the_patriot_act
sadefasefaefaes BIG BROTHER IS WATCHING YOU.......

Many people believe that no matter how many of us make ourselves heard, the government never listens. That's not true. History has shown that if we protest, march, vote and inform others, sooner or later the politicians do listen. But it takes large numbers of people acting together with a common goal in order to cause change. We Need Your Help. Join The Fight For Your Freedom.

Patriot Act Reforms Rebuffed for Now

The U.S. House of Representatives sent President Obama a bill extending three often-contested provisions of the Patriot Act on the evening of February 26, two days before the sections were due to expire. Approved by a vote of 315-97 the night after the Senate passed the bill by voice vote, H.R. 3961 extends until February 28, 2011, the surveillance sections, which have prompted repeated statements of concern from library organizations and civil liberties groups. The president signed H.R. 3961 into law February 27.

Although several lawmakers introduced reform bills last fall, none of them had made it to the Senate floor for consideration before the extension. The bills sought to reinstitute privacy protections for U.S. citizens by tightening judicial oversight of Section 215, known as the library provision for authorizing the Justice Department to conduct searches of library and bookstore records in the investigation of suspected terrorist activity.

The reform bills had also sought to increase oversight of Section 206, which permits the issuance of roving "John Doe" wiretaps on unidentified individuals or facilities, and Section 6001 of the Intelligence Reform and Terrorism Prevention Act of 2004, known as the lone wolf provision because it allows the government to surveil non-U.S. citizens who are not part of a foreign organization.

"Congress refuses to make reforming the Patriot Act a priority," said Laura Murphy, director of the Washington Legislative Office of the American Civil Liberties Union, in a February 25 statement that followed an ACLU letter to the House urging representatives to reject the reauthorization. "We shouldn't have to live under these unconstitutional provisions for another year."

Praising the extensions as demonstrating "a growing recognition that these crucial provisions must be preserved," Sen. Jeff Sessions (R-Ala.) told MSNBC February 25,"Recent terror attacks, such as those at Fort Hood and on Christmas Day, demonstrate just how severe of a threat we are facing."

"The American Library Association understands why the Democratic leadership has to go with a clean reauthorization, but that doesn't take away the disappointment we have," said Lynne Bradley, director of the Office of Government Relations at ALA's Washington Office, in the February 25 Washington Post.

Rep. Jerrold Nadler (D-N.Y.) also expressed disappointment. "I hope that this vote today will not stop my colleagues from continuing to improve our intelligence-gathering laws," he told Politico.com February 25.



U.S. Spies Buy Stake in Firm That Monitors Blogs, Tweets


America’s spy agencies want to read your blog posts, keep track of your Twitter updates — even check out your book reviews on Amazon.

In-Q-Tel, the investment arm of the CIA and the wider intelligence community, is putting cash into Visible Technologies, a software firm that specializes in monitoring social media. It’s part of a larger movement within the spy services to get better at usingopen source intelligence” — information that’s publicly available, but often hidden in the flood of TV shows, newspaper articles, blog posts, online videos and radio reports generated every day.

Visible crawls over half a million web 2.0 sites a day, scraping more than a million posts and conversations taking place on blogs, online forums, Flickr, YouTube, Twitter and Amazon. (It doesn’t touch closed social networks, like Facebook, at the moment.) Customers get customized, real-time feeds of what’s being said on these sites, based on a series of keywords.

That’s kind of the basic stepget in and monitor,” says company senior vice president Blake Cahill.

Then Visible “scores” each post, labeling it as positive or negative, mixed or neutral. It examines how influential a conversation or an author is. (“Trying to determine who really matters,” as Cahill puts it.) Finally, Visible gives users a chance to tag posts, forward them to colleagues and allow them to response through a web interface.

In-Q-Tel says it wants Visible to keep track of foreign social media, and give spooks “early-warning detection on how issues are playing internationally,” spokesperson Donald Tighe tells Danger Room.

Of course, such a tool can also be pointed inward, at domestic bloggers or tweeters. Visible already keeps tabs on web 2.0 sites for Dell, AT&T and Verizon. For Microsoft, the company is monitoring the buzz on its Windows 7 rollout. For Spam-maker Hormel, Visible is tracking animal-right activists’ online campaigns against the company.

