An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
In War on Child Porn, US Turns Wounded Soldiers Into Hunters
A group of military veterans take the oath at a U.S. Immigration and Customs Enforcement (ICE) ceremony, swearing them in to serve as analysts on child exploitation cases, at ICE headquarters in Washington, March 31, 2017. (B. Hamdard/VOA)
The language at a small graduation ceremony inside a federal office building in Washington Friday morning was militaristic: Fighting. Frontlines. Enemies. War.
For a fifth year, U.S. Immigration and Customs Enforcement (ICE) rather quietly has trained a small team of injured, wounded or sick military veterans for a different type of deployment – supporting the agency’s lesser-known investigative arm as analysts on child exploitation cases – the ones who will be able to take photos off a hard drive in a child pornography investigation, then help identify the perpetrator and build the case for an arrest.
“It is a battle. It is a war. And it needs to be,” said Daniel Ragsdale, ICE Deputy Director.
Since 2013, more than 100 veterans have learned computer forensics through the H.E.R.O. Child-Rescue Corps, an 11-week program in the nation’s capital, followed by a nearly year-long internship in ICE field offices around the country.
Chris Wooten, a U.S. Army ranger who was injured in a helicopter crash seven years ago while serving with a special operations regiment in Afghanistan — his fifth tour in Iraq and Afghanistan — felt like the program could return that sense of purpose and pride he felt serving in the military.
“I did have a lot of buddies who weren’t able to make it home, that were killed overseas or even individuals that took their own lives when they made it back just because they didn’t have that sense of purpose anymore,” he explains after the ceremony, before flying home to southwest Florida, where he starts his internship next week.
“I think this opportunity, even though we’re all wounded and can’t do our military job anymore, that this program allows us to serve our country again, and not only that, but help save some kids.”
‘Daunting’ task
It’s unpaid work that first year, working alongside agents to find suspects and build the cases, often looking at graphic, violent content for clues about the perpetrator, the victim, or even the location. But the program regularly leads to job offers from ICE, according to an agency spokesman.
The collaboration between ICE’s Homeland Security Investigations office, U.S. Special Operations Command, and the National Association to Protect Children builds the ranks of child sexual abuse investigators, as law enforcement across the United States scrambles to keep up with networks of elusive online suspects — the ones supplying the images and the ones demanding them.
Non-profit organizations like the National Center for Missing and Exploited Children that also work on these cases report that the trade in child pornography images is growing “exponentially.” They report receiving thousands of requests from law enforcement agencies to analyze millions of images and videos in one year.
Ragsdale, the second in command at ICE, says there aren’t enough analysts to meet the investigative demand. The agency is only one of several federal bureaus trying to dismantle the online exchange of child pornography, and in the week before Friday’s graduation, it posted three updates on three such cases:
“Tucson man sentenced to 10 years in prison for possessing and distributing child pornography”
“Idaho man sentenced to 25 years on federal child pornography charges”
“Southwest Texas man sentenced to nearly 16 years in federal prison for distributing child pornography”
“It’s daunting to see case after case after case… when you see 100-year sentences or multiple life sentences,” Ragsdale told the graduates. “Unfortunately, it’s still not enough. It’s certainly not tipping the scale to dissuade people who abuse children.”
“You are joining a fight that law enforcement is having a hard time winning,” he added.
*
‘Horrible photos’
Chosen to speak for the class at the ceremony, Wooten’s voice faltered at the podium; he spoke about friends who died in combat or after returning home. He mentioned the veteran suicide rate in the U.S. — about 20 a day. He talked of “scars, visible and invisible.”
More than the adrenaline rush of military work under high stress, Wooten says with the investigatory work “you get that sense of pride back.”
“In the military, you’re very proud to serve your country. And this, you almost get a sense of pride that ‘I’m able to handle the images,’” said Wooten, who at 29, is the father of five children. “I knew the struggle was going to be looking at horrible photos and videos that everyday people don’t even know goes on.
“This job, I’m actually going out and saving kids and stopping bad guys, and help putting bad guys behind bars by analyzing evidence and different things that help them get a prison sentence,” said Wooten. “Before, I was just sitting at a desk basically doing paperwork.”
