Lowell, the Stupid City in Massachusetts

What font point, how many words, who reads it? How long in committee? Trigger words? Ah ha ha

Would any criminal do this? Cursive or print?

Who thinks of this crap and then votes with it?

Critics blast Massachusetts city’s new ‘essay’ rule for gun-carry applicants

FNC: Critics are blasting a Massachusetts city’s new law that they claim requires residents applying for a license to carry handguns to write “an essay” and pay upwards of $1,100 for training.

The new laws take effect this week in Lowell, a city of 110,000 that lies 35 miles north of Boston. Pushed by Police Superintendent William Taylor and passed by the City Council, they require applicants for unrestricted handgun licenses to state in writing why they should receive such a license. Taylor, who was unavailable for comment on Monday, has sole discretion for approving or denying the applications.

“It is absurd that people should have to write an essay to the town to explain why they should be able to exercise their constitutional rights,” said Jim Wallace, executive director of Gun Owners Action League of Massachusetts. “We already have a very strict set of gun laws in the state, but this is way over the top.”

“It is absurd that people should have to write an essay to the town to explain why they should be able to exercise their Constitutional rights.”

– Jim Wallace, Gun Owners Action League of Massachusetts.

State law sets guidelines and requirements, but gives local chiefs of police broad discretion in implementation. While other cities and towns in Massachusetts have tough licensing regulations, Lowell’s new requirements, which also include taking a gun safety course over and above one already required by the state, prompted complaints at a public hearing last week.

“I will never write an essay to get my rights as an American citizen,” resident Dan Gannon told the City Council.

The new policy was prompted in part by a year-old federal lawsuit brought by Commonwealth Second Amendment, a Bay State gun-rights group. Attorney David Jensen said the suit stems from Lowell’s history of denying qualified applicants permits to carry handguns without what the plaintiffs consider a legitimate rationale.

Jensen said the jury is still out on whether the new policy will prove a remedy or just a more formal system for rejecting applications.

“The question right now is what they actually do,” Jensen said. “Our initial response to that would be that the Second Amendment secures the right to keep and bear arms. You really shouldn’t be required to write an essay explaining why you would like to exercise this fundamental right.”

Lowell Police spokesman Capt. Timothy Crowley said characterizing the written requirement as an “essay” is not accurate.

“If you want a license to carry a firearm unrestricted wherever you want and whenever you want, the superintendent is just looking for some documentation as to why,” Crowley said. “That is not unreasonable to most people.”

Despite the criticism, the new rules were adopted unanimously and are set to take effect this week.

“We’re no longer taking a cookie-cutter approach to issuing firearms licenses,” City Manager Kevin Murphy told the Lowell Sun, noting that the new policy will allow Taylor to look more closely at each applicant.

That’s exactly what concerns Wallace, who urged Lowell residents not to adhere to the new rules and to simply turn to the courts if and when their applications are denied.

“It’s like having a college professor say, ‘I’m going to read your essay and if I don’t like it, I’m going to give it back to you,’” Wallace said.

A 1998 state law known as the Gun Control Act included a raft of new regulations, fees and requirements that contributed to an 80 percent reduction in gun licenses over time, according to Wallace. The new law in Lowell, which Taylor said has about 6,000 gun owners with licenses to carry, will require a specialized training course.

A local firearms-safety instructor, Randy Breton, told the Sun the training requirement appeared designed to purposely make it cost-prohibitive to apply for a gun permit. He said one five-day course approved by the city costs $1,100.

“It’s beyond ridiculous,” Breton told the newspaper.

United Way was a Great Charity, Right?

Yes, but everything is subject to power and money. When it comes to your child, take extreme caution, ask questions, research and don’t trust anyone. That includes Bill Gates and Common Core. You are the real watchdog for your children, regardless of age, take comfort however, there are people doing great work on your behalf. Use these tools.

   <<— Big and scary

Parents: Don’t Listen to the United Way. Don’t Sign Away Your Child’s Data and Give Up a Constitutional Right to Privacy.