Anything that is out in the open is fair game for collection,” says Steven Aftergood, who tracks intelligence issues at the Federation of American Scientists. Buteven if information is openly gathered by intelligence agencies it would still be problematic if it were used for unauthorized domestic investigations or operations. Intelligence agencies or employees might be tempted to use the tools at their disposal to compile information on political figures, critics, journalists or others, and to exploit such information for political advantage. That is not permissible even if all of the information in question is technicallyopen source.’”


Visible chief executive officer Dan Vetras says the CIA is now anend customer,” thanks to the In-Q-Tel investment. And more government clients are now on the horizon. “We just got awarded another one in the last few days,” Vetras adds.

Tighe disputes thissort of. “This contract, this deal, this investment has nothing to do with any agency of government and this company,” he says. But Tighe quickly notes that In-Q-Tel does havean interested end customer” in the intelligence community for Visibile. And if all goes well, the company’s software will be used in pilot programs at that agency. “In pilots, we use real data. And during the adoption phase, we use it real missions.”

Neither party would disclose the size of In-Q-Tel’s investment in Visible, a 90-person company with expected revenues of about $20 million in 2010. But a source familiar with the deal says the In-Q-Tel cash will be used to boost Visible’s foreign languages capabilities, which already include Arabic, French, Spanish and nine other languages.

Visible has been trying for nearly a year to break into the government field. In late 2008, the company teamed up with the Washington, DC, consulting firm Concepts & Strategies, which has handled media monitoring and translation services for U.S. Strategic Command and the Joint Chiefs of Staff, among others. On its website, Concepts & Strategies is recruitingsocial media engagement specialists” with Defense Department experience and a high proficiency in Arabic, Farsi, French, Urdu or Russian. The company is also looking for aninformation system security engineerwho already has aTop Secret SCI [Sensitive Compartmentalized Information] with NSA Full Scope Polygraph” security clearance.

The intelligence community has been interested in social media for years. In-Q-Tel has sunk money into companies like Attensity, which recently announced its own web 2.0-monitoring service. The agencies have their own, password-protected blogs and wikiseven a MySpace for spooks. The Office of the Director of National Intelligence maintains an Open Source Center, which combs publicly available information, including web 2.0 sites. Doug Naquin, the Center’s Director, told an audience of intelligence professionals in October 2007 thatwe’re looking now at YouTube, which carries some unique and honest-to-goodness intelligence…. We have groups looking at what they call ‘citizens media’: people taking pictures with their cell phones and posting them on the internet. Then there’s social media, phenomena like MySpace and blogs.”

But, “the CIA specifically needs the help of innovative tech firms to keep up with the pace of innovation in social media. Experienced IC [intelligence community] analysts may not be the best at detecting the incessant shift in popularity of social-networking sites. They need help in following young international internet user-herds as they move their allegiance from one site to another,” Lewis Shepherd, the former senior technology officer at the Defense Intelligence Agency, says in an e-mail. “Facebook says that more than 70 percent of its users are outside the U.S., in more than 180 countries. There are more than 200 non-U.S., non-English-language microblogging Twitter-clone sites today. If the intelligence community ignored that tsunami of real-time information, we’d call them incompetent.” -wired.com
110906
...
sadefasefaefaes THE CONTENTS OF THE PATRIOT ACT IF YOU WANT TO READ THE PATRIOT ACT IN PART OR IN WHOLE HERE IS A LINK FOR YOU

-link to read the patriot act


Bill 4 of 4
Final version (Enrolled Bill) as passed by both Houses. There are 3 other versions of this bill.

