Congressional Research Service Reports - 270 Matching Results

Search Results

Homeland Security: Intelligence Support

Description: Legislation establishing a Department of Homeland Security (DHS) (P.L. 107-296) included provisions for an information analysis element within the new department. It did not transfer to DHS existing government intelligence and law enforcement agencies but envisioned an analytical office utilizing the products of other agencies — both unevaluated information and finished reports — to provide warning of terrorist attacks, assessments of vulnerability, and recommendations for remedial actions at federal, state, and local levels, and by the private sector. In January 2003, the Administration announced its intention to establish a new Terrorist Threat Integration Center (TTIC) to undertake many of the tasks envisioned for the DHS informational analysis element, known as Information Analysis and Infrastructure Protection (IAIP), but some Members of Congress argue that TTIC cannot be a substitute for a DHS analytical effort. This report examines different approaches to improving the information analysis function and the sharing of information among federal agencies.
Date: February 23, 2004
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department

The Director of National Intelligence and Intelligence Analysis

Description: The 9/11 Commission made a number of recommendations to improve the quality of intelligence analysis. A key recommendation was the establishment of a Director of National Intelligence (DNI) position to manage the national intelligence effort and serve as the principal intelligence adviser to the President — along with a separate director of the Central Intelligence Agency. Subsequently, the Intelligence Reform and Terrorism Prevention Act of 2004, P.L. 108-458, made the DNI the principal adviser to the President on intelligence and made the DNI responsible for coordinating communitywide intelligence estimates. Some observers note that separating the DNI from the analytical offices may complicate the overall analytical effort.
Date: February 11, 2005
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department

Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches

Description: Although the activities involved in homeland security intelligence (HSINT) itself are not new, the relative importance of state, local, and private sector stakeholders; the awareness of how law enforcement information might protect national security; and the importance attached to homeland security intelligence have all increased substantially since the events of September 11, 2001. This report provides a potential conceptual model of how to frame HSINT, including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). While this community may not necessarily be a useful construct from a management perspective, it is nevertheless a community as traditionally defined. Although the HSIC’s members are diffused across the nation, they share a common counterterrorism interest.
Date: August 18, 2006
Creator: Masse, Todd M.
Partner: UNT Libraries Government Documents Department

Department of Veteran Affairs: Information Security and Information Technology Management Reorganization

Description: On May 3, 2006, the home of a Department of Veterans Affairs (VA) data analyst was burglarized, resulting in the theft of a laptop computer and an external data storage device that was reported to contain personal information on more than 26 million veterans and United States military personnel. The VA Secretary testified that he was not informed of the incident until May 16, 2006, almost two weeks after the data had been stolen. VA publicly announced the theft on May 22. On June 29, VA announced that the stolen laptop computer and external hard drive had been recovered intact and that, based on a forensic examination conducted by the Federal Bureau of Investigation (FBI), the files on the external hard drive had not been compromised.
Date: August 14, 2006
Creator: Panangala, Sidath Viranga
Partner: UNT Libraries Government Documents Department

Digital Surveillance: The Communications Assistance for Law Enforcement Act

Description: The Communications Assistance for Law Enforcement Act (CALEA, P.L. 103- 414, 47 USC 1001-1010), enacted October 25, 1994, is intended to preserve the ability of law enforcement officials to conduct electronic surveillance effectively and efficiently despite the deployment of new digital technologies and wireless services that have altered the character of electronic surveillance. CALEA requires telecommunications carriers to modify their equipment, facilities, and services, wherever reasonably achievable, to ensure that they are able to comply with authorized electronic surveillance actions.
Date: May 10, 2006
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department

Arms Shipments to Iran

Description: This report provides background and examines key questions in regards to the shipments of arms to Iran and the subsequent diversion of funds to Nicaraguan guerrillas by the Reagan Administration.
Date: April 3, 1987
Creator: Preece, Richard M
Partner: UNT Libraries Government Documents Department

China: Suspected Acquisition of U.S. Nuclear Weapon Secrets

Description: This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
Date: February 1, 2006
Creator: Kan, Shirley A.
Partner: UNT Libraries Government Documents Department

Comparison of 9/11 Commission Recommended Intelligence Reforms, Roberts Draft Bill, H.R. 4104, S. 190, S. 1520, S. 6, H.R. 4584, and Current Law

Description: This report, the first of two reports, presents side-by-side comparisons of the 9/11 Commission recommendations and legislation proposed by Senators Feinstein, Bob Graham, Daschle, and Roberts; and Representatives Harman and Goss, and relevant provisions of current law. A second report (CRS Report RL32601) presents a side-by-side comparison of the 9/11 Commission recommendations and legislation proposed by Senators Collins, Lieberman, and McCain; President Bush; and relevant provisions of current law.
Date: October 6, 2004
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department