Sensitive Covert Action Notifications

Sensitive Covert Action Notifications PDF Author: Alfred Cumming
Publisher: DIANE Publishing
ISBN: 143792803X
Category : Political Science
Languages : en
Pages : 17

Get Book

Book Description
Legislation enacted in 1980 gave the executive branch authority to limit advance notification of especially sensitive covert actions to 8 Members of Congress -- the ¿Gang of Eight¿ (G8) -- when the Pres. determines that it is essential to limit prior notice in order to meet extraordinary circumstances affecting U.S. vital interests. Partial contents of this report: Requirements for Notifications of Sensitive Covert Actions to Congress; Additional G8 Requirements; When Prior Notice to the G8 is Withheld; Directors of National Intell. and CIA Critical of G8 Notifications For Non-Covert Actions; House Intell. Committee Replaces G8 Procedure in FY 2010 Intell. Authorization Act; G8 Notifications: The Historic Record; Conclusion: Striking a Balance. Charts and tables.

Sensitive Covert Action Notifications

Sensitive Covert Action Notifications PDF Author: Alfred Cumming
Publisher:
ISBN:
Category : Espionage
Languages : en
Pages : 12

Get Book

Book Description
Legislation enacted in 1980 gave the executive branch authority to limit advance notification of especially sensitive covert actions to eight Members of Congress--the 'Gang of Eight'--when the President determines that it is essential to limit prior notice in order to meet extraordinary circumstances affecting U.S. vital interests. In such cases, the executive branch is permitted by statute to limit notification to the chairmen and ranking minority members of the two congressional intelligence committees, the Speaker and minority leader of the House, and Senate majority and minority leaders, rather than to notify the full intelligence committees, as is required in cases involving covert actions determined to be less sensitive. Congress, in approving this new procedure in 1980, during the Iran hostage crisis, said it intended to preserve operational secrecy in those 'rare' cases involving especially sensitive covert actions while providing the President with advance consultation with the leaders in Congress and the leadership of the intelligence committees who have special expertise and responsibility in intelligence matters. The intent appeared to some to be to provide the President, on a short-term basis, a greater degree of operational security as long as sensitive operations were underway. In 1991, in a further elaboration of its intent following the Iran-Contra Affair, congressional report language stated that limiting notification to the Gang of Eight should occur only in situations involving covert actions of such extraordinary sensitivity or risk to life that knowledge of such activity should be restricted to as few individuals as possible. In its mark-up of H.R. 2701, the FY2010 Intelligence Authorization Act, the House Permanent Select Committee on Intelligence (HPSCI) replaced the Gang of Eight statutory provision, adopting in its place a statutory requirement that each of the intelligence committees establish written procedures as may be necessary to govern such notifications. According to committee report language, the adopted provision vests the authority to limit such briefings with the committees, rather than the President. On July 8, 2009, the executive branch issued a Statement of Administration Policy (SAP) in which it stated that it strongly objected to the House Committee's action to replace the Gang of Eight statutory provision, and that the President's senior advisors would recommend that the President veto the FY2010 Intelligence Authorization Act if the committee's language was retained in the final bill. The Senate Intelligence Committee, in its version of the FY2010 Intelligence Authorization Act, left unchanged the Gang of Eight statutory structure, but approved several changes that would tighten certain aspects of current covert action reporting requirements. Although the executive branch has not issued a Statement of Administration Policy with regard to the Senate's bill, Director of National Intelligence Admiral Dennis Blair has indicated that he would recommend that the President veto the bill if the covert action notification changes contained in the bill remained in final legislation. Congress has not acted on the FY2010 Intelligence Authorization bill. With Congress considering possible changes in covert action congressional notifications, this report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines both the impact of such notifications on congressional oversight as well as options that Congress might consider to possibly improve oversight.