The Family Education Rights Privacy Act (FERPA) has been a stumbling block in accessing data in education reformer plans for many years.  According to the ed reform talking points, it is imperative that personally identifiable information be available so that all federal agencies, state educational agencies and third party researchers have access to this information ostensibly to ‘help your child’.   The request for information and the need for this information has been requested repeatedly by education reformers needing that data for company/agency existence.  The Departments of Education and Health and Human Services need that information as well in order to ‘help your child and your family’ reach the goals the government (not the parents) has indicated is success.

From a previous 2013 article on escholar, a company wanting to use data to track students:

 

*************************

Common Core and the revision of FERPA by the US Department of Education allows intensive data mining and sharing of student information to various federal agencies and private firms selected the the USDOEd.  The company eScholar is one education reform company eager and ready to data mine information on students.  From wsj.com and Education Data Companies Chosen, 08.13.2012:

 

New York state education officials Monday said they selected four companies to build a broad education database that will host students’ test scores, curriculum materials and education apps, paid for by up to $50 million in federal Race to the Top funds.

The state Education Department said that by fall 2013, school districts will be able to use one of the data systems created by either ConnectEDU, eScholar or Pearson PLC and its subsidiary Schoolnet.
The systems are supposed to store student test scores, student demographic information, curriculum materials, lesson plans and other items that teachers or parents can access. Companies will get paid, in part, based on how many school districts select their data system.

It’s financially lucrative for data mining companies to compile student data and advantageous for them to have start up funding provided by taxpayer money. eScholar has produced a video about “Bobby”, a hypothetical student the company is tracking.  From the eScholar website:

 

“Have you met Bobby yet?”

(access video here)

Meet Bobby, the newest member of the eScholar myTrack team. We think that educators have a lot of students like Bobby, students who have things that they want to do, but aren’t always sure how to get there. Check out the video to see how Bobby and his team of supporters use myTrack to help him reach his goals. What do you think? Do you have any students like Bobby?  

eScholar is a company that received federal stimulus dollars to track your child without your knowledge or permission.  Could such behavior and practice be considered not just data mining but stalking?

Should the tracking of student academic and non-academic information and sharing it with federal agencies and private organizations without parental/student knowledge/permission be allowed?  How is the difference in the dissemination of personal information about “Bobby” to others and monitoring “Bobby’s” computer usage via the relaxation of FERPA any different than the definition of how stalkers operate?

Here’s an example of what eScholar will gather on “Bobby” and why:

Enabling P-20 Data Warehousing

Today, a consensus has emerged amongst educators at all levels that there is a need to create an LDS that provides a comprehensive view of education from early childhood through postsecondary and beyond (P-20). This capability is essential to maximizing the effectiveness of our efforts to encourage every student to achieve his or her greatest potential. A key element of this LDS is a comprehensive data warehouse that supports the data requirements of the P-20 world. With the introduction of CDW-PS, which integrates with our eScholar Uniq-ID® products supporting unique identification and ID management of individuals from early childhood through postsecondary, eScholar now has a complete solution for a P-20 data warehouse. Thedata model for the CDW-PS product is specifically designed to integrate with the eScholar Complete Data Warehouse® for PK-12 product to create a comprehensive LDS of over 3,000 data elements encompassing student and teacher academic history from pre-K through higher education. This powerful combination enables SEAs to answer key P-20 questions through one software product solution. 

Should the tracking of student academic and non-academic information and sharing it with federal agencies and private organizations without parental/student knowledge/permission be allowed?  How is the difference in the dissemination of personal information about “Bobby” to others and monitoring “Bobby’s” computer usage via the relaxation of FERPA any different than the definition of how stalkers operate?

************************************

The United Way Salt Lake City (a private NGO) is making a pitch to parents to sign away their children’s right to privacy by agreeing to waive their FERPA protections so that the organization can ‘help’ their child and agencies can then determine the ‘right’ services for their children.  Apparently the Salt Lake City United Way just can’t do its job without parents giving their human capital information to federal agencies, NGOs like The United Way and third party researchers.   Unlike escholar, United Way is making a pitch directly to parents to give away a right that has been constitutionally provided.  The United Way is asking parents to provide active permission to data mine students.  It doesn’t give information on exactly where that information is directed and other than promises that it will make United Way’s partners jobs easier, there is no indication on who has access to this data.

From Emily Talmage in United Way to Parents: Give Us Your Gold:

To get around this law, United Way of Salt Lake City, which has recently partnered with an organization called “StriveTogether” – a subsidiary of KnowledgeWorks Foundation that has received millions from the Gates Foundation – is now encouraging parents to sign a form waiving their FERPA rights.

They’ve even put together a video to convince parents just how important it is that they give up their children’s personal information to just about any organization in the city that wants it – including the Salt Lake City Chamber of Commerce.

 

Here is The United Way’s video cajoling parents into giving their child’s data away.  It’s the same argument made by escholar, it’s because we want the best for your child.  Don’t fall for it.  It’s to have access to the dossier on your human capital.  Do a search on ‘United Way and FERPA’. The United Way is supportive of this administration’s educational reforms and ESSA and many United Way agencies are requesting parents give away their child’s constitutional right to privacy.

In 2015: 84 million

Just imagine, the cyber espionage….industrial espionage….the hacking…..

Do you really want to continue to tell the world about everything you do and who you are connected with on Facebook?

Cybercriminals Making Computer Malware at a Record Rate: Researchers

NBC: Last year was a particularly bad year for hacks and computer intrusions, and it looks like 2016 will only get worse, Panda Security says.

The Spain-based Internet security company said its lab researchers detected and disabled more than 84 million new samples of malware in 2015 — 9 million more than the previous year. The figure means cybercriminals were churning out new malware samples at a rate of more than 230,000 a day throughout 2015.

In fact, more than a quarter (27 percent) of all malware samples ever recorded were produced in 2015, Panda Security said in a news release.

“We predict that the amount of malware created by cybercriminals will continue to grow,” said Luis Corrons, technical director of PandaLabs. “We also can’t forget that the creation of millions of Trojans and other threats corresponds to the cybercriminals’ needs to infect as many users as possible in order to get more money.”

Malware is any type of software that is designed to gain access to and damage or disable a computer.

Trojans, a type of malware disguised as legitimate software, accounted for more than half the malware detected in 2015, according to Panda Security.

China topped the list of countries with the highest rate of infected computers, followed by Taiwan and Turkey. At the other end of the spectrum, nine of the top 10 countries with the lowest rates of infection were in Europe, led by Finland, Norway and Sweden.

***

Barack Obama has been a big user of BIG DATA but he experienced a huge firestorm after the exposure of the NSA programs by Edward Snowden. Barack Obama enlisted John Podesta, at the time his chief of staff and now Hillary Clinton’s presidential campaign architect to commission a study. Sheesh…but nonetheless, here is what you should read in the findings.

From the White House: Over the past several days, severe storms have battered Arkansas, Oklahoma, Mississippi and other states. Dozens of people have been killed and entire neighborhoods turned to rubble and debris as tornadoes have touched down across the region. Natural disasters like these present a host of challenges for first responders. How many people are affected, injured, or dead? Where can they find food, shelter, and medical attention? What critical infrastructure might have been damaged?

Drawing on open government data sources, including Census demographics and NOAA weather data, along with their own demographic databases, Esri, a geospatial technology company, has created a real-time map showing where the twisters have been spotted and how the storm systems are moving. They have also used these data to show how many people live in the affected area, and summarize potential impacts from the storms. It’s a powerful tool for emergency services and communities. And it’s driven by big data technology.

In January, President Obama asked me to lead a wide-ranging review of “big data” and privacy—to explore how these technologies are changing our economy, our government, and our society, and to consider their implications for our personal privacy. Together with Secretary of Commerce Penny Pritzker, Secretary of Energy Ernest Moniz, the President’s Science Advisor John Holdren, the President’s Economic Advisor Jeff Zients, and other senior officials, our review sought to understand what is genuinely new and different about big data and to consider how best to encourage the potential of these technologies while minimizing risks to privacy and core American values.

