Government Information

Earl Gregg Swem Library

The CIA and Signals Intelligence

Categories: Communism,History,Russia,Spying/Intelligence

http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB506/

A collection of 43 documents which cover efforts of the Central Intelligence Agency to engage in signals intelligence operations, sometimes in competition with other U.S. intelligence agencies such as the National Security Agency, during the Cold War period of history.  From the National Security Archive

 

Defensive Best Practices for Destructive Malware

Categories: Consumer Info/Protection,Spying/Intelligence,Telecommunications/Internet

https://www.nsa.gov/ia/_files/factsheets/Defending_Against_Destructive_Malware.pdf

Details several steps that network administrators can take to detect, contain and minimize destructive malware infections.  From the Information Assurance Directorate of the National Security Agency

 

Recommendations Assessment Report

Categories: Civil/Human Rights,Govt Secrecy,Privacy,Spying/Intelligence,Telecommunications/Internet

https://www.pclob.gov/library/Recommendations_Assessment-Report.pdf

22 recommendations directed at the executive branch, Congress, and the Foreign Intelligence Surveillance Court on the implementation of provisions of the PATRIOT Act, specifically the Section 215 Telephone Records and the Section 702 Surveillance programs.  Scolds the administration for not ending the NSA’s telephone records program.  From the Privacy and Civil Liberties Oversight Board

 

Perspectives on the Senate Select Committee on Intelligence (SSCI) “Torture Report” and Enhanced Interrogation Techniques: In Brief

Categories: Civil/Human Rights,Crime/Justice,Laws/Regulations,Religion/Ethics,Spying/Intelligence,Terrorism

http://www.fas.org/sgp/crs/intel/R43906.pdf

Discusses views expressed by public officials, academics, and commentators in a variety of sources on the questions of whether enhanced interrogation amounted to torture, whether it was counter to American values/morals, and whether it was effective.  From the Congressional Research Service, posted by the Federation of American Scientists

 

Intelligence Community Directive on Critical Information

Categories: Homeland Security,Laws/Regulations,Spying/Intelligence

http://www.fas.org/irp/dni/icd/icd-190.pdf

Directive about the handling of critical information which is defined as possible threats to U.S. security so significant that they require the immediate attention of the President and the National Security Council.  Such threats could be hostile acts of another nation, terrorist acts or political disruptions including cyberspace attacks.  From the Office of the Director of National Intelligence

 

U.S. Intelligence and the Soviet Space Program

Categories: History,Russia,Science/Technology,Spying/Intelligence

http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB501/

A collection of about 50 recently declassified documents on U.S. intelligence efforts during the Cold War era to monitor developments in the Soviet Union’s space program.  From the National Security Archive

 

Intelligence Authorization Legislation for FY2014 and FY2015: Provisions, Status, Intelligence Community Framework

Categories: Govt Finance,Laws/Regulations,Spying/Intelligence

http://www.fas.org/sgp/crs/intel/R43793.pdf

Examines selected provisions in the legislation and provides an intelligence community framework in the Appendix.  From the Congressional Research Service, posted by the Federation of American Scientists

 

Final Report of the Rendition, Detention, and Interrogation Network Agency Accountability Board

Categories: Congress,Govt/Business Scandals,Headlines,Spying/Intelligence,Terrorism

https://www.cia.gov/library/reports/Redacted-December-2014-Agency-Accountability-Board-Report.pdf

 

An in-house investigation which absolves agents of the Central Intelligence Agency of allegations of unauthorized access to the computer drives used by staff of the Senate Select Committee on Intelligence, while that group was preparing its study of the CIA’s enhanced interrogation techniques.  From the Office of the Inspector General of the CIA, posted by  Allgov.com

 

Next Page »