Search Results

9/11 Commission Recommendations: Intelligence Budget
This report identifies the main recommendations of the 9/11 Commission with respect to the intelligence budget. This report also describes the intelligence budget process under current law to explain the effect of these recommendations and presents the current budget authorities of the Director of Central Intelligence, as well as budget provisions in two bills, S. 2774 and H.R. 5040, that include all Commission recommendations.
The “1033 Program,” Department of Defense Support to Law Enforcement
This report focuses on the "1033 Program" that grants authority to the Secretary of Defense to give defense material to federal and state agencies. The focal point of the program is mostly for terrorism and illegal drug activities. This report describes how law enforcement agencies may apply to be part of the program and the structure of the program.
Airborne Intelligence, Surveillance and Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs
Among airborne intelligence, surveillance, and reconaissance (ISR) platforms, the U-2 Dragon Lady and the RQ-4A Global Hawk are especially valuable. This report discusses how best to use existing and planned manned and unmanned ISR aircraft to most effectively satisfy the Department of Defense's (Dod) requirements for timely and accurate information on enemy forces.
Airborne Intelligence, Surveillance & Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs
Among airborne intelligence, surveillance, and reconaissance (ISR) platforms, the U-2 Dragon Lady and the RQ-4A Global Hawk are especially valuable. This report discusses how best to use existing and planned manned and unmanned ISR aircraft to most effectively satisfy the Department of Defense's (Dod) requirements for timely and accurate information on enemy forces.
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010
The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records.
Anti-Terrorist/Anti-Money Laundering Information-Sharing by Financial Institutions under FINCEN's Regulations
This report discusses Information-sharing programs developed by Treasury's Financial Crimes Enforcement Network (FINCEN) designed to aid law enforcement investigation and prosecution of money laundering and terrorist financing.
Arms Shipments to Iran
This report provides background and examines key questions in regards to the shipments of arms to Iran and the subsequent diversion of funds to Nicaraguan guerrillas by the Reagan Administration.
The Balkans and Russia
This report discusses relations between Russia and the Balkan countries of southeast Europe. Efforts by Russia to gain influence and hinder the Balkan countries in their relations with the EU through "soft power" and intelligence activities are discussed.
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets
This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
China: Suspected Acquisition of U.S. Nuclear Weapon Secrets
This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead, since the late 1970s. This current controversy, began in early 1999, raises policy issues about whether U.S. security is further threatened by the PRC’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems is effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority.
Climate Change: Summary and Analysis of the Climate Stewardship Act (S. 342 and H.R. 759)
This report is on Climate Change: Summary and Analysis of the Climate Stewardship Act (S. 342 and H.R. 759).
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction: Establishment and Composition
This report analyzes the establishment and organizational requirements set forth in the presidential mandate, and its relationship to the Federal Advisory Committee Act (FAFCA). On March 31, 2005, the commission submitted its final report to the President, which contained 74 recommendations for reforming the U.S. intelligence community.
Comparison of 9/11 Commission Recommended Intelligence Reforms, Roberts Draft Bill, H.R. 4104, S. 190, S. 1520, S. 6, H.R. 4584, and Current Law
This report, the first of two reports, presents side-by-side comparisons of the 9/11 Commission recommendations and legislation proposed by Senators Feinstein, Bob Graham, Daschle, and Roberts; and Representatives Harman and Goss, and relevant provisions of current law. A second report (CRS Report RL32601) presents a side-by-side comparison of the 9/11 Commission recommendations and legislation proposed by Senators Collins, Lieberman, and McCain; President Bush; and relevant provisions of current law.
Comparison of 9/11 Commission Recommended Intelligence Reforms, S. 2845, S. 2774, H.R. 5024, Administration Proposal, H.R. 10, Current Law
This report, the second of two reports, presents side-by-side comparisons of the 9/11 Commission recommendations and current law and legislation proposed by Senators Collins and Lieberman (S. 2845) and unanimously approved by the Senate Governmental Affairs Committee on September 22, 2004, as amended; House Speaker Dennis Hastert (H.R. 10), as reported out be the House Committee on Rules; Senators McCain and Lieberman (S. 2774); Representative Pelosi (H.R. 5024); and President Bush. CRS Report RL32600 presents side-by-side comparisons of the 9/11 Commission recommendations and current law; and legislation proposed by Senators Feinstein, Bob Graham, Daschle, and Roberts; President Bush; and relevant provisions of current law.
Comparison of 9/11 Commission Recommended Intelligence Reforms, S. 2845, S. 2774, H.R. 5024, Administration Proposal, H.R. 10, Current Law
This report, the second of two reports, presents side-by-side comparisons of the 9/11 Commission recommendations and current law and legislation proposed by Senators Collins and Lieberman (S. 2845) and unanimously approved by the Senate Governmental Affairs Committee on September 22, 2004, as amended; House Speaker Dennis Hastert (H.R. 10), as reported out be the House Committee on Rules; Senators McCain and Lieberman (S. 2774); Representative Pelosi (H.R. 5024); and President Bush. CRS Report RL32600 presents side-by-side comparisons of the 9/11 Commission recommendations and current law; and legislation proposed by Senators Feinstein, Bob Graham, Daschle, and Roberts; President Bush; and relevant provisions of current law.
Congress as a Consumer of Intelligence Information
This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address in the 111th Congress.
Congress as a Consumer of Intelligence Information
This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address during the second session of the 111th Congress.
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report describes the Select Committees on Intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons.
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report describes the current select committees on intelligence; characteristics and a model for a possible joint committee; recent actions by Congress; and obstacles affecting legislative oversight in the field.
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report, to be updated as events dictate, examines other actions and alternatives affecting congressional oversight in the field.