Over the course of 90 days, we met with academic researchers and privacy advocates, with regulators and the technology industry, with advertisers and civil rights groups. The President’s Council of Advisors for Science and Technology conducted a parallel study of the technological trends underpinning big data. The White House Office of Science and Technology Policy jointly organized three university conferences at MIT, NYU, and U.C. Berkeley. We issued a formal Request for Information seeking public comment, and hosted a survey to generate even more public input.

Today, we presented our findings to the President. We knew better than to try to answer every question about big data in three months. But we are able to draw important conclusions and make concrete recommendations for Administration attention and policy development in a few key areas.

There are a few technological trends that bear drawing out. The declining cost of collection, storage, and processing of data, combined with new sources of data like sensors, cameras, and geospatial technologies, mean that we live in a world of near-ubiquitous data collection. All this data is being crunched at a speed that is increasingly approaching real-time, meaning that big data algorithms could soon have immediate effects on decisions being made about our lives.

The big data revolution presents incredible opportunities in virtually every sector of the economy and every corner of society.

Big data is saving lives. Infections are dangerous—even deadly—for many babies born prematurely. By collecting and analyzing millions of data points from a NICU, one study was able to identify factors, like slight increases in body temperature and heart rate, that serve as early warning signs an infection may be taking root—subtle changes that even the most experienced doctors wouldn’t have noticed on their own.

Big data is making the economy work better. Jet engines and delivery trucks now come outfitted with sensors that continuously monitor hundreds of data points and send automatic alerts when maintenance is needed. Utility companies are starting to use big data to predict periods of peak electric demand, adjusting the grid to be more efficient and potentially averting brown-outs.

Big data is making government work better and saving taxpayer dollars. The Centers for Medicare and Medicaid Services have begun using predictive analytics—a big data technique—to flag likely instances of reimbursement fraud before claims are paid. The Fraud Prevention System helps identify the highest-risk health care providers for waste, fraud, and abuse in real time and has already stopped, prevented, or identified $115 million in fraudulent payments.

But big data raises serious questions, too, about how we protect our privacy and other values in a world where data collection is increasingly ubiquitous and where analysis is conducted at speeds approaching real time. In particular, our review raised the question of whether the “notice and consent” framework, in which a user grants permission for a service to collect and use information about them, still allows us to meaningfully control our privacy as data about us is increasingly used and reused in ways that could not have been anticipated when it was collected.

Big data raises other concerns, as well. One significant finding of our review was the potential for big data analytics to lead to discriminatory outcomes and to circumvent longstanding civil rights protections in housing, employment, credit, and the consumer marketplace.

No matter how quickly technology advances, it remains within our power to ensure that we both encourage innovation and protect our values through law, policy, and the practices we encourage in the public and private sector. To that end, we make six actionable policy recommendations in our report to the President:

Advance the Consumer Privacy Bill of Rights. Consumers deserve clear, understandable, reasonable standards for how their personal information is used in the big data era. We recommend the Department of Commerce take appropriate consultative steps to seek stakeholder and public comment on what changes, if any, are needed to the Consumer Privacy Bill of Rights, first proposed by the President in 2012, and to prepare draft legislative text for consideration by stakeholders and submission by the President to Congress.

Pass National Data Breach Legislation. Big data technologies make it possible to store significantly more data, and further derive intimate insights into a person’s character, habits, preferences, and activities. That makes the potential impacts of data breaches at businesses or other organizations even more serious. A patchwork of state laws currently governs requirements for reporting data breaches. Congress should pass legislation that provides for a single national data breach standard, along the lines of the Administration’s 2011 Cybersecurity legislative proposal.

Extend Privacy Protections to non-U.S. Persons. Privacy is a worldwide value that should be reflected in how the federal government handles personally identifiable information about non-U.S. citizens. The Office of Management and Budget should work with departments and agencies to apply the Privacy Act of 1974 to non-U.S. persons where practicable, or to establish alternative privacy policies that apply appropriate and meaningful protections to personal information regardless of a person’s nationality.