H.R.3162 -- Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001 (Enrolled Bill [Final as Passed Both House and Senate] - ENR)
Beginning
SECTION 1. SHORT TITLE AND TABLE OF CONTENTS.
Sec. 1. Short title and table of contents.
SEC. 2. CONSTRUCTION; SEVERABILITY.
TITLE I--ENHANCING DOMESTIC SECURITY AGAINST TERRORISM
SEC. 101. COUNTERTERRORISM FUND.
SEC. 102. SENSE OF CONGRESS CONDEMNING DISCRIMINATION AGAINST ARAB AND MUSLIM AMERICANS.
SEC. 103. INCREASED FUNDING FOR THE TECHNICAL SUPPORT CENTER AT THE FEDERAL BUREAU OF INVESTIGATION.
SEC. 104. REQUESTS FOR MILITARY ASSISTANCE TO ENFORCE PROHIBITION IN CERTAIN EMERGENCIES.
SEC. 105. EXPANSION OF NATIONAL ELECTRONIC CRIME TASK FORCE INITIATIVE.
SEC. 106. PRESIDENTIAL AUTHORITY.
TITLE II--ENHANCED SURVEILLANCE PROCEDURES
SEC. 201. AUTHORITY TO INTERCEPT WIRE, ORAL, AND ELECTRONIC COMMUNICATIONS RELATING TO TERRORISM.
SEC. 202. AUTHORITY TO INTERCEPT WIRE, ORAL, AND ELECTRONIC COMMUNICATIONS RELATING TO COMPUTER FRAUD AND ABUSE OFFENSES.
SEC. 203. AUTHORITY TO SHARE CRIMINAL INVESTIGATIVE INFORMATION.
SEC. 205. EMPLOYMENT OF TRANSLATORS BY THE FEDERAL BUREAU OF INVESTIGATION.
SEC. 206. ROVING SURVEILLANCE AUTHORITY UNDER THE FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1978.
SEC. 207. DURATION OF FISA SURVEILLANCE OF NON-UNITED STATES PERSONS WHO ARE AGENTS OF A FOREIGN POWER.
SEC. 208. DESIGNATION OF JUDGES.
SEC. 209. SEIZURE OF VOICE-MAIL MESSAGES PURSUANT TO WARRANTS.
SEC. 210. SCOPE OF SUBPOENAS FOR RECORDS OF ELECTRONIC COMMUNICATIONS.
SEC. 211. CLARIFICATION OF SCOPE.
SEC. 212. EMERGENCY DISCLOSURE OF ELECTRONIC COMMUNICATIONS TO PROTECT LIFE AND LIMB.
`Sec. 2702. Voluntary disclosure of customer communications or records';
`Sec. 2703. Required disclosure of customer communications or records';
SEC. 213. AUTHORITY FOR DELAYING NOTICE OF THE EXECUTION OF A WARRANT.
SEC. 214. PEN REGISTER AND TRAP AND TRACE AUTHORITY UNDER FISA.
SEC. 215. ACCESS TO RECORDS AND OTHER ITEMS UNDER THE FOREIGN INTELLIGENCE SURVEILLANCE ACT.
`SEC. 501. ACCESS TO CERTAIN BUSINESS RECORDS FOR FOREIGN INTELLIGENCE AND INTERNATIONAL TERRORISM INVESTIGATIONS.
`SEC. 502. CONGRESSIONAL OVERSIGHT.
SEC. 216. MODIFICATION OF AUTHORITIES RELATING TO USE OF PEN REGISTERS AND TRAP AND TRACE DEVICES.
SEC. 217. INTERCEPTION OF COMPUTER TRESPASSER COMMUNICATIONS.
SEC. 218. FOREIGN INTELLIGENCE INFORMATION.
SEC. 219. SINGLE-JURISDICTION SEARCH WARRANTS FOR TERRORISM.
SEC. 220. NATIONWIDE SERVICE OF SEARCH WARRANTS FOR ELECTRONIC EVIDENCE.
SEC. 221. TRADE SANCTIONS.
SEC. 222. ASSISTANCE TO LAW ENFORCEMENT AGENCIES.
SEC. 223. CIVIL LIABILITY FOR CERTAIN UNAUTHORIZED DISCLOSURES.
`Sec. 2712. Civil actions against the United States
SEC. 224. SUNSET.
SEC. 225. IMMUNITY FOR COMPLIANCE WITH FISA WIRETAP.
TITLE III--INTERNATIONAL MONEY LAUNDERING ABATEMENT AND ANTI-TERRORIST FINANCING ACT OF 2001
SEC. 301. SHORT TITLE.
SEC. 302. FINDINGS AND PURPOSES.
SEC. 303. 4-YEAR CONGRESSIONAL REVIEW; EXPEDITED CONSIDERATION.
Subtitle A--International Counter Money Laundering and Related Measures
SEC. 312. SPECIAL DUE DILIGENCE FOR CORRESPONDENT ACCOUNTS AND PRIVATE BANKING ACCOUNTS.
SEC. 313. PROHIBITION ON UNITED STATES CORRESPONDENT ACCOUNTS WITH FOREIGN SHELL BANKS.
SEC. 314. COOPERATIVE EFFORTS TO DETER MONEY LAUNDERING.
SEC. 315. INCLUSION OF FOREIGN CORRUPTION OFFENSES AS MONEY LAUNDERING CRIMES.
SEC. 316. ANTI-TERRORIST FORFEITURE PROTECTION.
SEC. 317. LONG-ARM JURISDICTION OVER FOREIGN MONEY LAUNDERERS.
SEC. 318. LAUNDERING MONEY THROUGH A FOREIGN BANK.
SEC. 319. FORFEITURE OF FUNDS IN UNITED STATES INTERBANK ACCOUNTS.
SEC. 320. PROCEEDS OF FOREIGN CRIMES.
SEC. 321. FINANCIAL INSTITUTIONS SPECIFIED IN SUBCHAPTER II OF CHAPTER 53 OF TITLE 31, UNITED STATES CODE.
SEC. 322. CORPORATION REPRESENTED BY A FUGITIVE.
SEC. 323. ENFORCEMENT OF FOREIGN JUDGMENTS.
SEC. 324. REPORT AND RECOMMENDATION.
SEC. 325. CONCENTRATION ACCOUNTS AT FINANCIAL INSTITUTIONS.
SEC. 326. VERIFICATION OF IDENTIFICATION.
SEC. 327. CONSIDERATION OF ANTI-MONEY LAUNDERING RECORD.
SEC. 328. INTERNATIONAL COOPERATION ON IDENTIFICATION OF ORIGINATORS OF WIRE TRANSFERS.
SEC. 329. CRIMINAL PENALTIES.
Subtitle B--Bank Secrecy Act Amendments and Related Improvements
SEC. 351. AMENDMENTS RELATING TO REPORTING OF SUSPICIOUS ACTIVITIES.
SEC. 352. ANTI-MONEY LAUNDERING PROGRAMS.
SEC. 354. ANTI-MONEY LAUNDERING STRATEGY.
SEC. 355. AUTHORIZATION TO INCLUDE SUSPICIONS OF ILLEGAL ACTIVITY IN WRITTEN EMPLOYMENT REFERENCES.
SEC. 356. REPORTING OF SUSPICIOUS ACTIVITIES BY SECURITIES BROKERS AND DEALERS; INVESTMENT COMPANY STUDY.
SEC. 357. SPECIAL REPORT ON ADMINISTRATION OF BANK SECRECY PROVISIONS.
SEC. 358. BANK SECRECY PROVISIONS AND ACTIVITIES OF UNITED STATES INTELLIGENCE AGENCIES TO FIGHT INTERNATIONAL TERRORISM.
`Sec. 5319. Availability of reports
`Sec. 626. Disclosures to governmental agencies for counterterrorism purposes
SEC. 359. REPORTING OF SUSPICIOUS ACTIVITIES BY UNDERGROUND BANKING SYSTEMS.
SEC. 360. USE OF AUTHORITY OF UNITED STATES EXECUTIVE DIRECTORS.
SEC. 361. FINANCIAL CRIMES ENFORCEMENT NETWORK.
`Sec. 310. Financial Crimes Enforcement Network
SEC. 362. ESTABLISHMENT OF HIGHLY SECURE NETWORK.
SEC. 363. INCREASE IN CIVIL AND CRIMINAL PENALTIES FOR MONEY LAUNDERING.
SEC. 364. UNIFORM PROTECTION AUTHORITY FOR FEDERAL RESERVE FACILITIES.
SEC. 365. REPORTS RELATING TO COINS AND CURRENCY RECEIVED IN NONFINANCIAL TRADE OR BUSINESS.
`Sec. 5331. Reports relating to coins and currency received in nonfinancial trade or business
SEC. 366. EFFICIENT USE OF CURRENCY TRANSACTION REPORT SYSTEM.
Subtitle C--Currency Crimes and Protection
SEC. 371. BULK CASH SMUGGLING INTO OR OUT OF THE UNITED STATES.