Primer: On Septmber 12, 1992, Susan Rice married her Stanford romantic interest, Ian Cameron, who was working as a television producer in Toronto for the Canadian Broadcasting Corporation. The couple lived in Canada until 1993, when Rice took a job with the National Security Council in Washington, D.C., under President Clinton.
The 5 Sunday talk shows, Benghazi was due to an video lady, who also told us that Bowe Bergdahl served with honor and distinction…yeah that was Susan Rice….
Social media blew up late Sunday night with the notion that Susan Rice was the leaker. Okay, so is there evidence? Well, no smoking gun yet…but where are the dots leading us?
Mike Cernovich is a journalist, documentary filmmaker, wrote a piece that pointed to Ambassador Rice, who was also on president Obama’s national security council at the White House.
Susan Rice, who served as the National Security Adviser under President Obama, has been identified as the official who requested unmasking of incoming Trump officials, Cernovich Media can exclusively report.
The White House Counsel’s office identified Rice as the person responsible for the unmasking after examining Rice’s document log requests. The reports Rice requested to see are kept under tightly-controlled conditions. Each person must log her name before being granted access to them. Upon learning of Rice’s actions, H. R. McMaster dispatched his close aide Derek Harvey to Capitol Hill to brief Chairman Nunes.
***
The U.S. intelligence official who “unmasked,” or exposed, the names of multiple private citizens affiliated with the Trump team is someone “very well known, very high up, very senior in the intelligence world,” a source told Fox News on Friday.
Intelligence and House sources with direct knowledge of the disclosure of classified names told Fox News that House Intelligence Committee Chairman Devin Nunes, R-Calif., now knows who is responsible — and that person is not in the FBI.
***
Resurgent writes for us: Susan Rice Sought Trump Data From Intelligence Reports. Is This Why The CIA Wanted Ezra Cohen-Watnick Ousted?
Eli Lake has an explosive report on who in the Obama Administration was seeking Trump staffers’ names in intelligence reports. Turns out it was Susan Rice.
White House lawyers last month discovered that the former national security adviser Susan Rice requested the identities of U.S. persons in raw intelligence reports on dozens of occasions that connect to the Donald Trump transition and campaign, according to U.S. officials familiar with the matter.
The pattern of Rice’s requests was discovered in a National Security Council review of the government’s policy on “unmasking” the identities of individuals in the U.S. who are not targets of electronic eavesdropping, but whose communications are collected incidentally. Normally those names are redacted from summaries of monitored conversations and appear in reports as something like “U.S. Person One.”
Now, there is an interesting other nugget in Lake’s report.
The person charged with investigating the unmasking was Ezra Cohen-Watnick, the National Security Council’s senior director of intelligence. This is relevant because of this report from the Politico.
President Donald Trump has overruled a decision by his national security adviser, Lt. Gen. H.R. McMaster, to sideline a key intelligence operative who fell out of favor with some at the Central Intelligence Agency, two sources told POLITICO. On Friday, McMaster told the National Security Council’s senior director for intelligence programs, Ezra Cohen-Watnick, that he would be moved to another position in the organization.
So the guy who uncovers Rice’s connection suddenly falls out of favor with the CIA, which pressures McMaster to remove him?
Rice’s requests to unmask the names of Trump transition officials does not vindicate Trump’s own tweets from March 4 in which he accused Obama of illegally tapping Trump Tower. There remains no evidence to support that claim.
But Rice’s multiple requests to learn the identities of Trump officials discussed in intelligence reports during the transition period does highlight a longstanding concern for civil liberties advocates about U.S. surveillance programs. The standard for senior officials to learn the names of U.S. persons incidentally collected is that it must have some foreign intelligence value, a standard that can apply to almost anything. This suggests Rice’s unmasking requests were likely within the law.
The news about Rice also sheds light on the strange behavior of Nunes in the last two weeks. It emerged last week that he traveled to the White House last month, the night before he made an explosive allegation about Trump transition officials caught up in incidental surveillance. At the time he said he needed to go to the White House because the reports were only on a database for the executive branch. It now appears that he needed to view computer systems within the National Security Council that would include the logs of Rice’s requests to unmask U.S. persons.
The ranking Democrat on the committee Nunes chairs, Representative Adam Schiff, viewed these reports on Friday. In comments to the press over the weekend he declined to discuss the contents of these reports, but also said it was highly unusual for the reports to be shown only to Nunes and not himself and other members of the committee.
