Congressional Research Service Reports - 269 Matching Results

Search Results

Intelligence Authorization Legislation: Status and Challenges

Description: This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities.
Date: February 24, 2009
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department

Intelligence Authorization Legislation: Status and Challenges

Description: This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities.
Date: January 27, 2010
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department

Intelligence Authorization Legislation: Status and Challenges

Description: This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities.
Date: August 26, 2009
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department

Government Collection of Private Information: Background and Issues Related to the USA PATRIOT Act Reauthorization

Description: This report discusses the history of constitutional interpretations and legislative responses relevant to the collection of private information for criminal investigation, foreign intelligence gathering, and national security purposes.
Date: December 23, 2009
Creator: Henning, Anna C.; Bazan, Elizabeth B.; Doyle, Charles & Liu, Edward C.
Partner: UNT Libraries Government Documents Department

Government Collection of Private Information: Background and Issues Related to the USA PATRIOT Act Reauthorization

Description: This report discusses the history of constitutional interpretations and legislative responses relevant to the collection of private information for criminal investigation, foreign intelligence gathering, and national security purposes.
Date: December 9, 2009
Creator: Henning, Anna C.; Bazan, Elizabeth B.; Doyle, Charles & Liu, Edward C.
Partner: UNT Libraries Government Documents Department

Reform of the Foreign Intelligence Surveillance Courts: Procedural and Operational Changes

Description: This report begins with an overview of both the Foreign Intelligence Surveillance Court (FISC) and the Foreign Intelligence Surveillance Act (FISA) Court of Review, including the jurisdiction of these courts, how the judges are appointed, and the FISC’s practices and procedures for reviewing and issuing surveillance orders. The report then discusses the scope and underlying legal principles behind congressional regulation of the procedures of the federal courts, and applies those principles with respect to the various proposals to reform the FISA judicial review process.
Date: January 16, 2014
Creator: Nolan, Andrew & Thompson, Richard M., II
Partner: UNT Libraries Government Documents Department

Intelligence Issues for Congress

Description: This report discusses the efforts currently underway to improve coordination and encourage better analysis amongst the various agencies within the U.S. Intelligence Community, especially with regard to the ongoing and prominent issue of international terrorism. In particular, this report addresses the false intelligence regarding Iraqi weapons of mass destruction and the current efforts in Iraq and Iran in general.
Date: August 6, 2010
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department

USA PATRIOT Act Sunset: Provisions That Were to Expire on December 31, 2005

Description: This report examines various provisions of the Patriot Act that were set to expire on December 31, 2005. Their expiration date has been postponed until March 10, 2006. The expiring sections deal with the power of federal authorities to conduct searches and seizures, generally searches and seizures relating to communications.
Date: February 6, 2006
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

The U.S. Intelligence Community: Selected Cross-Cutting Issues

Description: This report focuses on cross-cutting management issues that affect the Intelligence Community's (IC's) ability to counter "pervasive and emerging threats" to the United States and balance resources both appropriately and wisely. The Director of National Intelligence (DNI) is charged with integrating the community of intelligence agencies so that they operate effectively as one team.
Date: April 12, 2016
Creator: Miles, Anne D.
Partner: UNT Libraries Government Documents Department

The Foreign Intelligence Surveillance Act: An Overview of Selected Issues

Description: This report briefly outlines some of the perspectives reflected in the ongoing debate related to the Foreign Intelligence Surveillance Act (FISA) focusing on three issues: tension between national security and civil liberties, collection of foreign intelligence information from foreign persons, and limitations on liability for telecommunications providers furnishing aid to the government.
Date: July 7, 2008
Creator: Bazan, Elizabeth B.
Partner: UNT Libraries Government Documents Department

Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches

Description: Although the activities involved in homeland security intelligence (HSINT) itself are not new, the relative importance of state, local, and private sector stakeholders; the awareness of how law enforcement information might protect national security; and the importance attached to homeland security intelligence have all increased substantially since the events of September 11, 2001. This report provides a potential conceptual model of how to frame HSINT, including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). While this community may not necessarily be a useful construct from a management perspective, it is nevertheless a community as traditionally defined. Although the HSIC’s members are diffused across the nation, they share a common counterterrorism interest.
Date: August 18, 2006
Creator: Masse, Todd M.
Partner: UNT Libraries Government Documents Department

Cybersecurity: Selected Legal Issues

Description: This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also discusses the degree to which federal law may preempt state law.
Date: March 14, 2012
Creator: Liu, Edward, C.; Stevens, Gina; Ruane, Kathleen Ann; Dolan, Alissa M. & Thompson, Richard M., II
Partner: UNT Libraries Government Documents Department

Intelligence Issues for Congress

Description: To address the challenges facing the U.S. Intelligence Community in the 21st century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis. In December 2004, the Intelligence Reform and Terrorism Prevention Act was signed, providing for a Director of National Intelligence (DNI) with substantial authorities to manage the national intelligence effort. Making cooperation effective presents substantial leadership and managerial challenges. International terrorism in particular presents a difficult analytical challenge. Counterterrorism requires the close coordination of intelligence and law enforcement agencies, but there remain many institutional and procedural issues that complicate cooperation between the two sets of agencies.
Date: July 12, 2006
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department

The National Intelligence Council: Issues and Options for Congress

Description: The National Intelligence Council (NIC), composed of some 18 senior analysts and national security policy experts, provides the U.S. intelligence community's best judgments on crucial international issues. It is the purpose of this report to describe the statutory provisions that authorize the NIC, provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight.
Date: January 10, 2011
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department

The National Intelligence Council: Issues and Options for Congress

Description: This report to describe the statutory provisions that authorize the National Intelligence Council (NIC), provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight.
Date: April 10, 2009
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department

Encryption Export Controls

Description: This report discusses encryption export controls, beginning with background on the development and use of encryption, and continuing with a description of export controls imposed under the Arms Export Control Act (AECA) and the Export Administration Act (EAA); a discussion of recent federal court rulings in First Amendment challenges to AECA and EAA regulations; and a summary of 106th Congress legislation aimed at liberalizing law and policy affecting encryption exports.
Date: January 11, 2001
Creator: Grimmett, Jeanne J.
Partner: UNT Libraries Government Documents Department

Airborne Intelligence, Surveillance and Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs

Description: Among airborne intelligence, surveillance, and reconaissance (ISR) platforms, the U-2 Dragon Lady and the RQ-4A Global Hawk are especially valuable. This report discusses how best to use existing and planned manned and unmanned ISR aircraft to most effectively satisfy the Department of Defense's (Dod) requirements for timely and accurate information on enemy forces.
Date: December 1, 2000
Creator: Best, Richard A., Jr. & Bolkcom, Christopher
Partner: UNT Libraries Government Documents Department

Domestic Intelligence in the United Kingdom: Applicability of the MI-5 Model to the United States

Description: This paper summarizes pending legislation relating to domestic intelligence, briefly explains the jurisdiction and functions of MI-5, and describes some of the factors that may be relevant to a discussion regarding the applicability of the MI-5 domestic intelligence model to the United States.
Date: May 19, 2003
Creator: Masse, Todd M
Partner: UNT Libraries Government Documents Department

National Security Letters: Proposals in the 113th Congress

Description: This report reprints the text of the five National Security Letter (NSL) statutes as they now appear and as they appeared prior to amendment by the USA PATRIOT Act. A National Security Letter (NSL) is roughly comparable to an administrative subpoena, used by various intelligence agencies to demand certain customer information from communications providers, financial institutions, and consumer credit reporting agencies under the Right to Financial Privacy Act, the Fair Credit Reporting Act, the National Security Act, and the Electronic Communications Privacy Act.
Date: January 22, 2015
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department