`Sec. 5332. Bulk cash smuggling into or out of the United States
SEC. 372. FORFEITURE IN CURRENCY REPORTING CASES.
SEC. 373. ILLEGAL MONEY TRANSMITTING BUSINESSES.
`Sec. 1960. Prohibition of unlicensed money transmitting businesses
SEC. 374. COUNTERFEITING DOMESTIC CURRENCY AND OBLIGATIONS.
SEC. 375. COUNTERFEITING FOREIGN CURRENCY AND OBLIGATIONS.
SEC. 376. LAUNDERING THE PROCEEDS OF TERRORISM.
SEC. 377. EXTRATERRITORIAL JURISDICTION.
TITLE IV--PROTECTING THE BORDER
Subtitle A--Protecting the Northern Border
SEC. 401. ENSURING ADEQUATE PERSONNEL ON THE NORTHERN BORDER.
SEC. 402. NORTHERN BORDER PERSONNEL.
SEC. 404. LIMITED AUTHORITY TO PAY OVERTIME.
SEC. 405. REPORT ON THE INTEGRATED AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM FOR PORTS OF ENTRY AND OVERSEAS CONSULAR POSTS.
Subtitle B--Enhanced Immigration Provisions
SEC. 411. DEFINITIONS RELATING TO TERRORISM.
SEC. 412. MANDATORY DETENTION OF SUSPECTED TERRORISTS; HABEAS CORPUS; JUDICIAL REVIEW.
`MANDATORY DETENTION OF SUSPECTED TERRORISTS; HABEAS CORPUS; JUDICIAL REVIEW
SEC. 413. MULTILATERAL COOPERATION AGAINST TERRORISTS.
SEC. 414. VISA INTEGRITY AND SECURITY.
SEC. 415. PARTICIPATION OF OFFICE OF HOMELAND SECURITY ON ENTRY-EXIT TASK FORCE.
SEC. 416. FOREIGN STUDENT MONITORING PROGRAM.
SEC. 417. MACHINE READABLE PASSPORTS.
SEC. 418. PREVENTION OF CONSULATE SHOPPING.
Subtitle C--Preservation of Immigration Benefits for Victims of Terrorism
SEC. 421. SPECIAL IMMIGRANT STATUS.
SEC. 422. EXTENSION OF FILING OR REENTRY DEADLINES.
SEC. 423. HUMANITARIAN RELIEF FOR CERTAIN SURVIVING SPOUSES AND CHILDREN.
SEC. 424. `AGE-OUT' PROTECTION FOR CHILDREN.
SEC. 425. TEMPORARY ADMINISTRATIVE RELIEF.
SEC. 426. EVIDENCE OF DEATH, DISABILITY, OR LOSS OF EMPLOYMENT.
SEC. 427. NO BENEFITS TO TERRORISTS OR FAMILY MEMBERS OF TERRORISTS.
SEC. 428. DEFINITIONS.
TITLE V--REMOVING OBSTACLES TO INVESTIGATING TERRORISM
SEC. 501. ATTORNEY GENERAL'S AUTHORITY TO PAY REWARDS TO COMBAT TERRORISM.
SEC. 502. SECRETARY OF STATE'S AUTHORITY TO PAY REWARDS.
SEC. 503. DNA IDENTIFICATION OF TERRORISTS AND OTHER VIOLENT OFFENDERS.
SEC. 504. COORDINATION WITH LAW ENFORCEMENT.
SEC. 505. MISCELLANEOUS NATIONAL SECURITY AUTHORITIES.
SEC. 506. EXTENSION OF SECRET SERVICE JURISDICTION.
SEC. 507. DISCLOSURE OF EDUCATIONAL RECORDS.
SEC. 508. DISCLOSURE OF INFORMATION FROM NCES SURVEYS.
TITLE VI--PROVIDING FOR VICTIMS OF TERRORISM, PUBLIC SAFETY OFFICERS, AND THEIR FAMILIES
Subtitle A--Aid to Families of Public Safety Officers
SEC. 612. TECHNICAL CORRECTION WITH RESPECT TO EXPEDITED PAYMENTS FOR HEROIC PUBLIC SAFETY OFFICERS.
SEC. 613. PUBLIC SAFETY OFFICERS BENEFIT PROGRAM PAYMENT INCREASE.
SEC. 614. OFFICE OF JUSTICE PROGRAMS.
Subtitle B--Amendments to the Victims of Crime Act of 1984
SEC. 621. CRIME VICTIMS FUND.
SEC. 622. CRIME VICTIM COMPENSATION.
SEC. 623. CRIME VICTIM ASSISTANCE.
SEC. 624. VICTIMS OF TERRORISM.
