<?xml version="1.0" encoding="ISO-8859-1"?>
<!-- OPML generated by Cartulary v0.3.9 on Sun, 03 Mar 2013 05:47:19 +0000 -->
<opml version="2.0">

      <head>
        <title>What Adam Curry is reading</title>
        <dateCreated>1362289372</dateCreated>
        <dateModified>1362289372</dateModified>
        <ownerName>Adam Curry</ownerName>
        <ownerId>669</ownerId>
        <expansionState></expansionState>
        <expansionState></expansionState>
        <vertScrollState>1</vertScrollState>
        <windowTop>146</windowTop>
        <windowLeft>107</windowLeft>
        <windowBottom>468</windowBottom>
        <windowRight>560</windowRight>
      </head>

      <body>
              <outline text="Germany wants Google to pay for news citations, passes re-publishing bill | Ars Technica">
                      <outline text="Link to Article" type="link" url="http://arstechnica.com/tech-policy/2013/03/germany-wants-google-to-pay-for-news-citations-passes-re-printing-bill/" />      <outline text="Sun, 03 Mar 2013 05:42" />
                      <outline text="" />
                      <outline text="The lower house of the German parliament, known as the Bundestag, has approved a new bill that would require search engines to pay a license fee for re-publishing content longer than &quot;individual words or short excerpts.&quot; The bill passed by a vote of 293 to 243, with three abstentions." />
                      <outline text="However, the law does not define exactly what such a &apos;&apos;snippet&apos;&apos; would entail. For the law to take effect, it would need to be ratified by the upper house of the German parliament, the Bundesrat. By all accounts, this bill is a watered-down version of what had originally been lobbied for by the German publishing and media industry." />
                      <outline text="Not surprisingly, Google has opposed this law and proposals like it in neighboring France." />
                      <outline text="&apos;&apos;As a result of today&apos;s vote, ancillary copyright in its most damaging form has been stopped,&apos;&apos; Google said in a statement. &apos;&apos;However, the best outcome for Germany would be no new legislation because it threatens innovation, particularly for start-ups. It&apos;s also not necessary because publishers and Internet companies can innovate together, just as Google has done in many other countries.&apos;&apos;" />
                      <outline text="Still, the publishing industry seems to be fairly satisfied that they managed to get something passed through the Bundestag." />
                      <outline text="&apos;&apos;With the right legal conditions and the technical tools provided by the Linked Content Coalition, it will be easy to access and use content legally,&apos;&apos; the European Publishers Council said in a statement (PDF) on Friday. &apos;&apos;This will mean that publishers will have the incentive to continue to populate the internet with high-quality, authoritative, diverse content and to support new, innovative business models for online content.&apos;&apos;" />
              </outline>

              <outline text="Germany wants Google to pay for news citations, passes re-publishing bill">
                      <outline text="Link to Article" type="link" url="http://usfollowme.blogspot.com/2013/03/germany-wants-google-to-pay-for-news.html" />        <outline text="Source: usfollowme" type="link" url="http://usfollowme.blogspot.com/feeds/posts/default?alt=rss" />
      <outline text="Sun, 03 Mar 2013 05:42" />
                      <outline text="" />
                      <outline text="http://arstechnica.com/tech-policy/2013/03/germany-wants-google-to-pay-for-news-citations-passes-re-printing-bill/" />
              </outline>

              <outline text="Undernews: Why have gays been so quiet about Manning?">
                      <outline text="Link to Article" type="link" url="http://prorevnews.blogspot.com/2013/02/why-have-gays-been-so-quiet-about.html" />        <outline text="Source: DaDenMan news feed" type="link" url="http://s3.amazonaws.com/radio2/dennisc/linkblog.xml" />
      <outline text="Sun, 03 Mar 2013 05:36" />
                      <outline text="" />
                      <outline text="Truth Dig - &apos;&apos;Why is it that all of the big gay non-profits, from the National Gay &amp; Lesbian Task Forceto the Human Rights Campaign  - &apos;Gay Inc.&apos; - have failed to utter a word of support for Private Bradley Manning, let alone really campaign for him?&apos;&apos; asks Andy Thayer at CounterPunch.Instead of mining the LGBT community for personal fame and fortune, as a number of &apos;&apos;air-head celebrities&apos;&apos; do when they express their support for gay rights, Manning, who became one of the nation&apos;s most prominent homosexuals after he was apprehended and jailed for allegedly passing confidential documents to WikiLeaks more than three years ago, has &apos;&apos;actually done something to support social justice.&apos;&apos;" />
                      <outline text="Among those actions are the following: He exposed U.S. war crimes in Iraq and Afghanistan, leaked documents that helped kick off the Arab Spring and exposed the Obama administration&apos;s support for the 2009 military coup in Honduras (an event that made it the murder capital of the world)." />
                      <outline text="But when Manning was stripped naked in a cell for &apos;&apos;days on end &apos;... where were the protests from the gay human rights groups?&apos;&apos; Thayer asks." />
                      <outline text="&apos;&apos;If a homophobe had so much as broken Chaz Bono&apos;s finger nail,&apos;&apos; he says, &apos;&apos;rest assured that GLAAD, NGLTF and HRC would have been on the case. But why the silence about Manning?&apos;&apos;" />
              </outline>

              <outline text="Obama Pushing Trans-Atlantic Union with EU">
                      <outline text="Link to Article" type="link" url="http://wtfrly.com/2013/03/03/obama-pushing-trans-atlantic-union-with-eu/" />        <outline text="Source: WTF RLY REPORT" type="link" url="http://wtfrly.com/feed" />
      <outline text="Sun, 03 Mar 2013 05:33" />
                      <outline text="" />
                      <outline text="The New Americanby Alex Newman" />
                      <outline text="Even as the European Union continues to pursue ever-closer &apos;&apos;integration&apos;&apos; in the name of &apos;&apos;global governance,&apos;&apos; Obama is now working to form a &apos;&apos;Trans-Atlantic partnership&apos;&apos; between the U.S. government and the EU under the guise of a so-called &apos;&apos;free trade&apos;&apos; agreement. Formally announced in the United States during the president&apos;s State of the Union address, the highly controversial deal &apos;-- a scheme that has been under discussion since before the current administration came to power &apos;-- is expected to take at least 18 months to complete. It also has the backing of both Big Business and Big Labor." />
                      <outline text="The &apos;&apos;Transatlantic Partnership,&apos;&apos; of course, is just one of the major sovereignty-threatening international schemes being pursued by the Obama administration simultaneously &apos;-- closer North American integration and the so-called &apos;&apos;Trans-Pacific Partnership&apos;&apos; are two of the most prominent efforts. The latest plot, though, has far-reaching, global implications that critics argue represent a serious threat to America and freedom. If the U.S.-EU deal ends up becoming reality, the regulatory regime governing the new bloc, which accounts for about half of global GDP, would become the de-facto standard-setting entity for the entire planet.        " />
                      <outline text="&apos;&apos;To boost American exports, support American jobs and level the playing field in the growing markets of Asia, we intend to complete negotiations on a Trans-Pacific Partnership,&apos;&apos; Obama said during his SOTU speech. &apos;&apos;And tonight, I am announcing that we will launch talks on a comprehensive Transatlantic Trade and Investment Partnership with the European Union &apos;-- because trade that is free and fair across the Atlantic supports millions of good-paying American jobs.&apos;&apos;" />
                      <outline text="Vice President Joe Biden, meanwhile, hinted at the plan even earlier, and since at least 2007, governments on both sides of the Atlantic have been formally working on the scheme. The New American magazine first warned of EU-U.S. integration in a 2009 in-depth cover story by author James Perloff, who concluded that the economic alliance would eventually and inevitably lead to a political merger.  " />
                      <outline text="More recently, critics of the &apos;&apos;partnership&apos;&apos; have also blasted the proposed plan, highlighting everything from concerns over national sovereignty to the fact that supposed &apos;&apos;free trade&apos;&apos; deals tend to be less about real free trade and more about transnational regulation of commerce by unaccountable bodies. The so-called NAFTA &apos;&apos;tribunals&apos;&apos; that overrule American laws and courts represent just one example of the dangers of &apos;&apos;integration,&apos;&apos; according to opponents of the plan. The World Trade Organization (WTO) is another.     " />
                      <outline text="&apos;&apos;Obama&apos;s open discussion of the two-oceans TPP and TAP free trade agendas during his recent SOTU attests to the persistence of globalists,&apos;&apos; noted celebrated author and WorldNetDaily investigative reporter Jerome Corsi, who has played a key role in exposing the myriad plots to subvert American sovereignty using international &apos;&apos;trade&apos;&apos; regimes. Dr. Corsi also offers some of the history and background behind the latest plot: &apos;&apos;The Transatlantic economic integration plan was originated in 1939 by a world government advocate who sought to create a Transatlantic Union as an international governing body.&apos;&apos;" />
                      <outline text="Among other measures, the agreement being worked out between the Obama administration and EU negotiators would seek to &apos;&apos;harmonize&apos;&apos; regulations between Europe and the United States. In simpler terms, American citizens and U.S. companies would end up being governed by rules developed and even implemented by supranational authorities &apos;-- not elected officials who are accountable to the people. Because the U.S. economy, combined with Europe, represents almost half of the world&apos;s economic output, the new transatlantic regulatory regime would ensure that companies around the globe would have to comply with the new scheme, too; at least if they wanted to sell goods or services in the bloc.  " />
                      <outline text="The &apos;&apos;Trans-Atlantic Grand Bargain,&apos;&apos; as the bold plot was touted in a recent New York Times editorial, would aim to reduce or eliminate some remaining trade barriers. However, tariffs on trade between the United States and Europe average just four percent. Reducing those figures further, of course, could easily be accomplished without ceding even more policy control and national sovereignty to unaccountable international entities." />
                      <outline text="Instead of worrying about tariffs, however &apos;-- as supporters and opponents of the plan have both stated &apos;-- the real goal of the emerging Atlantic union would be to do what the EU has already done to its 27 formerly sovereign nations: centralize authority in the hands of international bureaucrats at the expense of national sovereignty and individual liberty under the guise of promoting trade. In Europe, that has already happened, and now, even the Russian government is being brought into the fold. " />
                      <outline text="As The New American has documented extensively, the vast majority of &apos;&apos;laws&apos;&apos; governing Europe today already come from Brussels &apos;-- even with the EU widely considered illegitimate among Europeans &apos;-- as opposed to national parliaments accountable to citizens. If Obama and his allies pushing the transatlantic scheme get their way, some or even all of those &apos;&apos;laws&apos;&apos; and regulations might someday be applied in the United States." />
                      <outline text="In a joint statement attributed to Obama, European Council President Herman Van Rompuy and European Commission President Jos(C) Manuel Barroso, a former Maoist revolutionary, the top officials on both sides of the Atlantic said they were &apos;&apos;pleased to announce&apos;&apos; that the EU and the U.S. government were initiating &apos;&apos;negotiations on a Transatlantic Trade and Investment Partnership.&apos;&apos; Noting that the &apos;&apos;transatlantic economic relationship&apos;&apos; is already the world&apos;s largest, the officials touted jobs, investment, and trade as the key motivations behind the scheme. So-called &apos;&apos;sustainable development&apos;&apos; will also be part of the effort, documents show." />
                      <outline text="&apos;&apos;We are committed to making this relationship an even stronger driver of our prosperity,&apos;&apos; the three officials claimed in a controversial press statement released in mid-February by the Obama administration and the EU, using terms that have become standard whenever governments are promoting otherwise-unpopular policies. &apos;&apos;Through this negotiation, the United States and the European Union will have the opportunity not only to expand trade and investment across the Atlantic, but also to contribute to the development of global rules that can strengthen the multilateral trading system.&apos;&apos;" />
                      <outline text="Unsurprisingly, opponents of the scheme have already started to speak out forcefully. However, opposition to the transatlantic plan is facing a herculean adversary: a network of well-funded and well-connected think tanks like the Atlantic Council and the powerful, global government-promoting Council on Foreign Relations; Big Business; Big Labor; the &apos;&apos;mainstream&apos;&apos; media; members of Congress in the establishment wing of both parties; and more. The globalist CFR, in particular, appears to be at the forefront pushing the transatlantic integration effort. " />
                      <outline text="&apos;&apos;You have for the first time in Europe a clear commitment, not only in Brussels but among the major leaders in the national capitals, that this is an economic priority for the European Union,&apos;&apos; CFR Senior Fellow Edward Alden was quoted as saying in the Fiscal Times. &apos;&apos;The Canadians are doing a certain amount of our work for us, because a lot of these issues are being hammered out in the Canada-EU negotiations, which are close to conclusion.&apos;&apos; The CFR also touts the integration schemes &apos;-- within North America and across the Atlantic &apos;-- all over its websites. " />
                      <outline text="The U.S. Chamber of Commerce, meanwhile, has also jumped on the bandwagon, urging Obama and policymakers to act boldly on the controversial agreement with the EU. &apos;&apos;For the sake of jobs and growth, it&apos;s time to forge a bold, new trade pact with Europe,&apos;&apos; explained chamber Chairman Thomas Donohue. &apos;&apos;The stars are finally aligned.&apos;&apos;" />
                      <outline text="Labor unions, meanwhile, despite having largely opposed such &apos;&apos;free trade&apos;&apos; schemes in recent decades, are lining up behind the transatlantic scheme as well, hoping to use it to score more European-style government favors for Big Labor in the United States. Multiple prominent unions have publicly voiced their support for closer alignment between U.S. and EU standards on labor laws, with the U.S. government, of course, expected to follow Europe&apos;s lead in terms of highly regulated, rigid labor markets that economists say stifle growth, damage the economy, and, ultimately, hurt the workers themselves. " />
                      <outline text="&apos;&apos;People in labor see this as an opportunity, not as a threat,&apos;&apos; senior director George Kohl with the Communications Workers of America (CWA) was quoted as saying in The Hill about the transatlantic plot, one of several major union figures cited in the article offering support for the plan. &apos;&apos;Now we get to benchmark against a more progressive economy and raise up labor engagement here in the United States.&apos;&apos;" />
                      <outline text="At the same time as he seeks to forge a union between the U.S. government and the EU, Obama is also pursuing more &apos;&apos;integration&apos;&apos; with governments and dictatorships in the Asia-Pacific region through the so-called &apos;&apos;Trans-Pacific Partnership.&apos;&apos; That scheme, which includes the communist regime ruling over Vietnam as a member, has also been blasted by critics as a threat to national sovereignty and even Internet freedom. The New American has documented and exposed many of the dangers in recent years, too, but Obama wants it complete by the end of the year. " />
                      <outline text="Meanwhile, closer to home, the U.S. government and its counterparts in Mexico and Canada continue pushing closer &apos;&apos;integration&apos;&apos; in North America as well &apos;-- a highly controversial effort that critics and supporters have both said is aimed at eventually creating a &apos;&apos;North American Union.&apos;&apos; Documents released by WikiLeaks confirmed that top officials in all three governments and corporate bosses were working largely under the radar to advance a merger in everything from military to monetary affairs. Again, the CFR&apos;s fingerprints are all over the plot. " />
                      <outline text="While opposition to globalist integration schemes is growing, the trend toward ever-more ambitious and numerous &apos;&apos;free trade&apos;&apos; regimes is accelerating as well. Critics say it is time to restore U.S. sovereignty completely &apos;-- not create even more entangling alliances, which the Founding Fathers warned against on more than a few occasions. Withdrawing from NAFTA, the UN, and the various other international entities that continue to usurp illegitimate authority would be a good start. Whether U.S. lawmakers will finally put the brakes on the plots, however, depends largely on the American people waking up to the threat in time." />
                      <outline text="Via The New American" />
              </outline>