Ensure Data Collected on Students in School is used for Educational Purposes. Big data and other technological innovations, including new online course platforms that provide students real time feedback, promise to transform education by personalizing learning. At the same time, the federal government must ensure educational data linked to individual students gathered in school is used for educational purposes, and protect students against their data being shared or used inappropriately.

Expand Technical Expertise to Stop Discrimination. The detailed personal profiles held about many consumers, combined with automated, algorithm-driven decision-making, could lead—intentionally or inadvertently—to discriminatory outcomes, or what some are already calling “digital redlining.” The federal government’s lead civil rights and consumer protection agencies should expand their technical expertise to be able to identify practices and outcomes facilitated by big data analytics that have a discriminatory impact on protected classes, and develop a plan for investigating and resolving violations of law.

Amend the Electronic Communications Privacy Act. The laws that govern protections afforded to our communications were written before email, the internet, and cloud computing came into wide use. Congress should amend ECPA to ensure the standard of protection for online, digital content is consistent with that afforded in the physical world—including by removing archaic distinctions between email left unread or over a certain age.

We also identify several broader areas ripe for further study, debate, and public engagement that, collectively, we hope will spark a national conversation about how to harness big data for the public good. We conclude that we must find a way to preserve our privacy values in both the domestic and international marketplace. We urgently need to build capacity in the federal government to identify and prevent new modes of discrimination that could be enabled by big data. We must ensure that law enforcement agencies using big data technologies do so responsibly, and that our fundamental privacy rights remain protected. Finally, we recognize that data is a valuable public resource, and call for continuing the Administration’s efforts to open more government data sources and make investments in research and technology.

While big data presents new challenges, it also presents immense opportunities to improve lives, the United States is perhaps better suited to lead this conversation than any other nation on earth. Our innovative spirit, technological know-how, and deep commitment to values of privacy, fairness, non-discrimination, and self-determination will help us harness the benefits of the big data revolution and encourage the free flow of information while working with our international partners to protect personal privacy. This review is but one piece of that effort, and we hope it spurs a conversation about big data across the country and around the world.

Read the Big Data Report.

See the fact sheet from today’s announcement.

Lynch Wants $80 for More Control Control

AG Lynch: We Want $80 Million For Obama’s Gun-Control Plan

The price tag for implementing President Obama’s executive gun controls is $80 million, Attorney General Loretta Lynch declared during her January 20 testimony before the Senate Appropriations subcommittee.

Breitbart: Lynch said the administration will begin pushing for the money in Obama’s 2017 budget request, due next month, according to ABC News.

She’s already meeting some opposition. “This subcommittee will have no part in undermining the Constitution and the rights that it protects,” subcommittee chairman Senator Sen. Richard Shelby (R-AL)  told Lynch.

But another Republican lawmaker–Senator Shelley Moore Capito (R-W.Va.)– suggested she would support the program to expand of background checks on gun-purchasers.

In addition to expanding background checks, putting new requirements on federally licensed gun dealers, and co-opting a ban on gun ownership for some Social Security beneficiaries, Obama’s executive gun controls include the hiring of “more than 230 additional examiners and other staff to help process…background checks.”

Lynch tried to sell the gun-control plan to the subcommittee by claiming that a “glitch” in the background-check system allowed Dylann Roof to buy the gun he used to kill nine people in June 2015 at the Emanuel African Methodist Episcopal Church, in Charleston, S.C.

But this claim runs counter to a statement from FBI Director James Comey. Roof obtained his gun, not because of a problem with background check system, but because of a clerical error made by one of the FBI reviewers who was carrying out Roof’s background check, Comey said.

*** Lynch was recently at the Al Sharpton National Action Network speaking at a breakfast honoring Martin Luther King. If there any questions about who she really is and what she is up to, here are more clues:

Dr. King’s words and deeds – and those of the millions who stood with him – are not vestiges of history, but timeless calls to action.

That call – that mission – has animated the Department of Justice since the inception of this Administration and it fuels our ongoing work to ensure that everyone in this country can achieve the full blessings of American life.  Our revitalized Civil Rights Division – the conscience of the department, led by the outstanding Vanita Gupta – is committed to ensuring that access to the ballot box is as fair and unencumbered as Dr. King dreamed it would be.  Wherever the franchise is being diminished – whether through historical barriers or newly erected ones – we stand prepared to use every tool at our disposal to protect the sacred American right to vote.  The Civil Rights Division is making significant progress bringing criminal civil rights cases, as well.  Over the course of this Administration, we have filed more criminal civil rights cases and prosecuted and convicted more defendants on hate crimes charges than at any other point in the Justice Department’s history.  And we’re working to protect civil rights within criminal justice, in part by strengthening relationships between law enforcement and the communities we serve and ensuring constitutional policing across the country.  We have launched a variety of new programs and innovative efforts at the local level – including my own six-city listening tour – to promote community policing and to build the relationships of trust that are so vital to effective law enforcement.

More broadly, we are working to ensure the fundamental fairness of the criminal justice system.  At the federal level, we are continuing to implement the “Smart on Crime” initiative – a bold reorientation of our prosecutorial approach that Attorney General Holder initiated in 2013.  In its first two years, Smart on Crime has not only been a bipartisan rallying point, but also a resounding success, with federal prosecutors using their resources conscientiously to bring the most serious wrongdoers to justice and with the overall crime rate declining in tandem with the overall incarceration rate for the first time in four decades.  But for fairness to be consistent and to have meaning, we have to look at every stage of the criminal justice process.  That is why we are working to end the school-to-prison pipeline to keep our children on the right path and out of the criminal justice system.  That is why we are investing in diversion and treatment programs that take an evidence-based approach to public health and criminal justice.  And that is why we are making sure that formerly incarcerated individuals have the tools and resources they need to successfully rejoin society and contribute to their communities.  We recently partnered with the Department of Education to extend Pell Grant support to some incarcerated individuals so that they can pursue an education that will not only reduce their likelihood of recidivism, but also throw open doors to opportunity. For all the details on what Lynch said , go here.

*** Note she was hanging with Al Sharpton at the National Action Network, a corrupt organization that owes millions in delinquent income taxes…..

DHS is Not Deporting Visa Overstays

The numbers are staggering but just for the time period of 2015, 482,000 are residing in the United States illegally. This number is clearly worse than those numbers coming in from the southern border.

DHS admits it’s not deporting most visa overstays

WashingtonExaminer: A pair of Department of Homeland Security officials told the Senate Wednesday that the government does not search for most of the people who overstay their temporary visas, a day after DHS said that nearly 500,000 people were still in the U.S. after having overstayed their visas last year.

“I didn’t mean to imply that we’re actually out monitoring them,” Craig Healy, an assistant director at U.S. Immigration and Customs Enforcement, told Sen. Jeff Sessions, R-Ala., during Senate Judiciary subcommittee panel. Healy said that they review the universe of people who overstayed their visas and “prioritize” the deportation of people who went on to commit other crimes.

Their exchange came at the outset of a hearing on the federal government’s failure to implement a biometric system to track entries into and exits from the country, as required by a 2004 law. A Customs and Border Patrol official said the program couldn’t be implemented without causing “gridlock” at U.S. airports, a response that failed to allay bipartisan concern that the lack of this system is an ongoing national security threat.

“The biometric exit system is still not off the ground and that is unfortunate, very unfortunate, because it is a matter of national security,” New York Senator Chuck Schumer, the Democratic leader-in-waiting, said during the hearing.

John Wagner, deputy assistant commissioner of field operations for U.S. Customs and Border Patrol, said the program couldn’t be implemented without causing two-hour delays when boarding airplanes. “It’s the placement of the technology and how you collect it to ensure that the person actually departed the United States,” Wagner said. “There’s no zone to do that.”

