Search Results

open access

USA PATRIOT Act Sunset: Provisions That Were to Expire on December 31, 2005

Description: This report examines various provisions of the Patriot Act that were set to expire on December 31, 2005. Their expiration date has been postponed until March 10, 2006. The expiring sections deal with the power of federal authorities to conduct searches and seizures, generally searches and seizures relating to communications.
Date: February 6, 2006
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Proposed Change to the Foreign Intelligence Surveillance Act (FISA) under S. 113

Description: This report discusses S. 113, a bill to extend the coverage of the Foreign Intelligence Surveillance Act ("FISA") to non-U.S. persons who engage in international terrorism or activities in preparation for terrorist acts, without a showing of membership in or affiliation with an international terrorist group.
Date: August 9, 2004
Creator: Elsea, Jennifer
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of previous legislative efforts to criminalize the unauthorized disclosure of classified information.
Date: June 24, 2013
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the… more
Date: October 18, 2010
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including … more
Date: January 10, 2011
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the… more
Date: December 6, 2010
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the… more
Date: September 8, 2011
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including … more
Date: June 26, 2012
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Criminal Prohibitions on the Publication of Classified Defense Information

Description: The recent online publication of classified defense documents by the organization Wikileaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organiz… more
Date: September 10, 2010
Creator: Elsea, Jennifer K.
Partner: UNT Libraries Government Documents Department
open access

Covert Action: Legislative Background and Possible Policy Questions

Description: Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counterterrorism intelligence activities as part of what the Bush Administration termed the global war on terror. Some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congr… more
Date: April 10, 2013
Creator: Erwin, Marshall C.
Partner: UNT Libraries Government Documents Department
open access

"Gang of Four" Congressional Intelligence Notifications

Description: This report reviews the history of the Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. The "Gang of Eight" procedure is statutorily based and provides that the chairmen and ranking Members of the intelligence committee, along with the Speaker and minority leader of the House, and Senate majority and minority leaders--rather than the full membership of the intelligence committees-- are to receive prior notice of particularly … more
Date: April 16, 2013
Creator: Erwin, Marshall Curtis
Partner: UNT Libraries Government Documents Department
open access

Intelligence Issues for Congress

Description: This report gives an overview of current intelligence issues of interest to the 112th Congress. It includes background and analysis including most recent development, ongoing Congressional concerns, specific issues for the 112th Congress, and a summary of related legislation from the 109th through the 112th Congresses.
Date: April 23, 2013
Creator: Erwin, Marshall Curtis
Partner: UNT Libraries Government Documents Department
open access

Intelligence, Surveillance, and Reconnaissance (ISR) Acquisition: Issues for Congress

Description: This report discusses Congressional issues regarding Intelligence, Surveillance, and Reconnaissance (ISR) systems, which are integral components of both national policymaking and military operations, including counterterrorism operations. ISR systems are costly and complicated, and the relationships among organizations responsible for designing and operating these systems are equally complicated.
Date: April 16, 2013
Creator: Erwin, Marshall Curtis
Partner: UNT Libraries Government Documents Department
open access

Renewed Crypto Wars?

Description: This report briefly examines renewed tensions between tech companies and the government regarding encryption "back doors" and how quickly-advancing technologies could impact law enforcement investigations.
Date: February 9, 2016
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department
open access

Court-Ordered Access to Smart Phones: In Brief

Description: This report specifically examines certain encryption issues that have been raised in the investigation of the December 2, 2015, terrorist attack in San Bernardino, CA. This report highlights certain issues that policymakers may examine as they follow the ongoing dispute between law enforcement and technology companies, and it focuses on questions related to the government's request.
Date: February 23, 2016
Creator: Finklea, Kristin; Thompson, Richard M., II & Jaikaran, Chris
Partner: UNT Libraries Government Documents Department
open access

Intelligence, Surveillance, and Reconnaissance (ISR) Acquisition: Issues for Congress

Description: This report discusses Congressional issues regarding Intelligence, Surveillance, and Reconnaissance (ISR) systems, which are integral components of both national policymaking and military operations, including counterterrorism operations. ISR systems are costly and complicated, and the relationships among organizations responsible for designing and operating these systems are equally complicated.
Date: September 10, 2012
Creator: Grimmett, Richard F. & Lange, Rebecca S.
Partner: UNT Libraries Government Documents Department
open access

The Intelligence Community and Its Use of Contractors: Congressional Oversight Issues

Description: The report examines, from an acquisition perspective, several reasons for interest in the intelligence community's (IC) use of contractors, notably, the types of functions contractors perform, whether the IC's acquisition workforce has the capacity to oversee contractors.
Date: August 18, 2015
Creator: Halchin, L. E.
Partner: UNT Libraries Government Documents Department
open access

Congressional Oversight of Intelligence: Current Structure and Alternatives

Description: This report, to be updated as events dictate, describes the current select committees on intelligence; characteristics and a model for a possible joint committee; recent actions by Congress; and obstacles affecting legislative oversight in the field.
Date: March 26, 2012
Creator: Halchin, L. Elaine & Kaiser, Frederick M.
Partner: UNT Libraries Government Documents Department
open access

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business r… more
Date: March 2, 2010
Creator: Henning, Anna C. & Liu, Edward C.
Partner: UNT Libraries Government Documents Department
open access

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business r… more
Date: October 29, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen