Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

Airborne Intelligence, Surveillance and Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs

Description: Among airborne intelligence, surveillance, and reconaissance (ISR) platforms, the U-2 Dragon Lady and the RQ-4A Global Hawk are especially valuable. This report discusses how best to use existing and planned manned and unmanned ISR aircraft to most effectively satisfy the Department of Defense's (Dod) requirements for timely and accurate information on enemy forces.
Date: December 1, 2000
Creator: Best, Richard A., Jr. & Bolkcom, Christopher
Item Type: Report
Partner: UNT Libraries Government Documents Department

Domestic Intelligence in the United Kingdom: Applicability of the MI-5 Model to the United States

Description: This paper summarizes pending legislation relating to domestic intelligence, briefly explains the jurisdiction and functions of MI-5, and describes some of the factors that may be relevant to a discussion regarding the applicability of the MI-5 domestic intelligence model to the United States.
Date: May 19, 2003
Creator: Masse, Todd M
Item Type: Report
Partner: UNT Libraries Government Documents Department

Intelligence Spending: Public Disclosure Issues

Description: This report describes the constituent parts of the intelligence budget, past practice in handling intelligence authorizations and appropriations, the arguments that have been advanced for and against making intelligence spending totals public, a legal analysis of these issues, and a review of the implications of post-Cold War developments on the question. It also describes past congressional interest in keeping intelligence spending totals secret.
Date: February 15, 2007
Creator: Best, Richard A., Jr. & Bazan, Elizabeth B.
Item Type: Report
Partner: UNT Libraries Government Documents Department

The Foreign Intelligence Surveillance Act: A Sketch of Selected Issues

Description: This report briefly outlines three issues relating to electronic surveillance under the Foreign Intelligence Surveillance Act (FISA) and touches upon some of the perspectives reflected in the ongoing debate. These issues include the inherent and often dynamic tension between national security and civil liberties, particularly rights of privacy and free speech; the need for the intelligence community to be able to efficiently and effectively collect foreign intelligence information from the communications of foreign persons located outside the United States in a changing, fast-paced, and technologically sophisticated international environment or from United States persons abroad, and the differing approaches suggested to meet this need; and limitations of liability for those electronic communication service providers who furnish aid to the federal government in its foreign intelligence collection. Two constitutional provisions, in particular, are implicated in this debate — the Fourth and First Amendments. This report briefly examines these issues and sets them in context.
Date: July 7, 2008
Creator: Bazan, Elizabeth B.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Date: October 29, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Intelligence Issues for Congress

Description: This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters.
Date: July 11, 2008
Creator: Best, Richard A., Jr.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Date: March 16, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions

Description: This report frames potential policy questions concerning the U.S. Secret Service's (USSS) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS).
Date: July 31, 2008
Creator: Reese, Shawn
Item Type: Report
Partner: UNT Libraries Government Documents Department

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Date: January 6, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Date: December 23, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Congress as a Consumer of Intelligence Information

Description: This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address in the 111th Congress.
Date: January 15, 2009
Creator: Cumming, Alfred
Item Type: Report
Partner: UNT Libraries Government Documents Department

"Gang of Four" Congressional Intelligence Notifications

Description: This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Date: July 20, 2009
Creator: Cumming, Alfred
Item Type: Report
Partner: UNT Libraries Government Documents Department

"Gang of Four" Congressional Intelligence Notifications

Description: "Gang of Four" intelligence notifications generally are oral briefings of certain particularly sensitive non-covert action intelligence activities, including principally, but not exclusively, intelligence collection programs, that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times, but not always, to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Date: July 14, 2009
Creator: Cumming, Alfred
Item Type: Report
Partner: UNT Libraries Government Documents Department

Sensitive Covert Action Notifications: Oversight Options for Congress

Description: This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
Date: September 25, 2009
Creator: Cumming, Alfred
Item Type: Report
Partner: UNT Libraries Government Documents Department