These answers frustrated Democratic lawmakers who otherwise disagree with Sessions and other immigration hawks the issue of border security and deportations. “It’s hard for me to envision that we can’t figure out where to get a space to do this at an airport or seaport,” said Senator Al Franken, D-Minn. “If you can’t solve it in 11 or 12 years, how can we know it will ever be solved?”

DHS’s report saying hundreds of thousands of people remained in the United States after having overstayed their visas drew complaints from both parties, but Sessions in particular.

“That is a population of individuals that is larger than any city in Iowa, New Hampshire, or South Carolina,” Sessions said. Healy replied that about 3,000 of the people who had overstayed their visas were under investigation, a statistic Sessions cited to argue that President Obama’s team has made no effort to implement the system or to deport people who overstay their visas, as long as those people “keep their nose clean” and do nothing to draw the attention of law enforcement or counterterrorism officials.

He said the lack of a biometric exit system was part of a broader failure by the Obama administration to implement federal immigration law.

“Our executive branch is on strike against the will of the American people,” Sessions said. “Simply put, there is no border at all if we don’t enforce our visa rules.”

****

Hold on, there is more…

Administration eases visa rules for travelers visiting terror hotspots

FNC: The Obama administration on Thursday eased visa rules for certain European travelers who have visited terror hotspots in the Middle East and Africa, triggering a backlash from congressional lawmakers who sought the restrictions for security reasons.

Moments after the announcement, two key Republicans declared the administration is “blatantly breaking the law” – a law that President Obama signed – by implementing the changes.

“This is not a difference of opinion over statutory interpretation, it is a clear contradiction of the law and the agreement we reached with the White House,” House Homeland Security Committee Chairman Michael McCaul, R-Texas, and Rep. Candice Miller, R-Mich., author of the bill, said in a statement.

The revised requirements announced Thursday pertain to changes passed by Congress in the Visa Waiver Program.

Lawmakers had sought new restrictions to tighten up the program – which allows visa-free travel for residents of eligible countries — in order to prevent Europeans who have joined ISIS from entering the United States. Under the newly passed Visa Waiver Improvement and Terrorist Travel Prevention Act of 2015, nationals of Iraq, Iran, Syria and Sudan as well as other travelers who have visited those countries since Mar. 1, 2011 now must apply for a visa in order to travel to the U.S.

The administration implemented those changes Thursday — but with some changes of its own.

Under the revised requirements, some Europeans who have traveled to those four countries in the last five years may still be allowed to travel to the United States without obtaining a visa if they meet certain criteria.

The administration announced it will use its waiver authority — granted to it in the legislation — to give waivers to travelers who traveled to the terror hotspots as journalists, for work with humanitarian agencies or on behalf of international organizations, regional organizations and sub-national governments on official duty.

Further, an additional waiver was announced for people who have traveled to Iran “for legitimate business-related purposes” since the conclusion of the Iran nuclear deal in July. The administration offers waivers for individuals who have traveled to Iraq for business as well.

Republicans reacted angrily to the waivers, saying the Obama administration had exploited the limited authority and has compromised national security.

“President Obama and his administration’s decision to abuse their limited waiver authority and allow scores of people who have traveled to or are dual nationals of countries like Iraq and Syria flies in the face of reason and congressional intent,” House Judiciary Committee Chairman Bob Goodlatte, R-Va., said in a statement.

“The Obama Administration is essentially rewriting the law by blowing wide open a small window of discretion that Congress gave it for law enforcement and national security reasons,” Goodlatte said.

Under the visa program itself, citizens of 38 countries, mostly in Europe, are generally allowed to travel to the United States without applying for a visa. But they still have to submit biographical information to the Electronic System for Travel Authorization, or ESTA.

The Homeland Security Department said waivers for some ESTA applicants will be granted on a “case-by-case” basis. Those travelers who are denied visa-free travel can still apply for visa through a U.S. embassy in their home country.

The new restrictions had previously been criticized by the Iranian government which suggested the U.S. might be violating the nuclear deal by penalizing legitimate business travel to the country.