence Reforms, S. 2845, S. 2774, H.R. 5024, Administration Proposal, H.R. 10, Current Law

Description: This report, the second of two reports, presents side-by-side comparisons of the 9/11 Commission recommendations and current law and legislation proposed by Senators Collins and Lieberman (S. 2845) and unanimously approved by the Senate Governmental Affairs Committee on September 22, 2004, as amended; House Speaker Dennis Hastert (H.R. 10), as reported out be the House Committee on Rules; Senators McCain and Lieberman (S. 2774); Representative Pelosi (H.R. 5024); and President Bush. CRS Report RL32600 presents side-by-side comparisons of the 9/11 Commission recommendations and current law; and legislation proposed by Senators Feinstein, Bob Graham, Daschle, and Roberts; President Bush; and relevant provisions of current law.
Date: September 28, 2004
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department

Comparison of 9/11 Commission Recommended Intelligence Reforms, S. 2845, S. 2774, H.R. 5024, Administration Proposal, H.R. 10, Current Law

Description: This report, the second of two reports, presents side-by-side comparisons of the 9/11 Commission recommendations and current law and legislation proposed by Senators Collins and Lieberman (S. 2845) and unanimously approved by the Senate Governmental Affairs Committee on September 22, 2004, as amended; House Speaker Dennis Hastert (H.R. 10), as reported out be the House Committee on Rules; Senators McCain and Lieberman (S. 2774); Representative Pelosi (H.R. 5024); and President Bush. CRS Report RL32600 presents side-by-side comparisons of the 9/11 Commission recommendations and current law; and legislation proposed by Senators Feinstein, Bob Graham, Daschle, and Roberts; President Bush; and relevant provisions of current law.
Date: October 6, 2004
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department

Congress as a Consumer of Intelligence Information

Description: This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address in the 111th Congress.
Date: January 15, 2009
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department

Congressional Oversight of Intelligence: Current Structure and Alternatives

Description: This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report examines other actions and alternatives affecting congressional oversight in the field.
Date: September 16, 2008
Creator: Kaiser, Frederick M.
Partner: UNT Libraries Government Documents Department

Congressional Oversight of Intelligence: Current Structure and Alternatives

Description: This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report, to be updated as events dictate, examines other actions and alternatives affecting congressional oversight in the field.
Date: May 9, 2008
Creator: Kaiser, Frederick M.
Partner: UNT Libraries Government Documents Department

Consolidating Intelligence Appropriation and Authorization in a Single Committee: 9/11 Commission Recommendation and Alternatives

Description: This report focuses on the commission’s proposal, to consolidate appropriation and authorization functions in the existing Senate and House Select Intelligence Committees. The report (1) describes the proposal; (2) compares it to the existing committee system; (3) describes a 19th century precedent for consolidation; (4) provides selected arguments in favor of consolidation as well as against; (5) discusses two alternatives to consolidating authorization and appropriation functions: a Joint Committee on Intelligence and separate intelligence appropriations subcommittees in the Senate and House Committees on Appropriations; and (6) describes current legislation.
Date: October 29, 2004
Creator: Streeter, Sandy
Partner: UNT Libraries Government Documents Department

Counterintelligence Reform at the Department of Energy: Policy Issues and Organizational Alternatives

Description: Lapses in the Department of Energy’s (DOE) security and counterintelligence program have plagued DOE since 1977, when the Department was established through the merger of 40 government organizations, including the Energy Research and Development Administration and the Federal Energy Administration.1 Some policymakers expected the new agency to focus the government’s energy-related enterprises almost solely on the energy crisis. Others saw DOE as an unsuccessful attempt to fuse vastly diverse organizations, many with significantly different, if not conflicting missions.
Date: March 8, 2005
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department

Covert Action: Legislative Background and Possible Policy Questions

Description: Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider.
Date: July 6, 2009
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department

Covert Action: Legislative Background and Possible Policy Questions

Description: This report examines the statutory procedures governing covert action and associated questions to consider. Published reports have suggested that the Pentagon has expanded its counter-terrorism intelligence activities, and some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congressional intelligence committees.
Date: February 9, 2009
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department

The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

Description: This report provides an overview of Department of Homeland Security Intelligence (DHSI) both at headquarters and within the components. It examines how DHSI is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; and support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options that Congress may consider on certain issues.
Date: May 27, 2009
Creator: Randol, Mark A.
Partner: UNT Libraries Government Documents Department

Department of Veteran Affairs: Information Security and Information Technology Management Reorganization

Description: On May 3, 2006, the home of a Department of Veterans Affairs (VA) data analyst was burglarized, resulting in the theft of a laptop computer and an external data storage device that was reported to contain personal information on more than 26 million veterans and United States military personnel. The VA Secretary testified that he was not informed of the incident until May 16, 2006, almost two weeks after the data had been stolen. VA publicly announced the theft on May 22. On June 29, VA announced that the stolen laptop computer and external hard drive had been recovered intact and that, based on a forensic examination conducted by the Federal Bureau of Investigation (FBI), the files on the external hard drive had not been compromised.
Date: August 14, 2006
Creator: Panangala, Sidath Viranga
Partner: UNT Libraries Government Documents Department

Digital Surveillance: The Communications Assistance for Law Enforcement Act

Description: The Communications Assistance for Law Enforcement Act (CALEA, P.L. 103- 414, 47 USC 1001-1010), enacted October 25, 1994, is intended to preserve the ability of law enforcement officials to conduct electronic surveillance effectively and efficiently despite the deployment of new digital technologies and wireless services that have altered the character of electronic surveillance. CALEA requires telecommunications carriers to modify their equipment, facilities, and services, wherever reasonably achievable, to ensure that they are able to comply with authorized electronic surveillance actions.
Date: August 3, 2005
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department

Digital Surveillance: The Communications Assistance for Law Enforcement Act

Description: The Communications Assistance for Law Enforcement Act (CALEA, P.L. 103- 414, 47 USC 1001-1010), enacted October 25, 1994, is intended to preserve the ability of law enforcement officials to conduct electronic surveillance effectively and efficiently despite the deployment of new digital technologies and wireless services that have altered the character of electronic surveillance. CALEA requires telecommunications carriers to modify their equipment, facilities, and services, wherever reasonably achievable, to ensure that they are able to comply with authorized electronic surveillance actions.
Date: May 10, 2006
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department

The Director of National Intelligence and Intelligence Analysis

Description: The 9/11 Commission made a number of recommendations to improve the quality of intelligence analysis. A key recommendation was the establishment of a Director of National Intelligence (DNI) position to manage the national intelligence effort and serve as the principal intelligence adviser to the President — along with a separate director of the Central Intelligence Agency. Subsequently, the Intelligence Reform and Terrorism Prevention Act of 2004, P.L. 108-458, made the DNI the principal adviser to the President on intelligence and made the DNI responsible for coordinating communitywide intelligence estimates. Some observers note that separating the DNI from the analytical offices may complicate the overall analytical effort.
Date: February 11, 2005
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department