Indeed, much about this is highly unusual: if not how the surveillance was collected, then certainly how and why it was disseminated.
The summary below for the most part echoes the same testimony delivered by 6 panel members in two separate hearings before the Senate on March 30, 2017.
Two particular panel witness members were Clint Watts and Thomas Rid. (videos included)
There are several experts and those in media commentary that say there is no evidence of Russian intrusions. But there IS in fact evidence and attribution does required a long time to investigate, collaborate and convey, which is why the FBI has taken so long to provide. There are countless private corporations in the cyber industry, not tied to government in any form. They are hired to protect systems, investigate intrusions and research hacks and variations of interference both nationally and globally.
The United States is hardly the only victim of Russian intrusion, as Europe and the Baltic States are having the exact issues. But Americans rarely pay attention to anything outside the United States.
So, when is enough…enough for Putin? No one knows and due to the constant successes listed so far, there is very little reason for ‘active measures’ of asymmetric warfare tactics to cease….it is cheap ad effective and for the most part anonymous. The mission objective by the Kremlin is division, chaos, leaked propaganda and repeat….works doesn’t it.
What, exactly, do the Russians want? Their very active cyber operations obviously serve state goals, but what are those goals, and how can they inform a Western response?
ITSEF’s second day opened with a panel on Russian hybrid warfare—a combination of cyberattack and information operations with both conventional and irregular military operations. Larry Hanauer, of the Intelligence and National Security Alliance, chaired a discussion among the Hoover Institution’s Herb Lin, Lookout’s Mike Murray, and LIFARS CEO Ondrej Krehel.
Policy driven by resentment.
Hanauer’s opening question was open-ended: what are Russia’s policy goals, and how does it use hybrid warfare to advance them? The panel was in agreement that the key to understanding Russian actions in cyberspace is to recognize them as driven by resentment. Lin called that resentment “longstanding.” It stems from the collapse of the Soviet Union at the end of the Cold War and Russia’s treatment internationally since then. Russian leaders and a substantial set of the Russian population views that treatment as disrespectful, contemptuous.
Russia has a very long tradition of using deception and propaganda, Lin said, and he added that the country doesn’t draw clear lines between peace and war. “It’s always war, even below the level of armed conflict.” The long-term goal is restoration of Russia’s place in the world. Creation of chaos through the dissemination of fake news and other information operations is simply battlespace preparation. Cyber, he added, gives you low-cost tools you didn’t have before. “It’s an attack on brainspace, and we’re all in the attack surface.”
Murray agreed, noting one current success of Russian information operations. We’ve been distracted from their intervention in Syria by news and fake news surrounding the US elections.
One of the more prominent features of the Russian way of cyber warfare is their willingness and ability to use criminal organizations for operational purposes. During the Cold War, Krehel explained, “if you did harm to the US, you were a hero.” Among other possibilities, that harm could be reputational or it could be economic, and criminals are well-adapted to inflicting those kinds of harm. There’s a view now, among Russian leaders, that they can expose personal information of essentially all Americans, and that this will yield a comprehensive picture of American finances down to the individual level. It’s very important to the Russian government, Krehel observed, to understand what the US can afford, and what capabilities we’re investing in, and all manner of data go into building up that picture. Lin: agreed that Russian espionage aggregates data in ways that render those data more valuable than the simple loss would impose on any single victim.
As a side note on the Russian President, the panel appeared to agree, as one member put it, that we now see one man, President Putin, who is able to use the resources of a modern nation-state to redress a deeply held personal grievance.
Chaos as statecraft.
This general orientation, according to Murray, can be encapsulated by noting that all war, to Russia, is about political ends. There’s no separation of politics from the economy or business. The increase in chaos we see in Western news, information, and political culture is, from a Russian point of view, a desirable thing.
And chaos serves tactical as well as strategic ends. Krehel expanded on this by asserting that Russia wants chaos because it doesn’t have the funding, the financial resources, of, say, the US. Thus Russian security services hand intelligence over to criminal groups. “A normal government doesn’t hand over its political agenda to criminal groups,” he said, but Russia’s does.
Murray offered an evocative story: “The number two guy in Russia has two pictures on his desk: one of Putin, and the other of Tupac Shakur.” So there’s a kind of gangster ethos at the highest levels. And whie using criminal gangs as cutouts also affords an obvious form of deniability, we shouldn’t be deceived.
In response to Hanauer’s question about who might be the leading cyber actors in the Russian government, Krehel said that they were the organizations one would expect, with the FSB and GRU occupying prominent positions. Different units within the government do cooperate—resource and manpower constraints make this inevitable—and in those services “loyalty is high, and rated very highly.”
You cheated them. Expect payback.
There’s also a common motivation, and Russian information operations play into it, especially domestically. “Russia believes all of you in this room cheated them,” Krehel said, and this theme is consciously exploited to the population as a whole, but particularly to the security services. “So the GRU’s big objective is to cripple you financially. And then they want to make you look ridiculous.”
Lin agreed. “That’s an accurate picture of how it works on the ground. Russia is a thugocracy, a state of organized crime.” He has seen reports (unconfirmed reports, he stressed, but he also clearly thought them plausible) that there are formal memoranda of understanding from the FSB to criminal gangs, outlining what the gangs can expect in return for services. “Other governments have done this, but it’s a way of life in Russia. The line between intelligence services and gangs is very vague.”
There’s no such thing as a win-win, Lin said, in the Russian worldview. “To Russia, it’s always win-lose.” Hanauer noted that this seemed a point of difference between Russia and China, and Lin agreed. Where there have been agreements of a sort between the US and China moderate conduct in cyberspace, Lin thinks there’s little evidence that such deterrent or confidence building agreements will have much effect in US-Russian relations.
Protect what’s important? Everything’s important (to the Russians).
Asked about defensive measures, Lin said that, “while there’s a logic to saying, ‘protect what’s important,’ to a good intelligence agency there’s never too much data.”
There are preferences for certain kinds of targets, which Krehel enumerated: first, oil, second, pharma, and a distant third, tech. Tech was less actively prospected because of Russian confidence that “they’re so much better at tech than we are.” Lin agreed, and said there was some basis for that confidence. “In the physics community, for example, we’ve long noted the sophistication of Russian physicists. They have great theoretical insight.”
Humiliation as statecraft, and the commodity tools used to do it.
Murray said he’d recently heard someone lamenting that he missed the Chinese, who just stole without embarrassing you. “That says a lot about Russian operations.”
Turning to the embarrassment inflicted during the US elections, Hanauer asked what kinds of tools the Russians were using for their attacks? Lin answered that the most consequential hack—Democratic Party operative John Podesta’s email—was phishing, a very basic approach.
Krehel said that, during the run-up to the election, he observed the Democratic and Republican National Committee networks being equally pressured by the Russians, the former more successfully than the latter. The approach in both cases focused on human engineering.
The Russian services, Murray explained, focus on engineering end-to-end systems. “‘PowerShell’ is the magic word for Russian coding.” There’s an emphasis on the least common denominator—phishing, PowerShell, darkside commodity tools—in effect a startup mentality. “All their tools are malleable and in motion, all the time.”
Critical infrastructure and acts of war.
Hanauer asked about the much-feared prospect of an attack on US critical infrastructure. Are we seeing, he asked, Russian attacks on US critical infrastructure? And if and when we do, would these be acts of war? “If they’re not trying [to hit US critical infrastructure]” Lin said, “then someone over there should be fired.” In Murray’s view, “Everyone’s trying to figure out the act-of-war line.” He reviewed briefly the history of Russian attacks (a coordinated mix of criminal and intelligence service attacks) on the Ukrainian power grid. He thought Russia would be more circumspect about doing such things to the US grid because, of course, the US is potentially a more dangerous adversary than Ukraine. But he also thought that if the Russians came to believe such attacks would be useful, they wouldn’t hesitate to undertake them.
– See more at: https://thecyberwire.com/events/sinet-itsef-2017/what-the-russians-want-how-russia-uses-cyber-attacks-and-hybrid-warfare-to-advance-its-interests.html#sthash.FnUREpYT.dpuf
An attorney for Black Lives Matter activist DeRay Mckesson urged a federal judge Monday to dismiss a lawsuit by an unnamed Baton Rouge police officer who claims he was injured during a protest four days after the deadly police shooting of Alton Sterling in the city.
A lawyer for the officer, however, asked Chief U.S. District Judge Brian Jackson to allow the suit to move forward and for the officer who filed it to remain anonymous for health and safety reasons.
Jackson took the arguments under advisement and said he would issue a ruling in the coming days, the Advocate reports.
Billy Gibbens, who represents Mckesson argued the suit against Mckesson should be thrown out because it makes only unsupported, speculative allegations.
Donna Grodner, one of the officer’s attorneys, acknowledged in court that it is not known who threw a piece of concrete at the officer, causing him to lose teeth and suffer other injuries during the July 9 protest outside Baton Rouge Police Department headquarters.
The suit, filed in November, alleges Mckesson came to Baton Rouge in July “for the purpose” of “rioting to incite others to violence against police and other law enforcement officers.”
Meanwhile in November of 2016 at a Baton Rouge City Council meeting this happened:
Protesters arrested in July after the police shooting of Alton Sterling should each get a few hundred dollars in a settlement, but that didn’t sit well with one of the council members Tuesday night.
“To me, this encourages that same type of behavior to happen again in the future, and under no circumstances will I ever vote for this. I don’t care if we’re paying them a penny. This sets a very dangerous precedent that encourages people to come to Baton Rouge. Mr. McKessen is from out of state, many of these people are from out of state or out of city, to come to our city and protest in our city and then we’re paying them for the privilege of doing so. No thanks,” said Delgado.
Despite objections from John Delgado, the city government, Louisiana State Police, the East Baton Rouge Sheriff’s Office, and District Attorney’s office all plan to split the payout amongst the protesters, rather than risk a trial.
The Grio reports: Campaign Zero, an anti-police violence resource, launched an online tool that will help activists see where laws that would threaten civil rights are being considered on a state-by-state basis.
The tool, called “Our States,” which was previewed exclusively by Mic, breaks down state proposals and bills that would hurt minorities. The goal is to take the focus off of the federal-level attempts by the Trump administration to enact their promises and to put the focus on Republican-controlled state and local governments that are already moving forward.
“The purpose of Our States is to ensure that citizens know the legislation being proposed in their respective state, so that they can mobilize to either support or oppose it,” activist and Campaign Zero co-founder Deray Mckesson said in a statement to Mic. “The stakes are high.”
“In many of these states, you have Trump’s agenda already being legislated,” Sam Sinyangwe, the data scientist behind Campaign Zero and lead coordinator of the Our States project, said. “If we don’t engage in the states to block them, it will in effect enact Trump’s agenda, despite our efforts to stop it in Washington.”
The website not only provides data on a state-by-state basis for immigration, policing and protest, reproductive justice, voting rights and LGBTQ equality; it also includes suggested strategies to influence change, such as face-to-face meetings and protests.
“Our States is created out of the realization that, in the conversation that we’re having about equity and justice, state level politics rarely comes up in that conversation,” Sinyangwe said in the interview. “If we’re going to block [Trump’s agenda] from happening, we’ve got to create avenues for people to get informed.”
AG: Sanctuary Cities Face Ineligibility for Future Federal Funds, ‘Clawback’ of Funds Already Awarded
(CNSNews.com) – Attorney General Jeff Sessions said Monday that states and localities that refuse to comply with federal immigration laws will be deemed ineligible for federal grants.
“Today, I’m urging states and local jurisdictions to comply with these federal laws, including 8 U.S.C. Section 1373. Moreover, the Department of Justice will require that jurisdictions seeking or applying for Department of Justice grants to certify compliance with 1373 as a condition of receiving those awards,” he said, adding that the policy “is entirely consistent with the Department of Justice’s Office of Justice Program’s guidance that was issued just last summer under the previous administration.
“This guidance requires state and local jurisdictions to comply and certify compliance with Section 1373 in order to be eligible for OJP grants. It also made clear that failure to remedy violations could result in withholding grants, termination of grants, and disbarment or ineligibility for future grants,” Sessions added.
“The Department of Justice will also take all lawful steps to clawback any funds awarded to a jurisdiction that willfully violates 1373. In the current fiscal year, the Department of Justice’s Office of Justice Program and Community Oriented Policing services anticipates awarding more than $4.1 billion in grants,” he said.
The attorney general said that in one week alone, “there were more than 200 instances of jurisdictions refusing to honor ICE detainer requests with respect to individuals charged or convicted of a serious crime,” according to a report released recently by the Department of Homeland Security.