TITLE VII--INCREASED INFORMATION SHARING FOR CRITICAL INFRASTRUCTURE PROTECTION
TITLE VIII--STRENGTHENING THE CRIMINAL LAWS AGAINST TERRORISM
SEC. 801. TERRORIST ATTACKS AND OTHER ACTS OF VIOLENCE AGAINST MASS TRANSPORTATION SYSTEMS.
`Sec. 1993. Terrorist attacks and other acts of violence against mass transportation systems
SEC. 802. DEFINITION OF DOMESTIC TERRORISM.
SEC. 803. PROHIBITION AGAINST HARBORING TERRORISTS.
`Sec. 2339. Harboring or concealing terrorists
SEC. 804. JURISDICTION OVER CRIMES COMMITTED AT U.S. FACILITIES ABROAD.
SEC. 805. MATERIAL SUPPORT FOR TERRORISM.
SEC. 806. ASSETS OF TERRORIST ORGANIZATIONS.
SEC. 807. TECHNICAL CLARIFICATION RELATING TO PROVISION OF MATERIAL SUPPORT TO TERRORISM.
SEC. 808. DEFINITION OF FEDERAL CRIME OF TERRORISM.
SEC. 809. NO STATUTE OF LIMITATION FOR CERTAIN TERRORISM OFFENSES.
`Sec. 3286. Extension of statute of limitation for certain terrorism offenses
SEC. 810. ALTERNATE MAXIMUM PENALTIES FOR TERRORISM OFFENSES.
SEC. 811. PENALTIES FOR TERRORIST CONSPIRACIES.
SEC. 812. POST-RELEASE SUPERVISION OF TERRORISTS.
SEC. 813. INCLUSION OF ACTS OF TERRORISM AS RACKETEERING ACTIVITY.
SEC. 814. DETERRENCE AND PREVENTION OF CYBER TERRORISM.
SEC. 815. ADDITIONAL DEFENSE TO CIVIL ACTIONS RELATING TO PRESERVING RECORDS IN RESPONSE TO GOVERNMENT REQUESTS.
SEC. 816. DEVELOPMENT AND SUPPORT OF CYBER SECURITY FORENSIC CAPABILITIES.
SEC. 817. EXPANSION OF THE BIOLOGICAL WEAPONS STATUTE.
`SEC. 175b. POSSESSION BY RESTRICTED PERSONS.
TITLE IX--IMPROVED INTELLIGENCE
SEC. 904. TEMPORARY AUTHORITY TO DEFER SUBMITT
AL TO CONGRESS OF REPORTS ON INTELLIGENCE AND INTELLIGENCE-RELATED MATTERS.
SEC. 906. FOREIGN TERRORIST ASSET TRACKING CENTER.
SEC. 907. NATIONAL VIRTUAL TRANSLATION CENTER.
SEC. 908. TRAINING OF GOVERNMENT OFFICIALS REGARDING IDENTIFICATION AND USE OF FOREIGN INTELLIGENCE.
TITLE X--MISCELLANEOUS
SEC. 1001. REVIEW OF THE DEPARTMENT OF JUSTICE.
SEC. 1002. SENSE OF CONGRESS.
SEC. 1003. DEFINITION OF `ELECTRONIC SURVEILLANCE'.
SEC. 1004. VENUE IN MONEY LAUNDERING CASES.
SEC. 1005. FIRST RESPONDERS ASSISTANCE ACT.
SEC. 1006. INADMISSIBILITY OF ALIENS ENGAGED IN MONEY LAUNDERING.
SEC. 1007. AUTHORIZATION OF FUNDS FOR DEA POLICE TRAINING IN SOUTH AND CENTRAL ASIA.
SEC. 1009. STUDY OF ACCESS.
SEC. 1011. CRIMES AGAINST CHARITABLE AMERICANS.
SEC. 1012. LIMITATION ON ISSUANCE OF HAZMAT LICENSES.
`Sec. 5103a. Limitation on issuance of hazmat licenses
SEC. 1013. EXPRESSING THE SENSE OF THE SENATE CONCERNING THE PROVISION OF FUNDING FOR BIOTERRORISM PREPAREDNESS AND RESPONSE.
SEC. 1014. GRANT PROGRAM FOR STATE AND LOCAL DOMESTIC PREPAREDNESS SUPPORT.
SEC. 1016. CRITICAL INFRASTRUCTURES PROTECTION.



"My response to this is that if the C.I.A. ever feels the need to do some surveillance on this site then this page is for you"
110906
what's it to you?
who go
blather
from