"Gang of Four" intelligence notifications are oral briefings on sensitive non-covert action intelligence activities (including intelligence collection programs) that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
This report describes various sources of Intelligence Community (IC) whistleblower protections. Generally speaking, whistleblowers are those who expose misconduct (e.g., fraud, abuse, or illegal activity) within an organization. In the context of the IC, whistleblowers are generally employees or contractors of federal intelligence agencies who bring to light information on agency wrongdoings.
During the latter half of 2004, disputes arose over whether or not to declassify portions of the sensitive content of reports resulting from congressional investigations and national commission inquiries into the terrorist attacks of September 11, 2001, the war in Iraq, and related matters. As a result, some called for Congress to create a special mechanism for the impartial and expeditious resolution of such disputes (S. 2672/H.R. 4855; S. 2845 amendment). This report discusses the culmination of one such effort at balancing legitimate competing needs for secrecy and openness.
This report explains the management structure for the National Intelligence Program (NIP), and Military Intelligence Program (MIP), to include their two separate budget processes and the roles of the Director of National Intelligence and the Under Secretary of Defense (Intelligence). The concluding section of this report considers the ability of the U.S. government to make the best use of its intelligence-related resources when: (1) total intelligence spending is impossible to calculate; (2) its management and oversight is completely decentralized; and (3) IC funding alone is largely divided into two categories (NIP and MIP)-- managed within the executive branch separately, justified to Congress separately, and overseen by separate congressional committees.
The report examines, from an acquisition perspective, several reasons for interest in the intelligence community's (IC) use of contractors, notably, the types of functions contractors perform, whether the IC's acquisition workforce has the capacity to oversee contractors.
This report provides an overview of the DHS IE both at headquarters and within the components. It examines how DHS IE is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options for Congress to consider on these issues.
This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
This report reviews the history of the Gang of Four intelligence notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
This report reviews the history of the Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. The "Gang of Eight" procedure is statutorily based and provides that the chairmen and ranking Members of the intelligence committee, along with the Speaker and minority leader of the House, and Senate majority and minority leaders--rather than the full membership of the intelligence committees-- are to receive prior notice of particularly sensitive covert action programs, if the President determines that limited access to such programs is essential to meet extraordinary circumstances affecting vital U.S. interests.
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
This report includes information regarding intelligence issues for Congress. Recent developments, background and analysis, and selected 106th Congress legislation are among topics discussed in this report.
This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
This report discusses the Intelligence Identities Protection Act, passed in 1982 to hold criminally liable those who disclose the identities of US intelligence agents.
Increasing calls for intelligence support and continuing innovations in intelligence technologies combine to create significant challenges for both the executive and legislative branches. This report discusses Intelligence, Surveillance, and Reconnaissance (ISR) systems, which are integral components of both national policymaking and military operations, including counterterrorism operations. ISR systems are costly and complicated, and the relationships among organizations responsible for designing and operating these systems are equally complicated. These factors create numerous oversight issues for Congress, which this report addresses.
This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters.
To address the challenges facing the U.S. intelligence community in the 21st century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis. In December 2004, the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458) was signed, providing for a Director of National Intelligence (DNI) with substantial authorities to manage the national intelligence effort. The legislation also established a separate Director of the Central Intelligence Agency.
This report discusses the Foreign Intelligence Surveillance Act (FISA), the USA PATRIOT Act of 2001, and other related amendments that were included in the Intelligence Authorization Act for Fiscal Year 2002.
This report discusses Congressional issues regarding Intelligence, Surveillance, and Reconnaissance (ISR) systems, which are integral components of both national policymaking and military operations, including counterterrorism operations. ISR systems are costly and complicated, and the relationships among organizations responsible for designing and operating these systems are equally complicated.
This report describes the current select committees on intelligence; characteristics and a model for a possible joint committee; recent actions by Congress; and obstacles affecting legislative oversight in the field.
This report discusses the Intelligence Reform and Terrorism Prevention Act of 2004 (P.L. 108-458) that was the most significant legislation affecting the U.S. intelligence community since the National Security Act of 1947.
This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters.
This report discusses Congressional issues regarding Intelligence, Surveillance, and Reconnaissance (ISR) systems, which are integral components of both national policymaking and military operations, including counterterrorism operations. ISR systems are costly and complicated, and the relationships among organizations responsible for designing and operating these systems are equally complicated.
Increasing calls for intelligence support and continuing innovations in intelligence technologies combine to create significant challenges for both the executive and legislative branches. This report discusses Intelligence, Surveillance, and Reconnaissance (ISR) systems, which are integral components of both national policymaking and military operations, including counterterrorism operations. ISR systems are costly and complicated, and the relationships among organizations responsible for designing and operating these systems are equally complicated. These factors create numerous oversight issues for Congress, which this report addresses.
This report discusses Congressional issues regarding Intelligence, Surveillance, and Reconnaissance (ISR) systems, which are integral components of both national policymaking and military operations, including counterterrorism operations. ISR systems are costly and complicated, and the relationships among organizations responsible for designing and operating these systems are equally complicated.
This report outlines an array of homeland security issues that may come before the 114th Congress. After a brief discussion of the definitions of homeland security, the homeland security budget, and the role of homeland security actors in the intelligence community, the report divides the specific issues into four broad categories: Counterterrorism and Security Management, Border Security and Trade, Disaster Preparedness, Response, and Recovery, and DHS Management Issues.
Much of the discussion and debate following the December release of the Senate Select Committee on Intelligence (SSCI) Study of the Central Intelligence Agency's (CIA's) Detention and Interrogation (D&I) Program (SSCI Study) has focused on the CIA's use of Enhanced Interrogation Techniques (EITs) on certain individuals labeled "high value detainees" (HVDs). This report discusses views expressed by public officials, academics, and commentators in a variety of sources.
This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters.
The Communications Assistance for Law Enforcement Act (CALEA, P.L. 103- 414, 47 USC 1001-1010), enacted October 25, 1994, is intended to preserve the ability of law enforcement officials to conduct electronic surveillance effectively and efficiently despite the deployment of new digital technologies and wireless services that have altered the character of electronic surveillance. CALEA requires telecommunications carriers to modify their equipment, facilities, and services, wherever reasonably achievable, to ensure that they are able to comply with authorized electronic surveillance actions.
This report discusses arguments surrounding an independent commission to assess U.S. intelligence agencies' performance regarding the September 11th Terrorist Attacks.
Report that gives an overview of current intelligence issues of interest to the 112th Congress. It includes background and analysis including most recent development, ongoing Congressional concerns, specific issues for the 112th Congress, and a summary of related legislation from the 109th through the 112th Congresses.
Report that gives an overview of 18 U.S.C. 1832 (theft of trade secrets) and 18 U.S.C. 1831 (economic espionage). It also describes what constitutes as a stolen trade secret, and how such crimes are prosecuted.
This dialog allows you to filter your current search.
Each of the Serial/Series Titles listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
This dialog allows you to filter your current search.
Each of the World Regions listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
This dialog allows you to filter your current search.
Each of the Countries listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
This dialog allows you to filter your current search.
Each of the Decades listed note their name and the number of records that will be limited down to if you choose that option.
This dialog allows you to filter your current search.
Each of the Years listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Years? Start typing and we'll update the list to show only those items that match your needs.
This dialog allows you to filter your current search.
Each of the Months listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
This dialog allows you to filter your current search.
Each of the Days listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Days? Start typing and we'll update the list to show only those items that match your needs.