              <outline text="Federal Register | Financial Market Utilities">
                      <outline text="Link to Article" type="link" url="https://www.federalregister.gov/articles/2013/03/04/2013-04841/financial-market-utilities" />      <outline text="Sat, 02 Mar 2013 20:59" />
                      <outline text="" />
                      <outline text=" " />
                      <outline text="Comments on this notice of proposed rulemaking must be received by May 3, 2013." />
                      <outline text="You may submit comments, identified by Docket No. R-1455 and RIN No. 7100-AD-94, by any of the following methods:" />
                      <outline text="All public comments are available from the Board&apos;s Web site at http://www.federalreserve.gov/generalinfo/foia/ProposedRegs.cfm as submitted, unless modified for technical reasons. Accordingly, your comments will not be edited to remove any identifying or contact information. Public comments may also be viewed electronically or in paper form in Room MP-500 of the Board&apos;s Martin Building (20th and C Streets NW.) between 9 a.m. and 5 p.m. on weekdays." />
                      <outline text="Jeff Stehm, Senior Associate Director (202) 452-2217 or Stuart Sperry, Assistant Director (202) 452-2832, Division of Reserve Bank Operations and Payment Systems; Christopher W. Clubb, Special Counsel (202) 452-3904 or Kara L. Handzlik, Counsel (202) 452-3852, Legal Division; for users of Telecommunications Device for the Deaf (TDD) only, contact (202) 263-4869." />
                      <outline text="A. Dodd-Frank Wall Street Reform and Consumer Protection ActFMUs, such as payment systems, central securities depositories, and central counterparties, are critical components of the nation&apos;s financial system that provide the essential infrastructure to clear and settle payments and other financial transactions, upon which the financial markets and the broader economy rely to function effectively. FMUs operate multilateral systems in which financial institutions, such as banks, participate pursuant to a common set of rules and procedures, a technical infrastructure, and a risk-management framework. [1]" />
                      <outline text="Title VIII of the Dodd-Frank Act, titled the &apos;&apos;Payment, Clearing, and Settlement Supervision Act of 2010,&apos;&apos; was enacted to mitigate systemic risk in the financial system and to promote financial stability, in part, through an enhanced supervisory framework for FMUs designated as systemically important by the Council. [2] Designation by the Council makes an FMU subject to the supervisory and risk reduction framework set out in Title VIII of the Dodd-Frank Act. This framework includes risk management standards, promulgated by the designated FMU&apos;s Supervisory Agency, that take into consideration relevant international standards and existing prudential requirements, with the objectives of promoting robust risk management and safety and soundness of the designated FMU, reducing systemic risks, and supporting the stability of the broader financial system. [3] The framework also includes ex ante review of changes to the rules, procedures, or operations of a designated FMU that could materially affect the nature or level of risk presented by the designated FMU, enhanced annual examinations of designated FMUs, and enhanced enforcement and information collection provisions." />
                      <outline text="In addition to these provisions, section 806(a) of the Act permits the Board to authorize a Federal Reserve Bank to establish and maintain an account for a designated FMU and provide to the designated FMU the services listed in section 11A(b) of the Federal Reserve Act (12 U.S.C. 248a(b)) that the Federal Reserve Bank is authorized to provide to a depository institution, subject to any applicable rules, orders, standards, or guidelines prescribed by the Board. [4] The services listed in Section 11A(b) include wire transfers, settlement, and securities safekeeping, as well as services regarding currency and coin, check clearing and collection, and automated clearing house transactions." />
                      <outline text="Section 806(c) of the Dodd-Frank Act permits a Federal Reserve Bank to pay earnings on balances maintained by or on behalf of a designated FMU in the same manner and to the same extent as the Federal Reserve Bank may pay earnings to a depository institution under the Federal Reserve Act, subject to any applicable rules, orders, standards, or guidelines prescribed by the Board." />
                      <outline text="On August 2, 2012, the Board published a final rule adding a new Part 234 to Title 12 of the Code of Federal Regulations, Regulation HH, containing risk management standards for designated FMUs pursuant to section 805(a) of the Act, as well as an advance notice requirement of any changes of a designated FMU&apos;s rules, procedures, or operations that could materially affect the nature or level of risks presented pursuant to section 806(e) of the Act. [5] The rules being proposed by this notice would be added to the end of Regulation HH. The Board is requesting public comment on all aspects of the proposed amendments to Regulation HH contained in this notice." />
                      <outline text="A. Proposed &#167; 234.1(b)&apos;--Authority, Purpose, and ScopeThe amendments proposed by this notice to &#167; 234.1(b) of Regulation HH clarify that Part 234 also includes standards, restrictions, and guidelines for the establishment and maintenance of an account at, and provision of financial services from, a Federal Reserve Bank for a designated FMU. In addition, the proposed amendments clarify the authority and terms for a Reserve Bank to pay interest on any balances held by a designated FMU in its account at a Reserve Bank. The Board requests comment on whether these additions to the purpose and scope provisions of Regulation HH are sufficient and clear for the proposed rules herein. [6]" />
                      <outline text="B. Proposed &#167; 234.6&apos;--Access to Reserve Bank Accounts and ServicesProposed &#167; 234.6 sets out the conditions and requirements for a Federal Reserve Bank to establish and maintain an account for, and provide services to, a designated FMU pursuant to section 806(a) of the Act. The proposed terms and conditions for access to Federal Reserve Bank accounts and services are intended to facilitate the use of Reserve Bank accounts and services by a designated FMU in order to reduce settlement risk and strengthen settlement processes, while limiting the risk presented by the designated FMU to the Reserve Banks. In particular, the proposed terms and conditions are designed to provide the Federal Reserve with sufficient information to assess a designated FMU&apos;s ongoing condition as it pertains to the FMU&apos;s ability to settle promptly and to manage its settlement process and Reserve Bank account(s) safely. Proposed &#167; 234.6(a) provides that, after receiving the Board&apos;s authorization with respect to a particular designated FMU and subject to any applicable Board direction, the Reserve Bank may enter into agreements governing the details of the establishment, maintenance, and operation of such account and services, consistent with Board direction." />
                      <outline text="The Board expects that Reserve Banks would provide services that are consistent with a designated FMU&apos;s need for safe and sound settlement processes under account and service agreements generally consistent with the provisions of existing Reserve Bank operating circulars for such services, but recognizes that there may be a need for some flexibility to tailor certain parts of such agreements or provide for certain restrictions because of the wide variety of organizations, operations, and business models presented by designated FMUs. In addition, unlike depository institutions, designated FMUs do not have regular access to discount window lending, so the Board also expects that Reserve Banks will provide accounts and services, and designated FMUs will structure their settlement processes and use of Reserve Bank accounts and services, in a manner that would seek to avoid any intraday account overdraft, and that a designated FMU would have the resources to promptly rectify any inadvertent overdraft." />
                      <outline text="Proposed &#167; 234.6(b) requires that a Reserve Bank ensure that its establishment and maintenance of an account for, or provision of services to, a designated FMU does not create undue credit, settlement, or other risks to the Reserve Bank and, in this regard, sets out minimum conditions that a designated FMU must meet, in the Reserve Bank&apos;s judgment, in order for the Reserve Bank to establish and maintain an account for, or provide services to, a designated FMU. These minimum conditions are intended to address certain risks and other concerns that may face a Reserve Bank when establishing and maintaining an account for, and providing services to, a designated FMU. [7] The Reserve Bank must determine whether a designated FMU meets these minimum conditions and then determine, based on the facts and circumstances, whether additional measures or information are needed to address the risk presented by the designated FMU to the Reserve Bank. The minimum requirements for establishing an account or receiving services set out in proposed &#167; 234.6(b)(1) through (4) are discussed below." />
                      <outline text="Proposed &#167; 234.6(b)(1) requires the designated FMU to be in generally sound financial condition. Although there are a number of criteria that may be used to determine financial soundness, in general a designated FMU should maintain adequate capital to support its ongoing operations and absorb reasonable business losses and have sufficient operating revenue and working capital to cover its actual and projected operating expenses, giving due regard to the economic conditions and circumstances in the market in which the designated FMU operates. These resources would be separate and in addition to resources held to cover participant defaults that may arise through a designated FMU&apos;s payment, clearing, or settlement activities." />
                      <outline text="Proposed &#167; 234.6(b)(2) requires the designated FMU to be in compliance, based on information provided by the Supervisory Agency, with requirements imposed by its Supervisory Agency regarding financial resources, liquidity, participant default management, and other aspects of risk management. The three agencies that currently serve as Supervisory Agencies (i.e., the Board, the Securities and Exchange Commission, and the Commodity Futures Trading Commission) have promulgated risk management standards that would be applicable to the FMUs that have been designated by the Council. As noted in proposed &#167; 234.6(d), the Board will consult with the Supervisory Agency of a designated FMU prior to authorizing a Federal Reserve Bank to open an account to ascertain the views of the Supervisory Agency regarding, among other things, the designated FMU&apos;s compliance with the Supervisory Agency&apos;s risk management standards. At a minimum, the designated FMU should meet its Supervisory Agency&apos;s mandatory risk management standards." />
                      <outline text="Proposed &#167; 234.6(b)(3) requires that a designated FMU be in compliance with Board orders and policies, Federal Reserve Bank operating circulars, and other applicable Federal Reserve requirements regarding the establishment and maintenance of a Reserve Bank account and the receipt of financial services from a Reserve Bank. A designated FMU will be expected to use Reserve Bank financial services, through its Reserve Bank account, in accordance with any applicable operating circular or Federal Reserve policy, as directed by the Reserve Bank." />
                      <outline text="Proposed &#167; 234.6(b)(4) requires the Reserve Bank to determine that the designated FMU can demonstrate an ongoing ability, including during periods of market stress or a participant default, to meet all of its obligations under its agreement for a Federal Reserve Bank account and services. As noted above, designated FMUs would be expected to demonstrate an operational ability to avoid intraday overdrafts in its Reserve Bank account and have the financial resources to promptly rectify any inadvertent overdrafts if they were to occur." />
                      <outline text="Proposed &#167; 234.6 also contains other provisions relevant to the establishment and maintenance of an account or provision of financial services by a Reserve Bank for a designated FMU. Proposed &#167; 234.6(c) states that the Board or the relevant Reserve Bank may request that the designated FMU provide any information necessary regarding compliance with any conditions imposed under proposed &#167; 234.6. The designated FMU would also be required to provide any verification that the Board or the Reserve Bank requests regarding information received under this section." />
                      <outline text="Proposed &#167; 234.6(d) states that the Board will consult with the Supervisory Agency of a designated FMU prior to authorizing a Reserve Bank to open an account, and periodically thereafter, to ascertain the views of the Supervisory Agency regarding the condition of the designated FMU and its compliance with the requirements of proposed &#167; 234.6, as well as to coordinate information requests to the designated FMU. For designated FMUs not supervised by the Board, the Board anticipates obtaining the views of the designated FMU&apos;s Supervisory Agency regarding the use of a Reserve Bank account and services and any concerns the Supervisory Agency may have with respect to the designated FMU. If a Reserve Bank account is established for the designated FMU, the Board expects that there will be an ongoing dialogue with the Supervisory Agency regarding the designated FMU&apos;s use of the account and services and its compliance with any conditions imposed under proposed &#167; 234.6 with regard to the account or services. The Board also anticipates coordinating any information requests it may have for the designated FMU with the Supervisory Agency in order to reduce regulatory burden on the designated FMU." />
                      <outline text="Proposed &#167; 234.6(e) states that, in addition to any right that a Reserve Bank has to terminate an account or the use of a service pursuant to an agreement, the Board may direct the Reserve Bank to impose limits, restrictions, or other conditions on the availability or use of a Reserve Bank account or service by a designated FMU, including directing the Reserve Bank to terminate the use of a particular service or to close the account. The Reserve Bank, on its own initiative or at the direction of the Board, may close the account if significant issues are raised and not resolved in areas such as excessive risk to the Reserve Bank, violation of Federal Reserve rules or policies, violation of other applicable law or regulation, or other compliance issues." />
                      <outline text="The Board requests comment on all aspects of proposed &#167; 234.6. In particular, the Board requests comment on the conditions for establishing an account at a Reserve Bank provided in proposed &#167; 234.6(b) and whether there are any other conditions that should be imposed in order to accomplish the Board&apos;s goals of reducing settlement and systemic risks and strengthening the settlement processes of designated FMUs through the use of Reserve Bank accounts and services, while limiting risk to the Reserve Banks." />
                      <outline text="C. Proposed &#167; 234.7&apos;--Interest on BalancesPursuant to section 806(c) of the Act, proposed &#167; 234.7 clarifies the authority of a Federal Reserve Bank to pay interest on any balance that a designated FMU maintains in its account with that Reserve Bank. Section 806(c) of the Act states that a Reserve Bank may pay earnings on balances maintained by a designated FMU &apos;&apos;in the same manner and to the same extent as the Federal Reserve Bank may pay earnings to a depository institution under the Federal Reserve Act, subject to any applicable rules, orders, standards, or guidelines prescribed by the Board of Governors.&apos;&apos; [8] Section 19(b)(12) of the Federal Reserve Act (FRA) authorizes a Federal Reserve Bank to pay, at least once each calendar quarter, interest on balances maintained at the Federal Reserve Bank by or on behalf of a depository institution, at a rate or rates not to exceed the general level of short-term interest rates. [9]" />
                      <outline text="Proposed &#167; 234.7(a) provides that a Federal Reserve Bank may pay interest on balances maintained by a designated FMU in its account at the Reserve Bank in accordance with the provisions of proposed &#167; 234.7 and under such other terms and conditions as the Board may prescribe. This subsection essentially incorporates the statutory authority provided by section 806(c) of the Act." />
                      <outline text="Proposed &#167; 234.7(b) states that interest on balances paid under this section shall be at the rate paid on balances of depository institutions or another rate determined by the Board from time to time, not to exceed the general level of &apos;&apos;short-term interest rates.&apos;&apos; Proposed &#167; 234.7(c) incorporates the definition of &apos;&apos;short-term interest rates&apos;&apos; set out in &#167; 204.10(b)(3) of the Board&apos;s Regulation D, which states that &apos;&apos;short-term interest rates&apos;&apos; are rates on obligations with maturities of no more than one year, such as the primary credit rate and rates on term federal funds, term repurchase agreements, commercial paper, term Eurodollar deposits, and other similar instruments. [10]" />
                      <outline text="A. Regulatory Flexibility Act AnalysisCongress enacted the Regulatory Flexibility Act (the &apos;&apos;RFA&apos;&apos;) (5 U.S.C. 601et seq.) to address concerns related to the effects of agency rules on small entities, and the Board is sensitive to the impact their rules may impose on small entities. The RFA requires agencies either to provide an initial regulatory flexibility analysis with a proposed rule or to certify that the proposed rule will not have a significant economic impact on a substantial number of small entities. In accordance with section 3(a) of the RFA, the Board has reviewed the proposed regulation. In this case, the proposed rule would apply to FMUs that are designated by the Council as systemically important to the U.S. financial system. Based on current information, the Board believes that the FMUs that have been and would likely be designated by the Council would not be &apos;&apos;small entities&apos;&apos; for purposes of the RFA, and so, the proposed rule likely would not have a significant economic impact on a substantial number of small entities (5 U.S.C. 605(b)). The authority to designate systemically important FMUs, however, resides with the Council, rather than the Board, and the Board cannot therefore be assured of the identity of the FMUs that the Council may designate in the future. Accordingly, an Initial Regulatory Flexibility Analysis has been prepared in accordance with 5 U.S.C. 603, based on current information. The Board requests comment on all aspects of this Initial Regulatory Flexibility Analysis. The Board will, if necessary, conduct a final regulatory flexibility analysis after consideration of comments received during the public comment period." />
                      <outline text="1. Statement of the need for, objectives of, and legal basis for, the proposed rule. The Board is proposing additional regulations to implement certain provisions of Title VIII of the Dodd-Frank Act. Pursuant to section 806(a) of the Act, proposed &#167; 234.6 sets out conditions under which the Board would authorize a Federal Reserve Bank to establish and maintain an account for a designated FMU and provide the designated FMU services through the account. Pursuant to section 806(c) of the Dodd-Frank Act, proposed &#167; 234.7 sets out conditions for a Reserve Bank to pay interest on the balances maintained by a designated FMU at the Reserve Banks." />
                      <outline text="Under section 806 of the Act, all of these authorities are subject to any applicable rules or regulations that the Board may prescribe. The Board believes that the proposed regulations herein are necessary to provide guidance to the Federal Reserve Banks in implementing these authorities of the Act in an appropriate and uniform manner and to inform the affected institutions and the public of the conditions for obtaining accounts and services." />
                      <outline text="2. Small entities affected by the proposed rule. The proposed rule would affect FMUs that the Council designates as systemically important to the U.S. financial system. The Council has designated eight FMUs that would meet these conditions and be affected by this proposed rule. Pursuant to regulations issued by the Small Business Administration (the &apos;&apos;SBA&apos;&apos;) (13 CFR 121.201), a &apos;&apos;small entity&apos;&apos; includes an establishment engaged in (i) financial transaction processing, reserve and liquidity services, and/or clearinghouse services with an average revenue of $7 million or less (NAICS code 522320); (ii) securities and/or commodity exchange activities with an average revenue of $7 million or less (NAICS code 523210); and (iii) trust, fiduciary, and/or custody activities with an average revenue of $7 million or less (NAICS code 523991). Based on current information, the Board does not believe that any of the FMUs that have been or would likely be designated by the Council would be &apos;&apos;small entities&apos;&apos; pursuant to the SBA regulation." />
                      <outline text="3. Projected reporting, recordkeeping, and other compliance requirements. The proposed rule imposes certain reporting, recordkeeping, and other compliance requirements for a designated FMU. For example, proposed &#167; 234.6(b)(1) requires the designated FMU to be in generally sound financial condition. In addition, proposed &#167; 234.6(b)(4) requires a designated FMU to demonstrate an ongoing ability, including during periods of market stress or a participant default, to meet all of its obligations under its agreement for a Reserve Bank account and services. Proposed &#167; 234.6(c) also clarifies that the Board or Reserve Bank may request a designated FMU to provide any information or verification necessary to determine compliance with any conditions imposed under proposed &#167; 234.6." />
                      <outline text="4. Identification of duplicative, overlapping, or conflicting Federal rules. The Board does not believe that any Federal rules conflict with the proposed rules. Certain entities that are designated FMUs under Title VIII of the Act may maintain an account with a Reserve Bank under other statutory authority, such as an entity that is chartered as a depository institution, state member bank, or Edge corporation. This rulemaking would provide additional authority for the entity to establish and maintain an account at a Reserve Bank and, arguably, be duplicative or overlapping with such other authority. This rulemaking would not, however, create any conflicting requirements for a designated FMU that is permitted to maintain an account with a Reserve Bank under multiple sources of authority." />
                      <outline text="5. Significant alternatives to the proposed rule. In lieu of the proposed rules, the Board could have proposed fewer or less stringent conditions on designated FMUs. The Board believes, however, that the proposed rules are necessary to address risk to the Reserve Banks in offering accounts and services and that the information required from designated FMUs under the proposed rules is needed to mitigate such risks. In addition, the Board does not believe that providing fewer or less stringent conditions for designated FMUs that are small entities would achieve the regulation&apos;s purpose because the risks to the Reserve Banks are the same regardless of whether the designated FMU is a small entity. The Board also considered a more expansive list of detailed conditions, but decided instead to set the overall standard as avoiding undue risk to the Reserve Bank, while providing a limited number of minimum requirements in meeting that standard. As noted above, the proposed rules provide some flexibility to the Reserve Bank in determining whether any additional measures are necessary to mitigate the risks presented by that designated FMU, given the facts and circumstances of the designated FMU seeking the account or services." />
                      <outline text="B. Paperwork Reduction Act AnalysisIn accordance with the Paperwork Reduction Act of 1995 (44 U.S.C. 3506; 5 CFR 1320, Appendix A.1), the Board reviewed the proposed rule under the authority delegated to the Board by the Office of Management and Budget. The proposed rule contains no requirements subject to the PRA." />
                      <outline text="Pursuant to the authority in Title VIII of the Dodd-Frank Act and particularly sections 806(a) and (b) (12 U.S.C. 5465(a) and (b)), the Board proposes two new sections to part 234 (Regulation HH)." />
                      <outline text="For the reasons set forth in the preamble, the Board proposes to amend 12 CFR Chapter II as set forth below." />
                      <outline text="begin regulatory text" />
                      <outline text="1.The authority citation for part 234 continues to read as follows:" />
                      <outline text="Authority:12 U.S.C. 5461et seq." />
                      <outline text="2.Amend &#167; 234.1 by revising paragraph (b) to read as follows:" />
                      <outline text="&#167; 234.1 Authority, purpose, and scope.* * * * *" />
                      <outline text="(b) Purpose and scope. This part establishes risk-management standards governing the operations related to the payment, clearing, and settlement activities of designated financial market utilities. In addition, this part sets out requirements and procedures for a designated financial market utility that proposes to make a change to its rules, procedures, or operations that could materially affect the nature or level of risks presented by the designated financial market utility and for which the Board is the Supervisory Agency (as defined below). The risk management standards do not apply, however, to a designated financial market utility that is a derivatives clearing organization registered under section 5b of the Commodity Exchange Act (7 U.S.C. 7a-1) or a clearing agency registered with the Securities and Exchange Commission under section 17A of the Securities Exchange Act of 1934 (15 U.S.C. 78q-1), which are governed by the risk-management standards promulgated by the Commodity Futures Trading Commission or the Securities and Exchange Commission, respectively, for which each is the Supervisory Agency. This part also sets out standards, restrictions, and guidelines regarding a Federal Reserve Bank establishing and maintaining an account for, and providing services to, a designated financial market utility. In addition, this part confirms the terms under which a Reserve Bank may pay a designated financial market utility interest on the designated financial market utility&apos;s balances held at the Reserve Bank." />
                      <outline text="3.Add &#167;&#167; 234.6 and 234.7 to read as follows:" />
                      <outline text="&#167; 234.6 Access to Federal Reserve Bank accounts and services.(a) This section applies to any designated financial market utility for which the Board may authorize a Federal Reserve Bank to open an account or provide services in accordance with section 806(a) of the Dodd-Frank Act. Upon receipt of Board authorization and subject to any limitations, restrictions, or other requirements established by the Board, a Federal Reserve Bank may enter into agreements governing the details of its accounts and services with a designated financial market utility, consistent with this section and any other applicable Board direction." />
                      <outline text="(b) A Federal Reserve Bank should ensure that its establishment and maintenance of an account for or provision of services to a designated financial market utility does not create undue credit, settlement, or other risk to the Reserve Bank. At a minimum, to establish and maintain an account with a Federal Reserve Bank or receive financial services from a Federal Reserve Bank, a designated financial market utility must, in the Federal Reserve Bank&apos;s judgment&apos;--" />
                      <outline text="(1) Be in generally sound financial condition;" />
                      <outline text="(2) Be in compliance, based on information provided by the Supervisory Agency, with requirements imposed by its Supervisory Agency regarding financial resources, liquidity, participant default management, and other aspects of risk management;" />
                      <outline text="(3) Be in compliance with Board orders and policies, Federal Reserve Bank operating circulars, and other applicable Federal Reserve requirements regarding the establishment and maintenance of an account at a Federal Reserve Bank and the receipt of financial services from a Federal Reserve Bank; and" />
                      <outline text="(4) Demonstrate an ongoing ability, including during periods of market stress or a participant default, to meet all of its obligations under its agreement for a Federal Reserve Bank account and services." />
                      <outline text="(c) The Board or Federal Reserve Bank may request that the designated financial market utility provide any information or verification necessary regarding compliance with any conditions imposed under this section." />
                      <outline text="(d) The Board will consult with the Supervisory Agency of a designated financial market utility prior to authorizing a Federal Reserve Bank to open an account, and periodically thereafter, to ascertain the views of the Supervisory Agency regarding the condition of the designated financial market utility and compliance with the requirements of this section or to coordinate information requests." />
                      <outline text="(e) In addition to any right that a Reserve Bank has to terminate an account or the use of a service pursuant to an agreement, the Board may direct the Federal Reserve Bank to impose limits, restrictions, or other conditions on the availability or use of a Federal Reserve Bank account or service by a designated financial market utility, including directing the Reserve Bank to terminate the use of a particular service or to close the account." />
                      <outline text="&#167; 234.7 Interest on balances.(a) A Federal Reserve Bank may pay interest on balances maintained by a designated financial market utility at the Federal Reserve Bank in accordance with this section and under such other terms and conditions as the Board may prescribe." />
                      <outline text="(b) Interest on balances paid under this section shall be at the rate paid on balances maintained by depository institutions or another rate determined by the Board from time to time, not to exceed the general level of short-term interest rates." />
                      <outline text="(c) For purposes of this section, &apos;&apos;short-term interest rates&apos;&apos; shall have the same meaning as the meaning provided for that term in &#167; 204.10(b)(3) of this chapter." />
                      <outline text="end regulatory text" />
                      <outline text="By order of the Board of Governors of the Federal Reserve System, February 26, 2013." />
                      <outline text="Robert deV. Frierson," />
                      <outline text="Secretary to the Board." />
                      <outline text="[FR Doc. 2013-04841 Filed 3-1-13; 8:45 am]" />
                      <outline text="BILLING CODE 6210-01-P" />
              </outline>

              <outline text="&quot;In America We Don&apos;t Careen From One Manufactured Crisis To Another&quot; Pres Obama Weekly">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=qNx9eQTHuhY&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Sun, 03 Mar 2013 05:23" />
                      <outline text="" />
              </outline>

              <outline text="How Does the U.S. Mark Unidentified Men in Pakistan and Yemen as Drone Targets?">
                      <outline text="Link to Article" type="link" url="http://occupyamerica.crooksandliars.com/propublica/how-does-us-mark-unidentified-men" />        <outline text="Source: Crooks and Liars" type="link" url="http://feeds.feedburner.com/crooksandliars/YaCP" />
      <outline text="Sun, 03 Mar 2013 05:20" />
                      <outline text="" />
                      <outline text="By Cora Currier, ProPublica" />
                      <outline text="Earlier this week, we wrote about a significant but often overlooked aspect of the drone wars in Pakistan and Yemen: so-called signature strikes, in which the U.S. kills people whose identities aren&apos;t confirmed. While President Obama and administration officials have framed the drone program as targeting particular members of Al Qaeda, attacks against unknown militants reportedly may account for the majority of strikes." />
                      <outline text="The government apparently calls such attacks signature strikes because the targets are identified based on intelligence &quot;signatures&quot; that suggest involvement in terror plots or militant activity." />
                      <outline text="So what signatures does the U.S. look for and how much evidence is needed to justify a strike?" />
                      <outline text="The Obama administration has never spoken publicly about signature strikes. Instead, generally anonymous officials have offered often vague examples of signatures. The resulting fragmentary picture leaves many questions unanswered." />
                      <outline text="In Pakistan, a signature might include:" />
                      <outline text="Training camps&apos;..." />
                      <outline text="Convoys of vehicles that bear the characteristics of Qaeda or Taliban leaders on the run. &apos;&apos; Senior American and Pakistani officials,New York Times, February 2008.&quot;Terrorist training camps.&quot; &apos;&apos; U.S.Diplomatic Cable released by Wikileaks, October 2009.Gatherings of militant groups or training complexes. &apos;&apos; Current and former officials, Los Angeles Times, January 2010.Bomb-making or fighters training for possible operations in Afghanistan&apos;.... a compound where unknown individuals were seen assembling a car bomb. &apos;&apos; Officials, Los Angeles Times, May 2010.Travel in or out of a known al-Qaeda compound or possession of explosives. &apos;&apos; U.S. officials, Washington Post, February 2011.Operating a training camp&apos;... consorting with known militants. &apos;&apos; High-level American official, The New Yorker, September 2011.A group of guys&apos;..." />
                      <outline text="Large groups of armed men. &apos;&apos; Senior U.S. intelligence official, Associated Press, March 2012.Groups of armed militants traveling by truck toward the war in Afghanistan.&apos;&apos;Administration officials, Washington Post, April 2012.The joke was that when the C.I.A. sees &quot;three guys doing jumping jacks,&quot; the agency thinks it is a terrorist training camp. &apos;&apos; Senior official, May 2012.&quot;The definition is a male between the ages of 20 and 40&quot; &apos;&apos; Former Ambassador to Pakistan Cameron Munter, Daily Beast, November 2012.&quot;Armed men who we see getting into pickup trucks and heading towards the Afghanistan border or who are in a training exercise.&quot; &apos;&apos; Former Director of National Intelligence Dennis Blair, Council on Foreign Relations, January 2013.Officials have characterized the intelligence that goes into these strikes as thorough, based on &quot;days&quot; of drone surveillance and other sources&apos;--and said that apparently low-level people may still be key to an organization&apos;s functioning. In 2010, an official told the Los Angeles Times that the CIA makes sure &quot;these are people whose actions over time have made it obvious that they are a threat.&quot;" />
                      <outline text="In Yemen, signature strikes are reportedly bound by stricter rules. Officials have often cited the necessity of a plot against Americans:" />
                      <outline text="Clear indication of the presence of an al-Qaeda leader or of plotting against targets in the United States or Americans overseas.&apos;&apos; Administration officials, Washington Post, April 2012.&quot;Individuals who are personally involved in trying to kill Americans&apos;... or intelligence that&apos;...[for example] a truck has been configured in order to go after our embassy in Sanaa.&quot;&apos;-- Senior administration official, Washington Post, January 2013These strikes are not supposed to target &quot;lower-level foot soldiers battling the Yemeni government,&quot; U.S. officials told the Wall Street Journal.  A White House spokesman said last summer that the U.S. &quot;[has] not and will not get involved in a broader counterinsurgency effort&quot; in Yemen." />
                      <outline text="But experts say some strikes in Yemen do appear to have been aimed at local militants. In Pakistan, in addition to low-level militants who might be involved in the war in Afghanistan, the U.S. has sometimes hit those who posed a threat to the Pakistani government." />
                      <outline text="As we detailed, signature strikes have also been criticized by human rights groups and some legal observers because of the lack of transparency surrounding them, including on the number of civilians killed. " />
              </outline>

              <outline text="Unconfirmed: Key Al Qaeda Leader Moktar Belmoktar Killed">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=voJsEFNSGpI&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Sun, 03 Mar 2013 05:20" />
                      <outline text="" />
              </outline>

              <outline text="&quot;Cut Welfare Spending Before Any More Cuts To The Military!&quot;">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=8Yo75yAJEFU&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Sun, 03 Mar 2013 05:20" />
                      <outline text="" />
              </outline>

              <outline text="Protests Across Portugal Against Austerity! &quot;Forced To Pay Debt Created Corrupt Politician &amp; Bankers">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=l9VvIX6ixLo&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Sun, 03 Mar 2013 02:24" />
                      <outline text="" />
              </outline>

              <outline text="NATO Helicopter Kills Two Boys 11 &amp; 12 Years Old Out Collecting Firewood">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=oXM-YHJQqlg&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Sun, 03 Mar 2013 02:23" />
                      <outline text="" />
              </outline>

              <outline text="Making, and Eating, the 1950s&apos; Most Nauseating Jell-O Soaked Recipes | Collectors Weekly">
                      <outline text="Link to Article" type="link" url="http://www.collectorsweekly.com/articles/the-1950s-most-nauseating-jell-o-soaked-recipes/" />      <outline text="Sun, 03 Mar 2013 02:22" />
                      <outline text="" />
                      <outline text="By Hunter Oatman-Stanford" />
                      <outline text="Poring over vintage cookbooks and food advertisements is equal parts intriguing and repulsive: People willingly ate things like &apos;&apos;Shrimp Aspic Mold&apos;&apos; and &apos;&apos;Chicken Mousse&apos;&apos;? Unlike the menus on contemporary food blogs and in best-selling recipe books, mid-century cooking seems guaranteed to make you gag, thanks to its mismatched flavors, industrial ingredients, and gelatin overload." />
                      <outline text="Top: Shrimpy, gelatinous, mid-century bliss. Above: Decked out in mid-century modern garb, Clark poses with a sour cream recipe book." />
                      <outline text="Often the strangeness of this era&apos;s food stemmed from innovations being tested on our nation&apos;s taste buds. World War II spurred an industrial food boom, introducing many technologies to keep foods fresh longer, from freezing to dehydrating. As Laura Shapiro explains in her book &apos;&apos;Something From the Oven: Reinventing Dinner in 1950s America,&apos;&apos; at the war&apos;s end, packaged food companies realized they had to convince domestic consumers to purchase their wartime products or risk shuttering their businesses." />
                      <outline text="As a result, during the late 1940s and early &apos;50s, a new crop of ideas about eating were thrust upon the public as the industry tried to &apos;&apos;persuade millions of Americans to develop a lasting taste for meals that were a lot like field rations,&apos;&apos; writes Shapiro. Hence the debut of frozen airline foods and canned meat products like Spam." />
                      <outline text="Today, foodies typically look back on this era with an upturned nose, preferring to mock its foods rather than eat them. So when Ruth Clark took the obvious, and daring, step of actually making these retro recipes for her fascinating website The Mid-Century Menu, it&apos;s not surprising she received a bit of hate mail. Clark typically cooks one vintage meal per week, which she documents through scans of the original recipe, photos of her re-creation, and detailed tasting notes (often featuring amusing photos of her husband, Tom, attempting his first few bites). Her blog is an everyday cook&apos;s version of the Julie &amp; Julia project, featuring the food that real people made in mid-century America." />
                      <outline text="Clark recently gave us her experienced take on the marvels of mid-century eating, and the lessons contemporary cooks can learn from it." />
                      <outline text="A shelf full of mid-century cookbooks from Clark&apos;s personal collection." />
                      <outline text="Collectors Weekly: How did you start the Mid-Century Menu project?Clark: My first blog, No Pattern Required, started in February of 2009, and I was looking for something to flesh it out a little, and also to be a bit different than the other mid-century blogs out there. I was talking to my husband and I said, &apos;&apos;I have all these cookbooks, but I don&apos;t just want to scan pictures and show people the recipes. I want to make these.&apos;&apos; And he thought it was an excellent idea, so Tom&apos;s been on board the whole time." />
                      <outline text="Collectors Weekly: How would you categorize mid-century food?Ann MacGregor displays the diversity of edible freezer options in a 1957 image from her &apos;&apos;Cookbook For Frozen Foods.&apos;&apos;" />
                      <outline text="Clark: Experimental. They were trying to get housewives to try these new products and use all these new techniques to make your life easier. Make a cake faster, make a soup faster, or use frozen foods for shortcut cooking. The mid-20th century saw an explosion of changes in all of American culture. People were testing out these new things discovered in World War II, like foods from different cultures, and also changes in technology, like frozen foods, that made more food available to more people." />
                      <outline text="People were experimenting with all these things they had never seen or used before, and they didn&apos;t quite know what to do with them. If you watch that show &apos;&apos;Chopped&apos;&apos; on Food Network, I kind of think that&apos;s what the mid-century cook felt like: We have all these weird ingredients, and what are we going to make with them? Well, let&apos;s try this." />
                      <outline text="The other side is that many of the crazier recipes came from brand-specific cookbooks produced by companies trying to put their products into every single part of your meal. That&apos;s easy to do with some stuff, like salt, but when you&apos;re talking about things like cans of condensed tomato soup or ketchup, it&apos;s a little more difficult to put those into a dessert." />
                      <outline text="Collectors Weekly: I always assumed food from this period was boring and bland.Clark: Well, it was blander, because people used spices a lot less than they do now. Surprisingly, back in the &apos;40s, people used a lot of curry powder, but they would only use an eighth of a teaspoon of curry powder. Or a recipe for chili might only have a quarter teaspoon of chili powder in it. People considered ketchup spicy. There was definitely a change in palate in terms of spices, which I think is why people consider it to be a bland type of cooking." />
                      <outline text="&apos;&apos;When you&apos;re talking about cans of condensed tomato soup or ketchup, it&apos;s a little more difficult to put those into a dessert.&apos;&apos;" />
                      <outline text="People think the proliferation of food blogs has made our tastes more diverse, but I actually think it&apos;s the reverse. I think they&apos;re becoming more of the same. People won&apos;t accept food unless it&apos;s a certain kind of food, and I think that going back to the mid-century cookbooks is opening up&apos;--well, especially mine and Tom&apos;s world&apos;--in terms of what we can eat and what&apos;s really out there. There are so many more options for everybody. It might not turn out perfectly, but there&apos;s so much out there that we have to work with." />
                      <outline text="Many 1950s recipe books were sponsored by major processed food businesses, like the Campbell Soup Company&apos;s &apos;&apos;Cooking with Condensed Soups.&apos;&apos;" />
                      <outline text="Collectors Weekly: Do you come across ingredients or techniques that modern cooks would be completely unfamiliar with?Clark: Yes, sometimes. Probably the most common issue is products that no longer exist. A great example is the Pillsbury &apos;&apos;Tunnel of Fudge&apos;&apos; cake, since one of the main ingredients is a frosting mix that&apos;s not made anymore. Jiffy brand still makes a fudge frosting mix which I substituted, and it turned out pretty well. But often there will be spice mixes or bottles of salad dressing that longer exist. I have to look them up online and guesstimate what was in there, and then try to re-create them." />
                      <outline text="As far as the techniques, some things are a little bit difficult to re-create, especially if you&apos;re doing it from a manufacturer&apos;s cookbook or an appliance cookbook. They&apos;ll say things like, &apos;&apos;Take your &apos;number five super iron&apos; and do this with it.&apos;&apos; I&apos;m like, well, I&apos;m just going to put this in my frying pan and hope that it turns out." />
                      <outline text="Collectors Weekly: What common modern dishes got their start in the mid-20th century?Clark: Casseroles were a big trend, and continue to be popular. For example, my husband has this tuna casserole that he loves with crushed potato chips on top, and I don&apos;t know how many times I&apos;ve seen that recipe in vintage cookbooks." />
                      <outline text="Cooking with a broiler was really popular, so a lot of that stuff has stuck around, this idea of the broiler dinner. And the Lipton onion soup mixed with sour cream, the California dip, that started during that time period, too. The idea of the cocktail hour with appetizer dips came into being, which I think is still with us." />
                      <outline text="Casseroles and dips were both burgeoning food trends during the mid-20th century." />
                      <outline text="Collectors Weekly: Do people often make personal connections with the recipes you post?Clark: Some people email me saying things like, &apos;&apos;Thank you so much for posting this recipe! My mom used to make it, and I&apos;ve been looking for it forever.&apos;&apos; And it&apos;ll be a terrible recipe, but as a child we eat things no matter how gross they are. You have this nostalgic feeling around certain foods, and you want to taste them again. Twinkies are a great example." />
                      <outline text="These people will be really excited by my posts, while others will be like, &apos;&apos;How can you do this? It&apos;s a waste of money. This is really stupid.&apos;&apos; I&apos;m surprised by how much hate mail I get over recipes!" />
                      <outline text="I remember when I first started doing this project, I was featured in my local newspaper. I think I had made a ham loaf, and some lady came on the blog and ranted at me about how it was a waste of space, how I should post &apos;&apos;good&apos;&apos; recipes, and how nobody wants to hear about things that don&apos;t work, and on and on. Really? Because this is our culinary history." />
                      <outline text="The table of contents page in a promotional cookbook produced by the American Dairy Association." />
                      <outline text="Collectors Weekly: Do you have a personal connection to the food of this era?Clark: A little bit. My grandmother gave me a box of cookbooks when she was cleaning out her apartment in Chicago. She said, &apos;&apos;Here, I&apos;m not going to use these ever again.&apos;&apos; I was like 14, and I started reading them like they were novels. I would just sit up at night to read them; they were just fascinating to me. I was like, &apos;&apos;Mom, look at this.&apos;&apos; She said, &apos;&apos;I know, right? I ate that stuff.&apos;&apos;" />
                      <outline text="Then my parents started bringing them to me, and then after I got out of college, I started buying them on my own, and all of a sudden I was finding them everywhere." />
                      <outline text="A sampling from Clark&apos;s cookbook collection, which started with a stack of hand-me-downs from her grandmother." />
                      <outline text="That&apos;s also why I started making lamb-shaped cakes. I remember when I would visit my grandmother in Chicago, she would take me to this bakery in her neighborhood where they had lamb cakes during Easter." />
                      <outline text="I&apos;m not exactly the lamb cake guru, but I think they came from Eastern Europe. I know that a lot of Polish Catholic churches and a lot of German Lutheran churches had them on Easter. Originally, you&apos;d bring in a basket of food and have the priest bless it and inside you&apos;d have the lamb. But I think bringing a hunk of meat became an issue, so it was better to bring a cake, which could sit around all day covered in icing." />
                      <outline text="My theory is that they became really popular during the mid-century because of the new aluminum molds. Before they had been cast-iron, which was very expensive to buy, but the aluminum ones were cheap. You could buy one in a five-and-dime. And everybody loved these molded foods in the shape of something else." />
                      <outline text="Left, Clark&apos;s vintage lamb cake pan in action. Right, one of her many recipe tests in its final form." />
                      <outline text="So my grandmother made a lamb cake, and I was always obsessed with it. I would be so excited every Easter: We&apos;d go to her house and cut the lamb&apos;s head off, and everyone would stare at it on the plate and pretend to be afraid. It was really a tradition in our family. I remember the exact taste of it in my mouth, and I&apos;d just yearn for it when I got older." />
                      <outline text="&apos;&apos;I&apos;m sorry I spat on your pork cake.&apos;&apos;" />
                      <outline text="I started trying to re-create it, and my mom said that she used a boxed cake mix, but I kept trying pound cake mixes and none of them would quite come out right because, of course, cake mixes have changed over time. Eventually I began digging around in my cookbooks and marking recipes to test for Easter. I had my grandmother&apos;s aluminum lamb pan which made the lamb-shaped cake, but I didn&apos;t have any instructions with it, so I was fumbling my way through it." />
                      <outline text="Then last year, I was mentioned in an article in &apos;&apos;The Wall Street Journal,&apos;&apos; and I got so many recipes and tips sent to me. It was amazing. And I think the second or third one that I tested tasted exactly like my grandmother&apos;s recipe, so maybe she didn&apos;t make it from a box all the time. Maybe she made it from scratch sometimes. It was definitely that familiar taste. The one that was closest to my grandmother&apos;s was like a spring cake, so it wasn&apos;t really super moist or dense. It was very well structured." />
                      <outline text="Tom in a state of gelatin overload." />
                      <outline text="Collectors Weekly: Why was Jell-O was such a big deal during this time?Clark: I think there are a couple different reasons for that, kind of like when you ask someone, &apos;&apos;Why did the Civil War start?&apos;&apos; There are lots and lots of reasons. I think the main appeal of Jell-O was convenience. You could pour boiling water in it, add cold water, and then you have dessert." />
                      <outline text="Advertising was also a big part of Jell-O&apos;s fame. I think it was in the &apos;30s that Jack Benny started talking about Jell-O on his radio show. He did the &apos;&apos;J-E-L-L-O&apos;&apos; thing, which became famous because everybody listened to Jack Benny. He also put out a Jell-O cookbook." />
                      <outline text="Left, Jack Benny and Mary Livingstone&apos;s 1937 Jell-O cookbook helped kick off the craze. Right, early Jell-O ads positioned the product as a suitable ingredient for all parts of a meal." />
                      <outline text="I think there was such a proliferation of advertising that it created this mindset that, hey, I can use Jell-O as an easy dessert or an easy lunch. I don&apos;t have to mess around with it a lot. If you&apos;ve looked through any stash of vintage cookbooks, invariably there&apos;ll be at least one Jell-O recipe book in it because everybody owned one." />
                      <outline text="It&apos;s really hard to say why the savory Jell-O salad became something. I was talking to my dad about this the other day, and he said it became this crazy thing in his family where every holiday, all my aunts would try to outdo each other with these fantastic, multi-layered gelatin molds." />
                      <outline text="Collectors Weekly: Were these served as desserts or side dishes?Clark: They were everything. Some came as desserts, some as side dishes, and some were main-course stuff. It was freaky." />
                      <outline text="Presentation was a major feature of many mid-century recipes for entertaining, as showcased with these cracker kabobs a la grapefruit." />
                      <outline text="I really think at the time, their idea of food artistry was very different than ours, which is evident in all of the pictures from that era. I think that at the time, this fancy centerpiece was considered the epitome of class. I don&apos;t know if you&apos;ve seen Charles Phoenix&apos;s weenie tree? Basically you take a Styrofoam tree, wrap it in tin foil, and stick little hot dogs on sticks into this tree and your guests were supposed to pull the hot dogs off and dip them in the sauces and eat them." />
                      <outline text="Think of things like the lamb cake or the gelatin mold. The idea of having this big, edible centerpiece was really popular back then, which I notice in a lot of cookbooks." />
                      <outline text="I haven&apos;t really heard a lot of food historians talk about this, but I&apos;ve found that food mixed into Jell-O stays fresher much longer than if you have it by itself." />
                      <outline text="Collectors Weekly: Whoa, how long are you talking about, like weeks?Clark: Like days. For example, Perfection Salad is basically coleslaw inside of lemon or lime Jell-O, so it&apos;s got cabbage and carrots and all kinds of stuff. But the cabbage will stay fresh for over a week. If you take a bite of it, it&apos;s still crunchy. My husband, Tom, tries all this. He&apos;s a chemist, so he&apos;ll keep tasting it long, long after I&apos;m done with it. But if you make regular coleslaw and put dressing on it, the cabbage becomes soggy after three days. And after five days, you&apos;re not going to eat it." />
                      <outline text="We&apos;ve done a lot of different Jell-O stuff and noticed that freshness is basically extended when you encase things in Jell-O. We&apos;ve done cakes covered with gelatin, and the cake would still be moist after a week and a half. We made sandwiches with gelatin, open-faced sandwiches with flavored gelatin poured over the top, which was supposed to be like mayo. I thought it was going to be disastrous. Tom wolfed them down. He&apos;s like, &apos;&apos;These are really good and the bread isn&apos;t soggy.&apos;&apos; I&apos;m like, &apos;&apos;Are you kidding me?&apos;&apos; Two days later, they were still edible." />
                      <outline text="I don&apos;t know if being frugal and using up leftovers was part of the Jell-O trend, putting them in gelatin and then trying to force them down that way. But that&apos;s my theory." />
                      <outline text="An advertisement for various &apos;&apos;salad&apos;&apos; flavored Jell-O products, which are no longer in production. Clark has rediscovered the preservative effect of Jell-O on encased foods." />
                      <outline text="Collectors Weekly: Have you tried any of the savory Jell-O flavors?Clark: They don&apos;t make them anymore, unfortunately. If they did make them, I would love it, because the thing I hate the most in the world is taking a lemon gelatin and putting vinegar in it to try and make it savory. It&apos;s disgusting. I&apos;d much rather start with unflavored gelatin or savory-flavored gelatin than sweet. Knox still makes their classic plain gelatin, and you can put whatever the heck you want in it. So thank God for that." />
                      <outline text="Collectors Weekly: I can&apos;t even imagine what egg Jell-O would taste like.Clark: Pretty bad. We made jellied eggs one time where it was hard-boiled eggs encased in gelatin, and Tom gagged." />
                      <outline text="Collectors Weekly: Does Tom actually enjoy the taste-testing?Clark: He does in a weird, masochistic kind of way. I think he really does. Sometimes he&apos;ll whine about it; he especially hates American cheese. So with anything that has American cheese, he&apos;s like, &apos;&apos;Do I have to eat it?&apos;&apos; I&apos;m like, &apos;&apos;Do it. You promised.&apos;&apos;" />
                      <outline text="This unfortunate-sounding lime Jell-O concoction with avocado, grapefruit, and mayonnaise actually turned out quite tasty." />
                      <outline text="Collectors Weekly: What are the strangest recipes that you&apos;ve tried, whether good or bad?Clark: It really varies; we&apos;ve had both extremes. For a gelatin contest, we had a recipe with lime Jell-O, avocado, grapefruit, and mayo on top. And it was good. I couldn&apos;t believe it worked. But then for the same contest, we made a pineapple olive salad with lemon Jell-O, which is basically what it sounds like, and it was horrible." />
                      <outline text="We made a Black Magic Chocolate Cake, which is basically chocolate cake with a can of condensed tomato soup inside. It&apos;s like, &apos;&apos;What? What?!&apos;&apos; But seriously, it was amazing. It&apos;s the only chocolate cake I make anymore because Tom won&apos;t eat any other chocolate cake. It was nuts; you have to try it. And it was really easy to make. You just dump everything in the bowl and stir it up. It&apos;s so weird." />
                      <outline text="A surprisingly delicious recipe for Black Magic Chocolate Cake includes a can of condensed tomato soup. From left to right: Ingredient assembling, Tom cleans his plate, and the final product." />
                      <outline text="Then we made a pork cake, which basically means you take un-rendered pork fat and you stir it into the mix instead of butter or anything like that. You put it in the oven for four hours, cook it down, and then eat it. And that was interesting. It wasn&apos;t bad, but there were pieces of pork fat in it, which is a little disgusting, but it tasted OK. It tasted like gingerbread. When I was on the radio in Wisconsin, I mentioned that it was kind of gross, and we had so many calls from people who were pissed at me." />
                      <outline text="Collectors Weekly: Because they use that recipe?Clark: Because they love pork cake! They&apos;d say, &apos;&apos;Oh, my grandfather used to make this pork cake, and it&apos;s really common.&apos;&apos; I&apos;m like, okay, well, I&apos;m sorry I spat on your pork cake." />
                      <outline text="This spread featuring &apos;&apos;Pork Cake&apos;&apos; shows the variety of cakes that mid-century cooks were familiar with." />
                      <outline text="Collectors Weekly: What is the absolute most disgusting thing you&apos;ve tried?Clark: The liver pt(C) en masque. It was basically a dare with some other food bloggers and myself. Another food blogger sent the recipe to me. She&apos;s even braver than I am because she cooks vintage Weight Watchers recipes, which are always disgusting. It&apos;s not even real food; it&apos;s just made-up food. The recipe she gave me was liver and canned green beans folded into a mold, and then it had this light sauce made from gelatin, pepper, and no-fat buttermilk that you were supposed to pour over the top. And it was the worst thing ever. Tom normally chokes down at least his serving, but he only had one bite. He couldn&apos;t even do it." />
                      <outline text="This liver pt(C) en masque was possibly the most offensive recipe Clark has ever tasted." />
                      <outline text="Collectors Weekly:  The chicken mousse recipe also really weirded me out.Clark: That was bizarre. If I remember correctly, it actually tasted pretty good if you were trying for a chicken pt(C). The seasoning was good. But it was the form: It was ice cream. It was chicken ice cream. And it had gelatin in it, so when it thawed, it didn&apos;t melt. It stayed the same. It became this spongy, weird&apos;--it was really bad. We tried to give some of it to my cat, and she wouldn&apos;t even eat it." />
                      <outline text="The person who sent the recipe to me said it came from a book of frozen desserts. And I&apos;m like, &apos;&apos;What the what? Was there an appetizer section?&apos;&apos; And she said no. It was just crammed in there with chocolate ice cream." />
                      <outline text="Chicken mousse might look tasty, but the flavor and texture didn&apos;t match up." />
                      <outline text="Collectors Weekly: Do you have any foods that are off limits?Clark: No. We&apos;ll eat anything. I even cooked a tongue. It was so horrible. Did you know that when you cook a tongue, you have to peel it? You have to peel it! I remember talking to my mom about it, and she was like, &apos;&apos;What do you think hot dogs are made of? Just cook it and eat it.&apos;&apos;" />
                      <outline text="Collectors Weekly: Many of the recipes in your &apos;&apos;Best&apos;&apos; section seem to be desserts. Why is that?Clark: Well, I think all areas of cooking have changed quite a bit, but I don&apos;t think that there&apos;s as much variation in baking today as there used to be. You walk into a bakery now, and you pick from chocolate and vanilla cake with white or chocolate icing. Most of the time, the icing is all chocolate butter cream, and not even fudge icing. But if you look into a mid-century cookbook, you could pick from 15 cakes with 15 different icings. There&apos;s peanut butter and malted milk and candy bar, just all these different kinds that people made by basically boiling sugar, the way you make fudge." />
                      <outline text="The cover of the &apos;&apos;Festive Foods&apos;&apos; edition from 1965, one of the cookbooks in Clark&apos;s collection." />
                      <outline text="I think that dessert recipes tend to be better because people were better bakers back then, to be honest. It was a time when people were just getting used to boxed mixes, and a lot of the recipes in contests where people would submit their own recipes, like the Pillsbury bake-offs, are amazing. The recipes are for these huge layer cakes that people made from scratch and perfected for this contest, and they were just regular people cooking in their home kitchen." />
                      <outline text="Collectors Weekly: What has this project taught you?Clark: The main thing I&apos;ve learned from retro cooking is to be adventurous, because sometimes things don&apos;t end up like you think they will. Sometimes, of course, you&apos;ll fail, because everybody fails, but most of the time you&apos;ll succeed and it&apos;ll be amazing. Before I started this project, I didn&apos;t know how to make a white sauce and now I whip them out like crazy." />
                      <outline text="All images courtesy Ruth Clark&apos;s Mid-Century Menu." />
              </outline>

              <outline text="Holocaust Researchers: There Were Many More Nazi Concentration Camps Than Previously Thought">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=QSaXmSudC6Y&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Sun, 03 Mar 2013 02:19" />
                      <outline text="" />
              </outline>

              <outline text="BBC News - Islamist militant Mokhtar Belmokhtar &apos;killed in Mali&apos;">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/world-africa-21645769" />      <outline text="Sun, 03 Mar 2013 01:19" />
                      <outline text="" />
                      <outline text="2 March 2013Last updated at18:01 ETPlease turn on JavaScript. Media requires JavaScript to play." />
                      <outline text="Thomas Fessy : &quot;There is a lot of confusion in the aftermath of the attack&quot;." />
                      <outline text="Islamist militant Mokhtar Belmokhtar has been killed by Chadian soldiers in Mali, Chad&apos;s armed forces say." />
                      <outline text="His death was announced on Chadian state television but has not been confirmed by other sources." />
                      <outline text="Mokhtar Belmokhtar is a former al-Qaeda leader said to have ordered January&apos;s attack on an Algerian gas plant where at least 37 hostages were killed." />
                      <outline text="Chadian troops are fighting Islamist militants in Mali as part of an international force led by France." />
                      <outline text="&quot;Chadian forces in Mali completely destroyed the main jihadist base in the Adrar de Ifhogas mountains... killing several terrorists including leader Mokhtar Belmokhtar,&quot; the army statement on Chadian TV said." />
                      <outline text="Weapons, equipment and 60 vehicles were seized, it added." />
                      <outline text="Continue reading the main storyAnalysisThis is the second big claim in two days coming from Chad. First Abu Zeid, now Mokhtar Belmokhtar. There is no other confirmation that these two top jihadi commanders have been killed." />
                      <outline text="President Deby is probably keen for a reward after he sent nearly 2,000 soldiers to the frontline. But certainly the Chadians are well aware that such reports won&apos;t go unnoticed. Abu Zeid is known as the most ruthless al-Qaeda field commander in the region - he is believed to have executed at least two European hostages in recent years. Mokhtar Belmokhtar claimed responsibility for the spectacular attack on a gas facility in Algeria in January." />
                      <outline text="If confirmed, their deaths won&apos;t mean the war in Mali is over, but it will certainly be a big loss for jihadi fighters hiding in the mountains bordering Algeria. The French army doesn&apos;t even know how many fighters they are up against there. More worrying is the fate of several foreign hostages who are believed to be in the two men&apos;s custody." />
                      <outline text="If confirmed, the death would be a major blow to Islamist militants in Mali, the BBC&apos;s West Africa correspondent Thomas Fessy says." />
                      <outline text="&apos;Final stages&apos;Reports of the killing came a day after Chadian President Idriss Deby said the country&apos;s forces killed al-Qaeda militant Abdelhamid Abou Zeid during clashes in northern Mali." />
                      <outline text="Abou Zeid - whose death is still to be confirmed by DNA evidence - is said to be second-in-command of al-Qaeda in the Islamic Maghreb (AQIM), which is fighting foreign forces in Mali." />
                      <outline text="The French military - which is leading the military offensive in northern Mali - has not confirmed either death." />
                      <outline text="On Friday French President Francois Hollande said the operation was in its final stages." />
                      <outline text="Islamist militants took refuge in the remote mountains in northern Mali, close to the Algerian border, after being forced out of the main towns and cities by French troops backed by jets and helicopters." />
                      <outline text="Mali&apos;s army and troops from several African countries have also been involved in the fighting." />
                      <outline text="Islamist rebels took control of northern Mali a year ago after a military coup in the capital Bamako, in the south." />
                      <outline text="Continue reading the main storyVeteran Islamist Mokhtar BelmokhtarClaims to have travelled to Afghanistan at the age of 19 to get military training from al-QaedaReturned to Algeria in 1993 and lost an eye fighting in the bloody conflict between Islamists and government forcesJoined al-Qaeda in the Islamic Maghreb, but later formed his own group after infightingBlamed for kidnapping and smuggling across the Sahara regionClaimed responsibility for the attack on an Algerian gas plant at In Amenas where at least 37 hostages were killedFrance intervened militarily in January amid fears they were preparing to advance on Bamako." />
                      <outline text="&apos;Mr Marlboro&apos;Algerian-born Mokhtar Belmokhtar has been fighting as an Islamist militant for more than two decades." />
                      <outline text="He claimed to have received military training in Afghanistan before returning to Algeria, where he lost an eye fighting in the Islamist insurgency in the 1990s." />
                      <outline text="He then joined AQIM - which operates across the Sahara - before breaking off to lead his own group." />
                      <outline text="The attack on the In Amenas gas plant in Algeria - which he claims he was behind - was his group&apos;s first large-scale armed attack." />
                      <outline text="He is also known as &quot;Mr Marlboro&quot; because of his alleged role in cigarette smuggling in the region." />
                      <outline text="Mokhtar Belmokhtar and Abu Zeid have also been involved in numerous kidnappings." />
                      <outline text="If confirmed, their deaths raise concerns about the fate of several foreign hostages believed to be in their power, our correspondent says." />
              </outline>

              <outline text="Syria fighting sparks tension on Iraq border">
                      <outline text="Link to Article" type="link" url="http://www.aljazeera.com/news/middleeast/2013/03/201332194615596756.html" />        <outline text="Source: AL JAZEERA ENGLISH (AJE)" type="link" url="http://www.aljazeera.com/Services/Rss/?PostingId=2007731105943979989" />
      <outline text="Sat, 02 Mar 2013 21:57" />
                      <outline text="" />
                      <outline text="Clashes between the Syrian army and rebels at a border crossing have brought the conflict close to neighbouring Iraq, where troops fired warning shots, residents and officials have reported." />
                      <outline text="Opposition fighters seized control of half of the northeastern Syrian town of Yaarabiya, including a shared border crosssing with Iraq, in a battle with forces loyal to President Bashar al-Assad on Friday and early Saturday, activists said." />
                      <outline text="Mayor of Iraq&apos;s Nineveh Province told Al Jazeera that Syrian government planes shelled Yaarabiya border crossing from Iraqi airspace. The central government has not commented on the statement." />
                      <outline text="A Syrian rebel commander earlier said the Iraqi army fired across the border at Syrian rebels, but Iraqi military sources denied the report." />
                      <outline text="A medical source from a hospital in Iraq&apos;s Telafar village said one dead and four wounded Syrian had been delivered there, identifying them as likely from the Syrian regular army." />
                      <outline text="&quot;We have been hearing the sound of explosions and guns in Yaarabiya for the past three days,&quot; said Ali Shibaib, who lives in Iraq only 300 metres from the border post with Syria." />
                      <outline text="&quot;The Syrian regular army troops are stationed between the Iraqi army and the Free Syrian army,&quot; he added." />
                      <outline text="On Friday, a Scud missile fired from Syrian territory landed near a village opposite Yaarabiya, causing no damage but terrifying locals, according to the mayor of Telefar." />
                      <outline text="The conflict in Syria has previously spilled into Iraq. In September, a five-year-old girl was killed when three rockets struck a border town in the al Qaim area." />
                      <outline text="Iraq&apos;s precarious sectarian and ethnic balance has also come under strain from the conflict next door, where mainly Sunni Muslim insurgents are fighting to overthrow Assad, who is backed by Shia Iran." />
                      <outline text="Earlier this week, Iraqi Prime Minister Nuri al-Maliki, a Shia Muslim, warned that a victory for rebels in the Syrian civil war will spark a sectarian war in his own country, a civil war in Lebanon and a division in Jordan." />
                      <outline text="Opposite another Syrian border on Saturday, Israeli soldiers found fragments of mortar shells that fell near an Israeli settlement in the occupied Golan Heights. No casualties or damage was caused and United Nations observers were notified, an army spokeswoman said." />
                      <outline text="Israel seized the Golan from Syria in a 1967 war and later annexed it." />
                      <outline text="Meanwhile, in Syria&apos;s north, government army announced on Saturday it seized control of a key road linking the central province of Hama to Aleppo international airport and nearby Nayrab military airport." />
                      <outline text="The capture of the road will allow the army to deploy fresh reinforcements and send supplies to the area near the airports, where fighting has raged since mid-February." />
                      <outline text="Clashes around the airport road were reportedly continuing despite the army&apos;s capture." />
                      <outline text="In al-Raqqa province, fierce battles continued around the provincial capital, reportedly leaving dozens of Syrian troops and rebel fighters dead." />
                      <outline text="Activists in Raqqa said on Saturday the army was using helicopters to strafe rebels in some parts of the provincial capital, in a rare escalation of violence in the city." />
                      <outline text="Fresh battles also rocked Daraya, a key rebel enclave southwest of Damascus which the army has fought to take back from insurgents for several weeks." />
                      <outline text="The United Nations says Syria&apos;s war has killed more than 70,000 people in nearly two years since the outbreak of an uprising against Assad&apos;s regime." />
                      <outline text="The number of Syrian refugees has been rising rapidly and the UN says it is going to pass one million by next week." />
                      <outline text="605" />
              </outline>

              <outline text="Border patrol drones can detect armed subjects and intercept wireless signals, documents show">
                      <outline text="Link to Article" type="link" url="http://mobile.theverge.com/2013/3/2/4057414/border-patrol-epic-documents-reveal-drone-specs" />      <outline text="Sun, 03 Mar 2013 01:17" />
                      <outline text="" />
                      <outline text="The Department of Homeland Security&apos;s border patrol drones are outfitted to distinguish armed subjects from unarmed ones and to potentially intercept communications signals. Earlier this week, the Electronic Privacy Information Center received a redacted document from the Bureau of Customs and Border Protection through the Freedom of Information Act, showing the performance specifications of Predator drones that are used to patrol the US border. Later, CNET found an unredacted copy. Among other things, the specifications include a surveillance system that is &quot;capable of identifying a standing human being at night as likely armed or not (based on position of arms).&quot;" />
                      <outline text="Besides the visual surveillance system, border patrol drones also incorporate interception of wireless signals. Though use cases aren&apos;t specified, the drone should be able to detect multiple signals and communication links for direction-finding, and also to include a &quot;signals intercept airborne suite&quot; that can pick up a range of spectrum. While detecting weapons makes sense in light of how law enforcement sees drones as a way to watch for potential criminals without putting its own people on the line, signal interception opens up new and unsettling surveillance opportunities, especially as drones become more common." />
                      <outline text="&quot;Any potential deployment... would be implemented in full consideration of civil rights.&quot;" />
                      <outline text="Right now, the Department of Homeland Security tells CNET it&apos;s not deploying the interception capabilities, and that &quot;Any potential deployment of such technology in the future would be implemented in full consideration of civil rights, civil liberties, and privacy interests and in a manner consistent with the law and long standing law enforcement practices.&quot; An unnamed official suggests that it was added as a form of future-proofing, because of the surveillance drones&apos; long lifespans. If Homeland Security does start using it, however, there&apos;s a good chance we won&apos;t find out for a long time." />
              </outline>

              <outline text="Presidential Proclamation -- National Consumer Protection Week, 2013">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/03/01/presidential-proclamation-national-consumer-protection-week-2013" />        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Sun, 03 Mar 2013 01:15" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="March 01, 2013" />
                      <outline text="BY THE PRESIDENT OF THE UNITED STATES OF AMERICA" />
                      <outline text="A PROCLAMATION" />
                      <outline text="Over 4 years ago, widespread abuses in America&apos;s financial system nearly brought our economy to its knees. Millions saw their life savings erode, businesses shuttered their doors, and families were devastated by job loss and foreclosure. This crisis cast a harsh light on the breakdown in oversight that led to an epidemic of irresponsibility, and it highlighted the need for common-sense regulations to protect the vast majority of Americans from the reckless actions of a few. During National Consumer Protection Week, we remember those lessons, and we recognize that our shared prosperity depends on empowering all Americans to make sound decisions for themselves and their families." />
                      <outline text="My Administration is ramping up consumer protection throughout the economy. Last year, we established a new unit to combat fraud and investigate the abusive lending and mortgage packaging that led to the housing crisis. We launched the &quot;Know Before You Owe&quot; campaign to help students and their parents make smart decisions about paying for college. We cracked down on unscrupulous lenders and credit card companies that charge hidden fees. And we did away with the practice of adding pages of misleading fine print to important financial agreements." />
                      <outline text="We are also committed to helping consumers avoid scams, protect their personal information, and make good financial decisions. That is why agencies across the Federal Government joined with consumer advocates to launch www.NCPW.gov, an online resource that provides practical advice for managing finances and safeguarding against identity theft." />
                      <outline text="As the driving force behind our economy, consumers deserve clear rules, fair treatment, and full disclosure. Whether opening credit cards, buying cars, applying for mortgages, or taking out student loans, all Americans should have access to complete, concise information. This week, we resolve to strengthen consumer rights and build a more transparent, efficient, effective marketplace." />
                      <outline text="NOW, THEREFORE, I, BARACK OBAMA, President of the United States of America, by virtue of the authority vested in me by the Constitution and the laws of the United States, do hereby proclaim March 3 through March 9, 2013, as National Consumer Protection Week. I call upon government officials, industry leaders, and advocates across the Nation to share information about consumer protection and provide our citizens with information about their rights as consumers." />
                      <outline text="IN WITNESS WHEREOF, I have hereunto set my hand this first day of March, in the year of our Lord two thousand thirteen, and of the Independence of the United States of America the two hundred and thirty-seventh." />
                      <outline text="BARACK OBAMA" />
              </outline>

              <outline text="If The FEDs Try And Shutdown The Legalization Of Marijuana &quot;We&apos;ll Have Another Civil War!&quot;">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=EUhHK2MEPjs&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Sun, 03 Mar 2013 01:14" />
                      <outline text="" />
              </outline>

              <outline text="Why Processed Food Is Cheaper Than Healthier Options : NPR">
                      <outline text="Link to Article" type="link" url="http://www.npr.org/2013/03/01/173217143/why-process-food-is-cheaper-than-healthier-options" />      <outline text="Sat, 02 Mar 2013 20:05" />
                      <outline text="" />
                      <outline text="Earlier in the week in our &quot;On the Run&quot; series, we heard a mom explain how mac and cheese was more affordable than fresh fruit. Morning Edition reached out to Barry Popkin of the University of North Carolina Chapel Hill, a nutritionist and economist, to explain why that would be true." />
                      <outline text="Copyright (C) 2013 NPR. For personal, noncommercial use only. See Terms of Use. For other uses, prior permission required." />
                      <outline text="STEVE INSKEEP, HOST:" />
                      <outline text="Now let&apos;s return to something we&apos;ve been chewing on from an earlier, story in our On the Run series. In Monday&apos;s report, Araceli Flores made this observation." />
                      <outline text="ARACELI FLORES: I can buy a box of macaroni and cheese for a dollar. A bunch of bananas will cost me over a dollar. Strawberries are four dollars. A bag of apples is going to cost me five dollars. I mean, way more pricier to buy vegetables and fruits than it is to buy boxed food." />
                      <outline text="BARRY POPKIN: Yes, it&apos;s true." />
                      <outline text="RENEE MONTAGNE, HOST:" />
                      <outline text="The guy that you heard at the end there is Barry Popkin. He&apos;s a nutritionist and economist at of the University of North Carolina, Chapel Hill. We asked him to explain why that&apos;s true." />
                      <outline text="POPKIN: We have a processed package food industry which is enormously efficient. It takes a little bit of wheat. It takes a little bit of artificial cheese. It uses lots of chemical flavors and it makes these magical tasty foods that are very inexpensive." />
                      <outline text="INSKEEP: Popkin says mac n&apos; cheese also beats out fresh food when you factor in other costs to the consumer, like labor and time." />
                      <outline text="POPKIN: The time it takes to cook a mac n&apos; cheese is very short and it fills you up. The time it takes to cut up the strawberries, to cut up the fruit, to make it, it adds time. The other side is getting it from the farmer, all the way through to the store, keeping it looking good and not having it spoiled, takes a lot of refrigeration takes a lot of complex steps that are very expensive." />
                      <outline text="MONTAGNE: He says another factor is a long history of government subsidies for food production, but not so much for fruits and veggies." />
                      <outline text="POPKIN: We didn&apos;t really create the same infrastructure for fruits and vegetables that we created for animal foods, for oils, sugars and other things. The difference is such a huge magnitude of long-term investment that it would take an awful lot to make fruits and vegetables cheap like they should be." />
                      <outline text="INSKEEP: That&apos;s nutritionist and economist Barry Popkin at UNC, Chapel Hill." />
                      <outline text="(SOUNDBITE OF MUSIC)" />
                      <outline text="INSKEEP: It&apos;s MORNING EDITION, from NPR News." />
                      <outline text="Copyright (C) 2013 NPR. All rights reserved. No quotes from the materials contained herein may be used in any media without attribution to NPR. This transcript is provided for personal, noncommercial use only, pursuant to our Terms of Use. Any other use requires NPR&apos;s prior permission. Visit our permissions page for further information." />
                      <outline text="NPR transcripts are created on a rush deadline by a contractor for NPR, and accuracy and availability may vary. This text may not be in its final form and may be updated or revised in the future. Please be aware that the authoritative record of NPR&apos;s programming is the audio." />
              </outline>

              <outline text="Weekly Address: Congress Must Compromise to Stop the Impact of the Sequester">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/03/02/weekly-address-congress-must-compromise-stop-impact-sequester" />        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Sat, 02 Mar 2013 16:10" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="March 02, 2013" />
                      <outline text="Hi, everybody. On Friday, I met with leaders of both parties in Congress to try and find a way forward in light of the severe budget cuts &apos;&apos; known in Washington as &apos;&apos;the sequester&apos;&apos; &apos;&apos; that have already started to inflict pain on communities across the country." />
                      <outline text="These cuts are not smart. They will hurt our economy and cost us jobs. And Congress can turn them off at any time &apos;&apos; as soon as both sides are willing to compromise." />
                      <outline text="As a nation, we&apos;ve already fought back from the worst economic crisis of our lifetimes, and we&apos;ll get through this, too. But at a time when our businesses are finally gaining some traction, hiring new workers, bringing jobs back to America &apos;&apos; the last thing Washington should do is to get in their way. That&apos;s what these cuts to education, research, and defense will do. It&apos;s unnecessary. And at a time when too many of our friends and neighbors are still looking for work, it&apos;s inexcusable." />
                      <outline text="Now, it&apos;s important to understand that, while not everyone will feel the pain of these cuts right away, the pain will be real. Many middle-class families will have their lives disrupted in a significant way." />
                      <outline text="Beginning this week, businesses that work with the military will have to lay folks off. Communities near military bases will take a serious blow. Hundreds of thousands of Americans who serve their country &apos;&apos; Border Patrol agents, FBI agents, civilians who work for the Defense Department &apos;&apos; will see their wages cut and their hours reduced." />
                      <outline text="This will cause a ripple effect across the economy. Businesses will suffer because customers will have less money to spend. The longer these cuts remain in place, the greater the damage. Economists estimate they could eventually cost us more than 750,000 jobs and slow our economy by over one-half of one percent." />
                      <outline text="Here&apos;s the thing: none of this is necessary. It&apos;s happening because Republicans in Congress chose this outcome over closing a single wasteful tax loophole that helps reduce the deficit. Just this week, they decided that protecting special interest tax breaks for the well-off and well-connected is more important than protecting our military and middle-class families from these cuts." />
                      <outline text="I still believe we can and must replace these cuts with a balanced approach &apos;&apos; one that combines smart spending cuts with entitlement reform and changes to our tax code that make it more fair for families and businesses without raising anyone&apos;s tax rates. That&apos;s how we can reduce our deficit without laying off workers, or forcing parents and students to pay the price. I don&apos;t think that&apos;s too much to ask. It&apos;s the kind of approach I&apos;ve proposed for two years now. A majority of the American people agree with me on this approach &apos;&apos; including a majority of Republicans. We just need Republicans in Congress to catch up with their own party and the rest of the country." />
                      <outline text="Now, I know there are Republicans in Congress who would actually rather see tax loopholes closed than let these cuts go through. And I know there are Democrats who&apos;d rather do smart entitlement reform than let these cuts go through. There&apos;s a caucus of common sense. And I&apos;m going to keep reaching out to them to fix this for good." />
                      <outline text="Because the American people are weary of perpetual partisanship and brinksmanship. This is America, and in America, we don&apos;t careen from one manufactured crisis to another. We make smart choices. We plan. We prioritize. So I&apos;m going to push through this paralysis and keep fighting for the real challenges facing middle-class families. I&apos;m going to keep pushing for high-quality preschool for every family that wants it, and make sure the minimum wage becomes a wage you can live on. I&apos;m going to keep pushing to fix our immigration system, repair our transportation system, and keep our children safe from gun violence." />
                      <outline text="That&apos;s the work you elected me to do. That&apos;s what I&apos;m focused on every single day. Thanks." />
                      <outline text=" ###" />
              </outline>

              <outline text="Exclusive Talk With Economist Richard Wolff: Sequester Cuts Inch Us Closer to &quot;An Explosion That Will Take People By Surprise&quot;">
                      <outline text="Link to Article" type="link" url="http://crooksandliars.com/julianna-forlano/outspoken-economist-sequester" />        <outline text="Source: Crooks and Liars" type="link" url="http://feeds.feedburner.com/crooksandliars/YaCP" />
      <outline text="Sat, 02 Mar 2013 16:08" />
                      <outline text="" />
                      <outline text="Economist Dr. Richard Wolff warns of the encroaching economic tipping point, past which Americans will not be pushed and answers questions on the potential results of civil unrest. He also breaks down the latest in economic propaganda, details the immense power of the 1% to control the debate, and offers potential solutions to increase economic stability and personal freedom at the same time. Strap in!" />
                      <outline text="Where Are We? The Effects of Civil Unrest:" />
                      <outline text="The &quot;Freedom&quot; Myth:" />
                      <outline text="The Enormous Power of the 1%:" />
                      <outline text="These videos are a continuation of the interview in which Dr. Wolff explained the sequester posted earlier this week." />
              </outline>

              <outline text="Presidential Order -- Sequestration">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/03/01/presidential-order-sequestration" />        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Sat, 02 Mar 2013 16:07" />
                      <outline text="" />
                      <outline text="March 01, 2013 1:49 PM EST" />
                      <outline text="In Press Conference, President Obama Talks About Moving Forward Despite SequesterSpeaking in the James S. Brady Press Briefing Room, President Obama vowed that he would continue working with Congress in the coming weeks to find compromise on a balanced approach to replacing these harmful budget cuts." />
                      <outline text="March 02, 2013 10:18 AM EST" />
                      <outline text="Looking Back at the White House HackathonOn February 22nd, we held a hackathon where participants built tools based on the new API for We the People, the White House petitions system." />
                      <outline text="March 02, 2013 5:39 AM EST" />
                      <outline text="Weekly Address: Congress Must Compromise to Stop the Impact of the SequesterBecause Republicans in Congress refused to compromise to close tax loopholes for the wealthiest Americans, hundreds of thousands of Americans will lose their jobs or see their paycheck reduced, and middle class families will be hurt." />
                      <outline text="view all related blog posts" />
              </outline>

              <outline text="PET FOOD STAMPS">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=zc7Hq8h1Feg&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Sat, 02 Mar 2013 08:22" />
                      <outline text="" />
              </outline>

              <outline text="Seattle Police Now Using Crime Forecasting Software (I Wonder How Much That Cost? Cui Bono?)">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=b_WBFd0ckBA&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Sat, 02 Mar 2013 08:22" />
                      <outline text="" />
              </outline>

              <outline text="Demagogue Beppe Grillo Betrays Italian Voters, Demands Brutal Energy Austerity; Five Million New Productive Jobs Would Shut Him Down">
                      <outline text="Link to Article" type="link" url="http://tarpley.net/2013/02/28/demagogue-beppe-grillo-betrays-italian-voters-demands-brutal-energy-austerity/?" />        <outline text="Source: TARPLEY.net" type="link" url="http://tarpley.net/feed/" />
      <outline text="Sat, 02 Mar 2013 08:21" />
                      <outline text="" />
                      <outline text="Archives" />
                      <outline text="Publications" />
                      <outline text="Select a book to review and purchase on Amazon.com Most are also available at:" />
              </outline>

