Search Results

open access

Intelligence Issues for Congress

Description: This report discusses intelligence issues for Congress including terrorism, conflicts between Israel and Palestine, in Iraq, and among the former Yugoslav states, and North Korean missile capabilities. Updated March 6, 2003.
Date: March 6, 2003
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department
open access

"Gang of Four" Congressional Intelligence Notifications

Description: "Gang of Four" intelligence notifications generally are oral briefings of certain particularly sensitive non-covert action intelligence activities, including principally, but not exclusively, intelligence collection programs, that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times, but not always, to their respective staff directors. This report reviews the history of Gang of Four notification process an… more
Date: July 14, 2009
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department
open access

Covert Action and Clandestine Activities of the Intelligence Community: Selected Notification Requirements in Brief

Description: This report discusses the requirements for notifying Congress of covert action and clandestine activities of the intelligence community and activities of the military. These requirements originated from instances in the 1970s when media disclosure of past intelligence abuses underscored reasons for Congress taking a more active role in oversight. Over time, these requirements were written into statute or became custom.
Date: May 7, 2018
Creator: DeVine, Michael E. & Peters, Heidi M.
Partner: UNT Libraries Government Documents Department
open access

“Gang of Four” Congressional Intelligence Notifications

Description: "Gang of Four" intelligence notifications are oral briefings on sensitive non-covert action intelligence activities (including intelligence collection programs) that the Intelligence Community typically limits to the chairmen and ranking members of the two congressional intelligence committees, and at times to their respective staff directors. This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Date: March 18, 2011
Creator: Cumming, Alfred
Partner: UNT Libraries Government Documents Department
open access

Intelligence Community Whistleblower Protections: In Brief

Description: This report describes various sources of Intelligence Community (IC) whistleblower protections. Generally speaking, whistleblowers are those who expose misconduct (e.g., fraud, abuse, or illegal activity) within an organization. In the context of the IC, whistleblowers are generally employees or contractors of federal intelligence agencies who bring to light information on agency wrongdoings.
Date: October 18, 2018
Creator: DeVine, Michael E.
Partner: UNT Libraries Government Documents Department
open access

Secrecy Versus Openness: New Proposed Arrangements for Balancing Competing Needs

Description: During the latter half of 2004, disputes arose over whether or not to declassify portions of the sensitive content of reports resulting from congressional investigations and national commission inquiries into the terrorist attacks of September 11, 2001, the war in Iraq, and related matters. As a result, some called for Congress to create a special mechanism for the impartial and expeditious resolution of such disputes (S. 2672/H.R. 4855; S. 2845 amendment). This report discusses the culminatio… more
Date: December 22, 2004
Creator: Relyea, Harold C.
Partner: UNT Libraries Government Documents Department
open access

Intelligence Community Programs, Management, and Enduring Issues

Description: This report explains the management structure for the National Intelligence Program (NIP), and Military Intelligence Program (MIP), to include their two separate budget processes and the roles of the Director of National Intelligence and the Under Secretary of Defense (Intelligence). The concluding section of this report considers the ability of the U.S. government to make the best use of its intelligence-related resources when: (1) total intelligence spending is impossible to calculate; (2) it… more
Date: November 8, 2016
Creator: Daugherty Miles, Anne
Partner: UNT Libraries Government Documents Department
open access

The Intelligence Community and Its Use of Contractors: Congressional Oversight Issues

Description: The report examines, from an acquisition perspective, several reasons for interest in the intelligence community's (IC) use of contractors, notably, the types of functions contractors perform, whether the IC's acquisition workforce has the capacity to oversee contractors.
Date: August 18, 2015
Creator: Halchin, L. E.
Partner: UNT Libraries Government Documents Department
open access

The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

Description: This report provides an overview of the DHS IE both at headquarters and within the components. It examines how DHS IE is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options for Congress to consider on these issues.
Date: March 19, 2010
Creator: Randol, Mark A.
Partner: UNT Libraries Government Documents Department
open access

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business r… more
Date: March 2, 2010
Creator: Henning, Anna C. & Liu, Edward C.
Partner: UNT Libraries Government Documents Department
open access

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business r… more
Date: October 29, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Partner: UNT Libraries Government Documents Department
open access

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business r… more
Date: December 23, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Partner: UNT Libraries Government Documents Department
open access

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business r… more
Date: March 16, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Partner: UNT Libraries Government Documents Department
open access

"Gang of Four" Congressional Intelligence Notifications

Description: This report reviews the history of the Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. The "Gang of Eight" procedure is statutorily based and provides that the chairmen and ranking Members of the intelligence committee, along with the Speaker and minority leader of the House, and Senate majority and minority leaders--rather than the full membership of the intelligence committees-- are to receive prior notice of particularly … more
Date: April 16, 2013
Creator: Erwin, Marshall Curtis
Partner: UNT Libraries Government Documents Department
open access

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Description: The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business r… more
Date: January 6, 2009
Creator: Henning, Anna C. & Liu, Edward C.
Partner: UNT Libraries Government Documents Department
open access

Security Classification Policy and Procedure: E.O. 12958, as Amended

Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Date: June 4, 2009
Creator: Kosar, Kevin R.
Partner: UNT Libraries Government Documents Department
open access

Security Classification Policy and Procedure: E.O. 12958, as Amended

Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Date: May 14, 2003
Creator: Relyea, Harold C.
Partner: UNT Libraries Government Documents Department
open access

Security Classification Policy and Procedure: E.O. 12958, as Amended

Description: This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well.
Date: December 31, 2009
Creator: Kosar, Kevin R.
Partner: UNT Libraries Government Documents Department
open access

Intelligence Issues for Congress

Description: This report includes information regarding intelligence issues for Congress. Recent developments, background and analysis, and selected 106th Congress legislation are among topics discussed in this report.
Date: March 2, 2001
Creator: Best, Richard A., Jr.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen