Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

Sensitive Covert Action Notifications: Oversight Options for Congress

Description: With Congress considering a possible change regarding sensitive covert action policy, this memorandum describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examine both the impact of such notifications on congressional oversight as well as options that Congress might consider to possibly improve oversight.
Date: July 7, 2009
Creator: Cumming, Alfred
Item Type: Report
Partner: UNT Libraries Government Documents Department

Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches

Description: This report provides a potential conceptual model of how to frame homeland security intelligence (HSINT), including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). Although the HSIC's members are diffused across the nation, they share a common counterterrorism interest. The proliferation of intelligence and information fusion centers across the country indicate that state and local leaders believe there is value to centralizing intelligence gathering and analysis in a manner that assists them in preventing and responding to local manifestations of terrorist threats to their people, infrastructure, and other assets. At the policy and operational levels, the communication and integration of federal HSINT efforts with these state and local fusion centers will likely remain an important priority and future challenge.
Date: January 14, 2009
Creator: Randol, Mark A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Intelligence Authorization Legislation: Status and Challenges

Description: This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities.
Date: February 24, 2009
Creator: Best, Richard A., Jr.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Intelligence Authorization Legislation: Status and Challenges

Description: This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities.
Date: August 26, 2009
Creator: Best, Richard A., Jr.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Government Collection of Private Information: Background and Issues Related to the USA PATRIOT Act Reauthorization

Description: This report discusses the history of constitutional interpretations and legislative responses relevant to the collection of private information for criminal investigation, foreign intelligence gathering, and national security purposes.
Date: December 23, 2009
Creator: Henning, Anna C.; Bazan, Elizabeth B.; Doyle, Charles & Liu, Edward C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Government Collection of Private Information: Background and Issues Related to the USA PATRIOT Act Reauthorization

Description: This report discusses the history of constitutional interpretations and legislative responses relevant to the collection of private information for criminal investigation, foreign intelligence gathering, and national security purposes.
Date: December 9, 2009
Creator: Henning, Anna C.; Bazan, Elizabeth B.; Doyle, Charles & Liu, Edward C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Airborne Intelligence, Surveillance and Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs

Description: Among airborne intelligence, surveillance, and reconaissance (ISR) platforms, the U-2 Dragon Lady and the RQ-4A Global Hawk are especially valuable. This report discusses how best to use existing and planned manned and unmanned ISR aircraft to most effectively satisfy the Department of Defense's (Dod) requirements for timely and accurate information on enemy forces.
Date: December 1, 2000
Creator: Best Jr., Richard A & Bolkcom, Christopher
Item Type: Report
Partner: UNT Libraries Government Documents Department

Encryption Export Controls

Description: This report discusses encryption export controls, beginning with background on the development and use of encryption, and continuing with a description of export controls imposed under the Arms Export Control Act (AECA) and the Export Administration Act (EAA); a discussion of recent federal court rulings in First Amendment challenges to AECA and EAA regulations; and a summary of 106th Congress legislation aimed at liberalizing law and policy affecting encryption exports.
Date: January 11, 2001
Creator: Grimmett, Jeanne J
Item Type: Report
Partner: UNT Libraries Government Documents Department