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report examines other actions and alternatives affecting congressional oversight in the field.
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report, to be updated as events dictate, describes the current select committees on intelligence; characteristics and a model for a possible joint committee; recent actions by Congress; and obstacles affecting legislative oversight in the field.
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report describes the current select committees on intelligence; characteristics and a model for a possible joint committee; recent actions by Congress; and obstacles affecting legislative oversight in the field.
Congressional Oversight of Intelligence: Current Structure and Alternatives
This report, to be updated as events dictate, describes the current select committees on intelligence; characteristics and a model for a possible joint committee; recent actions by Congress; and obstacles affecting legislative oversight in the field.
Consolidating Intelligence Appropriation and Authorization in a Single Committee: 9/11 Commission Recommendation and Alternatives
This report focuses on the commission’s proposal, to consolidate appropriation and authorization functions in the existing Senate and House Select Intelligence Committees. The report (1) describes the proposal; (2) compares it to the existing committee system; (3) describes a 19th century precedent for consolidation; (4) provides selected arguments in favor of consolidation as well as against; (5) discusses two alternatives to consolidating authorization and appropriation functions: a Joint Committee on Intelligence and separate intelligence appropriations subcommittees in the Senate and House Committees on Appropriations; and (6) describes current legislation.
Counterintelligence Reform at the Department of Energy: Policy Issues and Organizational Alternatives
Lapses in the Department of Energy’s (DOE) security and counterintelligence program have plagued DOE since 1977, when the Department was established through the merger of 40 government organizations, including the Energy Research and Development Administration and the Federal Energy Administration.1 Some policymakers expected the new agency to focus the government’s energy-related enterprises almost solely on the energy crisis. Others saw DOE as an unsuccessful attempt to fuse vastly diverse organizations, many with significantly different, if not conflicting missions.
Court-Ordered Access to Smart Phones: In Brief
This report specifically examines certain encryption issues that have been raised in the investigation of the December 2, 2015, terrorist attack in San Bernardino, CA. This report highlights certain issues that policymakers may examine as they follow the ongoing dispute between law enforcement and technology companies, and it focuses on questions related to the government's request.
Covert Action and Clandestine Activities of the Intelligence Community: Selected Definitions in Brief
This report provides definitions of clandestine versus covert intelligence activities and discusses what agencies are authorized to undertake which types of intelligence. It also covers military intelligence terms that are different than ones used by civilian government activities.
Covert Action and Clandestine Activities of the Intelligence Community: Selected Notification Requirements in Brief
This report discusses the requirements for notifying Congress of covert action and clandestine activities of the intelligence community and activities of the military. These requirements originated from instances in the 1970s when media disclosure of past intelligence abuses underscored reasons for Congress taking a more active role in oversight. Over time, these requirements were written into statute or became custom.
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider.
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counterterrorism intelligence activities as part of what the Bush Administration termed the global war on terror. Some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congressional intelligence committees. This report examines the legislative background surrounding covert action and poses several related policy questions.
Covert Action: Legislative Background and Possible Policy Questions
This report examines the statutory procedures governing covert action and associated questions to consider.
Covert Action: Legislative Background and Possible Policy Questions
This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. It also examines the statutory procedures governing covert action and associated questions to consider.
Covert Action: Legislative Background and Possible Policy Questions
Published reports have suggested that in the wake of the 9/11 terrorist attacks, the Pentagon has expanded its counter-terrorism intelligence activities as part of what the Bush Administration termed the global war on terror. This report discusses the Department of Defense's (DOD) various counter-terrorist intelligence activities, whether or not they constitute classification as "covert action," and the challenge of clarifying the roles and responsibilities of various intelligence activities with regard to clandestine activities. This report examines the statutory procedures governing covert action and associated questions to consider.
Covert Action: Legislative Background and Possible Policy Questions
This report examines the statutory procedures governing covert action and associated questions to consider. Published reports have suggested that the Pentagon has expanded its counter-terrorism intelligence activities, and some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congressional intelligence committees.
Criminal Prohibitions on the Publication of Classified Defense Information
This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of previous legislative efforts to criminalize the unauthorized disclosure of classified information.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of recent legislation relevant to the issue as well as some previous efforts to criminalize the unauthorized disclosure of classified information.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report identifies some criminal statutes that may apply and also discusses the statutory prohibitions that may be implicated, such as the Espionage Act.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization WikiLeaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. The Justice Department and Department of Defense are investigating the circumstances to determine whether any prosecutions will be undertaken in connection with the disclosure. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals. The report provides a summary of recent legislation relevant to the issue as well as some previous efforts to criminalize the unauthorized disclosure of classified information.
Criminal Prohibitions on the Publication of Classified Defense Information
The recent online publication of classified defense documents by the organization Wikileaks and subsequent reporting by the New York Times and other news media have focused attention on whether such publication violates U.S. criminal law. This report discusses the statutory prohibitions that may be implicated, including the Espionage Act; the extraterritorial application of such statutes; and the First Amendment implications related to such prosecutions against domestic or foreign media organizations and associated individuals.
CRS Issue Statement on Intelligence Policy
This report contains the distinction between foreign and law enforcement intelligence that remain important when civil liberties and privacy rights of U.S. persons are involved.
Cybersecurity: Selected Legal Issues
This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also discusses the degree to which federal law may preempt state law.
The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress
This report provides an overview of the DHS IE both at headquarters and within the components. It examines how DHS IE is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options for Congress to consider on these issues.
The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress
This report provides an overview of Department of Homeland Security Intelligence (DHSI) both at headquarters and within the components. It examines how DHSI is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; and support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options that Congress may consider on certain issues.
Back to Top of Screen