Congressional Research Service Reports - 269 Matching Results

Search Results

Airborne Intelligence, Surveillance and Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs

Description: Among airborne intelligence, surveillance, and reconaissance (ISR) platforms, the U-2 Dragon Lady and the RQ-4A Global Hawk are especially valuable. This report discusses how best to use existing and planned manned and unmanned ISR aircraft to most effectively satisfy the Department of Defense's (Dod) requirements for timely and accurate information on enemy forces.
Date: December 1, 2000
Creator: Best, Richard A., Jr. & Bolkcom, Christopher
Partner: UNT Libraries Government Documents Department

Domestic Intelligence in the United Kingdom: Applicability of the MI-5 Model to the United States

Description: This paper summarizes pending legislation relating to domestic intelligence, briefly explains the jurisdiction and functions of MI-5, and describes some of the factors that may be relevant to a discussion regarding the applicability of the MI-5 domestic intelligence model to the United States.
Date: May 19, 2003
Creator: Masse, Todd M
Partner: UNT Libraries Government Documents Department

National Security Letters: Proposals in the 113th Congress

Description: This report reprints the text of the five National Security Letter (NSL) statutes as they now appear and as they appeared prior to amendment by the USA PATRIOT Act. A National Security Letter (NSL) is roughly comparable to an administrative subpoena, used by various intelligence agencies to demand certain customer information from communications providers, financial institutions, and consumer credit reporting agencies under the Right to Financial Privacy Act, the Fair Credit Reporting Act, the National Security Act, and the Electronic Communications Privacy Act.
Date: January 22, 2015
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

National Security Letters: Proposals in the 112th Congress

Description: This report reprints the text of the five National Security Letter (NSL) statutes as they now appear and as they appeared prior to amendment by the USA PATRIOT Act (to which form they would be returned under S.1125 and H.R. 1805). NSLs are roughly comparable to administrative subpoenas. Various intelligence agencies use them to demand certain customer information from communications providers, financial institutions, and consumer credit reporting agencies under the Right to Financial Privacy Act, the Fair Credit Reporting Act, the National Security Act, and the Electronic Communications Privacy Act.
Date: June 30, 2011
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Intelligence Community Programs, Management, and Enduring Issues

Description: This report explains the management structure for the National Intelligence Program (NIP), and Military Intelligence Program (MIP), to include their two separate budget processes and the roles of the Director of National Intelligence and the Under Secretary of Defense (Intelligence). The concluding section of this report considers the ability of the U.S. government to make the best use of its intelligence-related resources when: (1) total intelligence spending is impossible to calculate; (2) its management and oversight is completely decentralized; and (3) IC funding alone is largely divided into two categories (NIP and MIP)-- managed within the executive branch separately, justified to Congress separately, and overseen by separate congressional committees.
Date: November 8, 2016
Creator: Daugherty Miles, Anne
Partner: UNT Libraries Government Documents Department

The Intelligence Appropriations Process: Issues for Congress

Description: The intelligence appropriations process remains complicated and not well understood, but intelligence is an important and sizable part of the federal budget and will undoubtedly be addressed as Congress considers various alternatives for spending. This report reviews the intelligence appropriations process, describes various changes that have been proposed, and analyzes the issues associated with the proposals.
Date: November 9, 2011
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department

The National Intelligence Council (NIC): Issues and Options for Congress

Description: It is the purpose of this report to describe the statutory provisions that authorize the NIC, provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight.
Date: December 27, 2011
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department

The National Intelligence Council: Issues and Options for Congress

Description: The purpose of this report to describe the statutory provisions that authorize the National Intelligence Council (NIC), provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight.
Date: September 2, 2009
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department

Sensitive Covert Action Notifications: Oversight Options for Congress

Description: Legislation enacted in 1980 gave the executive branch authority to limit advance notification of especially-sensitive covert actions to eight Members of Congress (called the "Gang of Eight") when the President determines that it is essential to limit prior notice in order to meet extraordinary circumstances affecting U.S. vital interests. This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight.
Date: April 6, 2011
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department

The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

Description: This report provides an overview of Department of Homeland Security Intelligence (DHSI) both at headquarters and within the components. It examines how DHSI is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; and support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options that Congress may consider on certain issues.
Date: May 27, 2009
Creator: Randol, Mark A.
Partner: UNT Libraries Government Documents Department

Intelligence Spending: Public Disclosure Issues

Description: This report describes the constituent parts of the intelligence budget, past practice in handling intelligence authorizations and appropriations, the arguments that have been advanced for and against making intelligence spending totals public, a legal analysis of these issues, and a review of the implications of post-Cold War developments on the question. It also describes past congressional interest in keeping intelligence spending totals secret.
Date: February 15, 2007
Creator: Best, Richard A., Jr. & Bazan, Elizabeth B.
Partner: UNT Libraries Government Documents Department