“The charges and convictions against these aliens included drug-trafficking, hit-and-run, rape, sex offenses against a child, and even murder. Such policies cannot continue. They make our nation less safe by putting dangerous criminals back on the streets,” Sessions said.
He pointed to the murder of 32-year-old Kate Steinle who was killed two years ago in San Francisco as an example.
“The shooter, Francisco Sanchez, was an illegal immigrant who had already been deported five times and had seven felony convictions,” Sessions pointed out.
“Just 11 weeks before the shooting, San Francisco had released Sanchez from its custody, even though Immigration and Customs Enforcement officers had filed a detainer requesting that he be held in custody until immigration authorities could pick him up for removal. Even worse, Sanchez admitted the only reason he came to San Francisco was because it was a sanctuary city,” the attorney general said.
“A similar story unfolded just last week, when Ever Valles, an illegal immigrant and a Mexican national was charged with murder and robbery of a man at a light rail station. Valles was released from a Denver jail in late December, despite the fact that ICE has lodged a detainer for his removal,” he said.
“The American people are not happy with these results. They know that when cities and states refuse to help enforce immigration laws, our nation is less safe. Failure to deport aliens who are convicted of criminal offenses puts whole communities at risk, especially immigrant communities in the very sanctuary jurisdictions that seek to protect the perpetrators,” Sessions said.
Sessions said recent polling shows that 80 percent of Americans “believe that cities that arrest illegal immigrants for crime should be required to turn them over to immigration authorities.”
“DUIs, assaults, burglaries, drug crimes, gang rapes, crimes against children, and murderers — countless Americans would be alive today and countless loved ones would not be grieving today if these policies of sanctuary cities were ended. Not only do these policies endanger lives of every American — just last May, the Department of Justice inspector general found that these policies also violate federal law,” he said.
What the House Committee on Homeland security described as an “unprecedented number of bipartisan [bills] aimed at keeping Americans safe,” were passed this last week by the House which deal with a variety of aspects of homeland Security.
The nine pieces of legislation, the committee said, are designed “to … also save taxpayer dollars by improving the acquisition process at the Department of Homeland Security [DHS] and make important reforms to the operations of the Transportation Security Administration [TSA].”
“It is critical that we continue to re-examine our strategy, technology and the infrastructure we currently have in place to strengthen the Department of Homeland Security and stop terrorists from reaching our shores,” said committee chairman Michael McCaul (R-TX). “The evolving threats we face demand action to address vulnerabilities in our defenses. I commend the work of my Committee—particularly the bipartisan nature in which these bills were advanced—to make our country safer.”
The other key pieces of legislation passed this past week include the:
DHS Multiyear Acquisition Strategy Act of 2017 (HR 1249), introduced by Rep. Brian Fitzpatrick (R-PA), and amends the Homeland Security Act of 2002 to require a multiyear acquisition strategy of DHS.
DHS Acquisition Authorities Act of 2017 (HR 1252), introduced by Rep. Clay Higgins (R-LA), amends the Homeland Security Act of 2002 to provide for certain acquisition authorities for the Under Secretary of Management of DHS.
Reducing DHS Acquisition Cost Growth Act (HR 1294), introduced by Rep. John Rutherford (R-FL), amends the Homeland Security Act of 2002 to provide for congressional notification regarding major acquisition program breaches.
Quadrennial Homeland Security Review Technical Corrections Act of 2017 (HR 1297), introduced by Rep. Bonnie Watson Coleman (D-NJ), amends the Homeland Security Act of 2002 to make technical corrections to the requirement that the Secretary of Homeland Security submit quadrennial homeland security reviews.
Transparency in Technological Acquisitions Act of 2017 (HR 1353), introduced by Rep. Kathleen Rice (D-NY), amends the Homeland Security Act of 2002 to require certain additional information to be submitted to Congress regarding the strategic 5-year technology investment plan of the TSA.
Read Homeland Security Today’s report on the bill here.
Securing our Agriculture and Food Act (HR 1238), introduced by Rep. David Young (R-IA), amends the Homeland Security Act of 2002 to make the Assistant Secretary of Homeland Security for Health Affairs responsible for coordinating the efforts of DHS related to food, agriculture and veterinary defense against terrorism.
Read Homeland Security Today’s report on the legislation here.