The Agency and the Hill

The Agency and the Hill PDF Author: L. Britt Snider
Publisher: Government Printing Office
ISBN:
Category : Intelligence service
Languages : en
Pages : 412

Get Book

Book Description


The Oxford Handbook of National Security Intelligence

The Oxford Handbook of National Security Intelligence PDF Author: Loch K. Johnson
Publisher: Oxford University Press
ISBN: 0199888477
Category : Political Science
Languages : en
Pages : 912

Get Book

Book Description
The Oxford Handbook of National Security Intelligence is a state-of-the-art work on intelligence and national security. Edited by Loch Johnson, one of the world's leading authorities on the subject, the handbook examines the topic in full, beginning with an examination of the major theories of intelligence. It then shifts its focus to how intelligence agencies operate, how they collect information from around the world, the problems that come with transforming "raw" information into credible analysis, and the difficulties in disseminating intelligence to policymakers. It also considers the balance between secrecy and public accountability, and the ethical dilemmas that covert and counterintelligence operations routinely present to intelligence agencies. Throughout, contributors factor in broader historical and political contexts that are integral to understanding how intelligence agencies function in our information-dominated age. The book is organized into the following sections: theories and methods of intelligence studies; historical background; the collection and processing of intelligence; the analysis and production of intelligence; the challenges of intelligence dissemination; counterintelligence and counterterrorism; covert action; intelligence and accountability; and strategic intelligence in other nations.

Intelligence Community Legal Reference Book

Intelligence Community Legal Reference Book PDF Author:
Publisher:
ISBN:
Category : Electronic surveillance
Languages : en
Pages : 944

Get Book

Book Description


Free Course Book for Course 3: Statutory Law and Intelligence 2011

Free Course Book for Course 3: Statutory Law and Intelligence 2011 PDF Author:
Publisher: David Alan Jordan
ISBN:
Category :
Languages : en
Pages : 2170

Get Book

Book Description


Foreign Relations of the United States, 1945-1950

Foreign Relations of the United States, 1945-1950 PDF Author: United States. Department of State
Publisher:
ISBN:
Category : Intelligence service
Languages : en
Pages : 1184

Get Book

Book Description


Congressional Oversight of Intelligence

Congressional Oversight of Intelligence PDF Author: Frederick M. Kaiser
Publisher: DIANE Publishing
ISBN: 143793286X
Category :
Languages : en
Pages : 30

Get Book

Book Description
Contents: (1) Intro.; (2) House and Senate Select Committees on Intelligence; (3) Joint Committee on Atomic Energy as a Model; (4) Proposed Joint Committee on Intelligence Characteristics: Methods of Establishment; Jurisdiction and Authority; Membership; Terms and Rotation; Leadership; Secrecy Controls; Pros and Cons; (5) Alternatives to a Joint Committee: Changing the Select Committees¿ Structure and Powers; Concerns about Restructuring the Intelligence Committees; Constraints on Coordination; Increasing the Use of Congressional Support Agencies; (6) Observations on Oversight of Intelligence: Obstacles to Oversight: Secrecy Constraints. This is a print on demand edition of an important, hard-to-find publication.

Osama bin Laden’s Death: Implications and Considerations

Osama bin Laden’s Death: Implications and Considerations PDF Author:
Publisher: DIANE Publishing
ISBN: 1437985505
Category :
Languages : en
Pages : 26

Get Book

Book Description


The Changing Nature of War

The Changing Nature of War PDF Author: Kristen Boon
Publisher:
ISBN: 019994847X
Category : Law
Languages : en
Pages : 500

Get Book

Book Description
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics in the worldwide effort to combat terrorism. Among the documents collected are transcripts of Congressional testimony, reports by such federal government bodies as the Congressional Research Service (CRS) and the Government Accountability Office (GAO), United Nations Security Council resolutions, reports and investigations by the United Nations Secretary-General and other dedicated UN bodies, and case law from the U.S. and around the globe covering issues related to terrorism. Most volumes carry a single theme, and inside each volume the documents appear within topic-based categories. The series also includes a subject index and other indices that guide the user through this complex area of the law. Volume 127, The Changing Nature of War, tackles how the approach to training for and fighting wars and readying national security is likely to evolve as the United States moves further into the 21st Century. Professor Douglas Lovelace, Jr. has organized and provided framing and illustrative commentary on Congressional Research Service reports, Presidential policy statements, Department of Defense strategy papers, and research reports from the U.S. Army War College's Strategic Studies Institute on contemporary national security topics as: United States war planning; the inter-related policy and force-related concerns of shifting from counterinsurgency-based efforts abroad to a focus on counterterrorism both domestically and abroad; transnational organized crime, with particular emphasis on the Mexican drug cartels operating along the U.S.-Mexico border; and the ever-expanding national security and private economic ramifications of cyberwarfare.