              <outline text="Federal Register | Defense Federal Acquisition Regulation Supplement: Alleged Crimes By or Against Contractor Personnel">
                      <outline text="Link to Article" type="link" url="https://www.federalregister.gov/articles/2013/02/28/2013-04363/defense-federal-acquisition-regulation-supplement-alleged-crimes-by-or-against-contractor-personnel" />      <outline text="Thu, 28 Feb 2013 16:35" />
                      <outline text="" />
                      <outline text="DoD is issuing a final rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to implement a section of the National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2009 and expand coverage on contractor requirements and responsibilities relating to alleged crimes by or against contractor personnel." />
                      <outline text=" " />
                      <outline text="Effective February 28, 2013." />
                      <outline text="Ms. Meredith Murphy, telephone 571-372-6098." />
                      <outline text="DoD published a proposed rule in the Federal Register at 77 FR 14490 on March 12, 2012, to revise paragraph (d) of the clause at DFARS 252.225-7040, Contractor Personnel Authorized to Accompany U.S. Armed Forces Deployed Outside the United States, to require contractors to provide information to their employees on how and where to report alleged crimes and where to seek assistance or whistleblower protection. These requirements apply to all DoD contracts that authorize contractor personnel to accompany U.S. Armed Forces deployed outside the United States in contingency operations, humanitarian or peacekeeping operations, or other military operations when the latter are designated by the combatant commander. Section 854 of the NDAA for FY 2009 (Pub. L. 110-417) applied this requirement just to contracts performed in Iraq and Afghanistan. Four respondents submitted public comments in response to the proposed rule." />
                      <outline text="II. Discussion and Analysis of the Public Comments Back to TopDoD reviewed the public comments in the development of the final rule. A discussion of the comments and the changes made to the rule as a result of those comments is provided, as follows:" />
                      <outline text="A. Summary of Changes From the Proposed RuleThe Defense Criminal Investigative Service was added to the list at paragraph (d)(6) of the clause, and the title for the U.S. Army Criminal Investigation Command was corrected. In addition, the explanation of the impact of the changes was clarified in Section I, Background, of this notice." />
                      <outline text="B. Analysis of Public Comments1. Add the Defense Criminal Investigative Service to the List of Appropriate Investigative AgenciesComment: One respondent requested the addition of the Defense Criminal Investigative Service (DCIS) to the list of appropriate criminal investigative agencies to which suspected crimes should be reported. DCIS is the criminal investigative arm of the DoD Office of the Inspector General, and it also investigates alleged crimes involving contractor personnel." />
                      <outline text="Response: The requested change has been made." />
                      <outline text="2. Update the Information on the U.S. Army Criminal Investigation CommandComment: One respondent stated that the U.S. Army&apos;s criminal investigative unit was established as a major command on September 17, 1971, and renamed the &apos;&apos;U.S. Army Criminal Investigation Command.&apos;&apos;" />
                      <outline text="Response: The requested change has been made." />
                      <outline text="3. Clarify the Impact of the Change on Applicability of These RequirementsComment: A respondent stated that the explanation of the proposed change and its impact in the proposed rule (77 FR 14490) were not clear and implied that the applicability of the clause at DFARS 252.225-7040 was proposed for revision, without, however, actually amending the clause prescription." />
                      <outline text="Response: The &apos;&apos;Background&apos;&apos; section of the proposed rule could have been interpreted more than one way. However, the preamble to this final rule makes clear that there is no change to the applicability of DFARS clause 252.225-7040." />
                      <outline text="4. Consider Imposing a Range of Penalties in the Event of NoncomplianceComment: A respondent expressed support for &apos;&apos;these relatively modest requirements on contractors.&apos;&apos; In addition, the respondent suggested that, to strengthen accountability, DoD should consider imposing a range of penalties in the event of noncompliance, &apos;&apos;much like non-compliance with the trafficking in persons provision in the Federal Acquisition Regulation (FAR) subjects contractors to the following remedies:" />
                      <outline text="(1) Requiring the contractor to remove a contractor employee or employees from the performance of the contract;" />
                      <outline text="(2) Requiring the contractor to terminate a subcontract;" />
                      <outline text="(3) Suspension of contract payments;" />
                      <outline text="(4) Loss of award fee, consistent with the award fee plan, for the performance period in which the government determined contractor non-compliance;" />
                      <outline text="(5) Termination of the contract for default or cause, in accordance with the termination clause of this contract; or" />
                      <outline text="(6) Suspension or debarment.&apos;&apos;" />
                      <outline text="The respondent cited FAR 52.222-50(e) as the source for the above list." />
                      <outline text="Response: Most or all of the remedies that are cited by the respondent are already available to the Government in the event of noncompliance by a contractor with the requirements of a clause that is included in its contract. It is not necessary to cite them in each individual contract clause to which they may be applied." />
                      <outline text="Executive Orders (E.O.s) 12866 and 13563 direct agencies to assess all costs and benefits of available regulatory alternatives and, if regulation is necessary, to select regulatory approaches that maximize net benefits (including potential economic, environmental, public health and safety effects, distributive impacts, and equity). E.O. 13563 emphasizes the importance of quantifying both costs and benefits, of reducing costs, of harmonizing rules, and of promoting flexibility. The Office of Information and Regulatory Affairs has determined that this is not a significant regulatory action and, therefore, was not subject to review under section 6(b) of E.O. 12866, Regulatory Planning and Review, dated September 30, 1993. This rule is not a major rule under 5 U.S.C. 804." />
                      <outline text="A final regulatory flexibility analysis has been prepared consistent with the Regulatory Flexibility Act, 5 U.S.C. 601, et seq., and is summarized as follows:" />
                      <outline text="DoD is expanding coverage on contractor requirements and responsibilities relating to alleged crimes by or against contractor personnel. These requirements will be included in any contract that authorizes contractor personnel to accompany U.S. Armed Forces deployed outside the United States in (1) Contingency operations; (2) humanitarian or peacekeeping operations; or (3) other military operations or military exercises, when designated by the combatant commander. DoD is accomplishing this change by modifying the clause at DFARS 252.225-7040, Contractor Personnel Authorized to Accompany U.S. Armed Forces Deployed Outside the United States." />
                      <outline text="The two key requirements are for the contractor to (a) report any alleged offenses against the Uniform Code of Military Justice and the Military Extraterritorial Jurisdiction Act to appropriate investigative authorities and (b) give contractor personnel who work in covered areas information on how and where to report an alleged Uniform Code of Military Justice or Military Extraterritorial Jurisdiction Act offense. The clause also provides contact information for the four criminal investigative agencies in the DoD." />
                      <outline text="No significant issues were raised in the public comments received in response to the proposed rule. No comments were filed by the Chief Counsel for Advocacy of the Small Business Administration." />
                      <outline text="The rule will apply equally to all contractors, large and small, performing in deployed areas. Approximately 184 small businesses may be impacted by these changes annually. However, there are no projected reporting, recordkeeping, or other compliance requirements associated with the proposed rule. The points of contact for reporting alleged crimes and/or seeking whistleblower protection are listed in the clause. Contractor compliance requirements have been limited to passing this clear, available information to their personnel. Because the burdens associated with these requirements have already been minimized, there are no significant alternatives that could further minimize the already minimal impact on businesses, small or large." />
                      <outline text="The rule does not contain any information collection requirements that require the approval of the Office of Management and Budget under the Paperwork Reduction Act (44 U.S.C. chapter 35)." />
                      <outline text="Manuel Quinones," />
                      <outline text="Editor, Defense Acquisition Regulations System." />
                      <outline text="begin regulatory text" />
                      <outline text="Therefore, DoD amends 48 CFR part 252 as follows:" />
                      <outline text="1.The authority citation for part 252 continues to read as follows:" />
                      <outline text="Authority:41 U.S.C. 1303 and 48 CFR chapter 1." />
                      <outline text="2.Section 252.225-7040 is amended by&apos;--" />
                      <outline text="a. Removing the clause date &apos;&apos;(JUN 2011)&apos;&apos; and adding &apos;&apos;(FEB 2013) in its place;" />
                      <outline text="b. Revising paragraph (d)(3)(ii); and" />
                      <outline text="c. Adding paragraphs (d)(4) through (7)." />
                      <outline text="The revision and addition read as follows:" />
                      <outline text="252.225-7040 Contractor Personnel Authorized to Accompany U.S. Armed Forces Deployed Outside the United States.* * * * *" />
                      <outline text="(d) * * *" />
                      <outline text="(3) * * *" />
                      <outline text="(ii) That many of the offenses addressed by the definition are covered under the Uniform Code of Military Justice (see paragraph (e)(2)(iv) of this clause). Other sexual misconduct may constitute offenses under the Uniform Code of Military Justice, Federal law, such as the Military Extraterritorial Jurisdiction Act, or host nation laws;" />
                      <outline text="(4) The Contractor shall report to the appropriate investigative authorities, identified in paragraph (d)(6) of this clause, any alleged offenses under&apos;--" />
                      <outline text="(i) The Uniform Code of Military Justice (chapter 47 of title 10, United States Code) (applicable to contractors serving with or accompanying an armed force in the field during a declared war or contingency operations); or" />
                      <outline text="(ii) The Military Extraterritorial Jurisdiction Act (chapter 212 of title 18, United States Code)." />
                      <outline text="(5) The Contractor shall provide to all contractor personnel who will perform work on a contract in the deployed area, before beginning such work, information on the following:" />
                      <outline text="(i) How and where to report an alleged crime described in paragraph (d)(4) of this clause." />
                      <outline text="(ii) Where to seek victim and witness protection and assistance available to contractor personnel in connection with an alleged offense described in paragraph (d)(4) of this clause." />
                      <outline text="(6) The appropriate investigative authorities to which suspected crimes shall be reported include the following&apos;--" />
                      <outline text="(i) US Army Criminal Investigation Command at http://www.cid.army.mil/reportacrime.html;" />
                      <outline text="(ii) Air Force Office of Special Investigations at http://www.osi.andrews.af.mil/library/factsheets/factsheet.asp?id=14522;" />
                      <outline text="(iii) Navy Criminal Investigative Service at http://www.ncis.navy.mil/Pages/publicdefault.aspx;" />
                      <outline text="(iv) Defense Criminal Investigative Service at http://www.dodig.mil/HOTLINE/index.html;" />
                      <outline text="(v) To any command of any supported military element or the command of any base." />
                      <outline text="(7) Personnel seeking whistleblower protection from reprisals for reporting criminal acts shall seek guidance through the DoD Inspector General hotline at 800-424-9098 or www.dodig.mil/HOTLINE/index.html. Personnel seeking other forms of victim or witness protections should contact the nearest military law enforcement office." />
                      <outline text="* * * * *" />
                      <outline text="end regulatory text" />
                      <outline text="[FR Doc. 2013-04363 Filed 2-27-13; 8:45 am]" />
                      <outline text="BILLING CODE 5001-06-P" />
              </outline>

              <outline text="Notice  -- Continuation of the National Emergency with Respect to the Situation in Zimbabwe">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/03/01/notice-continuation-national-emergency-respect-situation-zimbabwe" />        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Sat, 02 Mar 2013 08:16" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="March 01, 2013" />
                      <outline text="NOTICE" />
                      <outline text="- - - - - - -" />
                      <outline text="CONTINUATION OF THE NATIONAL EMERGENCY WITH RESPECT TO" />
                      <outline text="THE SITUATION IN ZIMBABWE" />
                      <outline text="On March 6, 2003, by Executive Order 13288, the President declared a national emergency and blocked the property of persons undermining democratic processes or institutions in Zimbabwe, pursuant to the International Emergency Economic Powers Act (50 U.S.C. 1701-1706). He took this action to deal with the unusual and extraordinary threat to the foreign policy of the United States constituted by the actions and policies of certain members of the Government of Zimbabwe and other persons to undermine Zimbabwe&apos;s democratic processes or institutions. These actions and policies had contributed to the deliberate breakdown in the rule of law in Zimbabwe, to politically motivated violence and intimidation in that country, and to political and economic instability in the southern African region." />
                      <outline text="On November 22, 2005, the President issued Executive Order 13391 to take additional steps with respect to the national emergency declared in Executive Order 13288 by ordering the blocking of the property of additional persons undermining democratic processes or institutions in Zimbabwe." />
                      <outline text="On July 25, 2008, the President issued Executive Order 13469, which expanded the scope of the national emergency declared in Executive Order 13288 and ordered the blocking of the property of additional persons undermining democratic processes or institutions in Zimbabwe." />
                      <outline text="The actions and policies of these persons continue to pose an unusual and extraordinary threat to the foreign policy of the United States. For this reason, the national emergency declared on March 6, 2003, and the measures adopted on that date, on November 22, 2005, and on July 25, 2008, to deal with that emergency, must continue in effect beyond March 6, 2013. Therefore, in accordance with section 202(d) of the National Emergencies Act (50 U.S.C. 1622(d)), I am continuing for 1 year the national emergency declared in Executive Order 13288." />
                      <outline text="This notice shall be published in the Federal Register and transmitted to the Congress." />
                      <outline text="BARACK OBAMA" />
              </outline>

              <outline text="Message -- Continuation of the National Emergency with Respect to the Situation in Zimbabwe">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/03/01/message-continuation-national-emergency-respect-situation-zimbabwe" />        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Sat, 02 Mar 2013 08:15" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="March 01, 2013" />
                      <outline text="TO THE CONGRESS OF THE UNITED STATES:" />
                      <outline text="Section 202(d) of the National Emergencies Act (50 U.S.C. 1622(d)) provides for the automatic termination of a national emergency unless, within 90 days prior to the anniversary date of its declaration, the President publishes in the Federal Register and transmits to the Congress a notice stating that the emergency is to continue in effect beyond the anniversary date. In accordance with this provision, I have sent to the Federal Register for publication the enclosed notice stating that the national emergency declared in Executive Order 13288 of March 6, 2003, with respect to the actions and policies of certain members of the Government of Zimbabwe and other persons to undermine Zimbabwe&apos;s democratic processes or institutions is to continue in effect beyond March 6, 2013." />
                      <outline text="The crisis constituted by the actions and policies of certain members of the Government of Zimbabwe and other persons to undermine Zimbabwe&apos;s democratic processes or institutions has not been resolved. These actions and policies continue to pose an unusual and extraordinary threat to the foreign policy of the United States. For these reasons, I have determined that it is necessary to continue this national emergency and to maintain in force the sanctions to respond to this threat." />
                      <outline text="BARACK OBAMA" />
              </outline>

              <outline text="Presidential Proclamation -- 10th Anniversary of the United States Department of Homeland Security">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/03/01/presidential-proclamation-10th-anniversary-united-states-department-home" />        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Sat, 02 Mar 2013 08:14" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="March 01, 2013" />
                      <outline text="10TH ANNIVERSARY OF THE UNITED STATESDEPARTMENT OF HOMELAND SECURITY" />
                      <outline text="- - - - - - -" />
                      <outline text="BY THE PRESIDENT OF THE UNITED STATES OF AMERICA" />
                      <outline text="A PROCLAMATION" />
                      <outline text="Ten years ago, when the tragic events of September 11 were fresh in our hearts and our Nation found itself in a more uncertain world, the United States Department of Homeland Security (DHS) opened its doors with a single task: keeping the American people safe. Day by day, hour by hour, the Department has advanced that critical mission through a decade of shifting threats and new challenges. We take this opportunity to recognize its accomplishments and pay tribute to the people who have made them possible." />
                      <outline text="Alongside its partners in government and the private sector, DHS has taken action to make our borders and ports more secure, our critical infrastructure and cyber networks more resilient, and our people more engaged in addressing the dangers we face. While threats persist, America is better prepared to meet them, and we stand ready to overcome whatever challenges the future holds." />
                      <outline text="Homeland security cannot begin and end with the Federal Government; it takes commitment from every part of society. By forging lasting partnerships with stakeholders at home and abroad, DHS has worked to streamline our legal immigration system, stem the tide of illegal immigration, and chart a course toward sensible reform. And in a decade marked by national emergencies and natural disasters, the Department has invested in communities nationwide, improving our preparedness for times of crisis." />
                      <outline text="As we commemorate a decade of service, our Nation recognizes the men and women who have carried out the Department of Homeland Security&apos;s vision for a safer, stronger America." />
                      <outline text="NOW, THEREFORE, I, BARACK OBAMA, President of the United States of America, by virtue of the authority vested in me by the Constitution and the laws of the United States, do hereby proclaim March 1, 2013, as the 10th Anniversary of the United States Department of Homeland Security. I call upon all Americans to recognize the United States Department of Homeland Security for improving America&apos;s readiness and resilience." />
                      <outline text="IN WITNESS WHEREOF, I have hereunto set my hand this first day of March, in the year of our Lord two thousand thirteen, and of the Independence of the United States of America the two hundred and thirty-seventh." />
                      <outline text="BARACK OBAMA" />
              </outline>

              <outline text="Fan Girl Journalist Tosses Obama Softballs on Gay Marriage">
                      <outline text="Link to Article" type="link" url="http://www.mrctv.org/videos/fan-girl-journalist-tosses-obama-softballs-gay-marriage" />        <outline text="Source: MRCTV - News &amp;amp; Politics" type="link" url="http://www.mrctv.org/taxonomy/term/1/0/feed" />
      <outline text="Sat, 02 Mar 2013 08:14" />
                      <outline text="" />
                      <outline text="MRC TV is an online platform for people to share and view videos, articles and opinions on topics that are important to them -- from news to political issues and rip-roaring humor." />
                      <outline text="MRC TV is brought to you by the Media Research Center, a 501(c) 3 nonprofit research and education organization. The MRC is located at: 325 South Patrick Street, Alexandria, VA  22314. For information about the MRC, please visit www.MRC.org." />
                      <outline text="Copyright (C) 2013, Media Research Center. All Rights Reserved." />
              </outline>

              <outline text="CNN&apos;s Yellin Asks Obama If He Could Force Congress to Stay Until a Sequester Deal Is Struck">
                      <outline text="Link to Article" type="link" url="http://www.mrctv.org/videos/cnns-yellin-asks-obama-if-he-could-force-congress-stay-until-sequester-deal-struck" />        <outline text="Source: MRCTV - News &amp;amp; Politics" type="link" url="http://www.mrctv.org/taxonomy/term/1/0/feed" />
      <outline text="Sat, 02 Mar 2013 08:14" />
                      <outline text="" />
                      <outline text="MRC TV is an online platform for people to share and view videos, articles and opinions on topics that are important to them -- from news to political issues and rip-roaring humor." />
                      <outline text="MRC TV is brought to you by the Media Research Center, a 501(c) 3 nonprofit research and education organization. The MRC is located at: 325 South Patrick Street, Alexandria, VA  22314. For information about the MRC, please visit www.MRC.org." />
                      <outline text="Copyright (C) 2013, Media Research Center. All Rights Reserved." />
              </outline>

              <outline text="Karzai Demands Control of NATO&apos;s Afghan Militias">
                      <outline text="Link to Article" type="link" url="http://www.military.com/daily-news/2013/03/01/karzai-demands-control-of-natos-afghan-militias.html?ESRC=topstories.RSS" />      <outline text="Fri, 01 Mar 2013 22:53" />
                      <outline text="" />
                      <outline text="KABUL - Afghan President Hamid Karzai has demanded the NATO-led international coalition troops hand over the control of Afghan militia groups to his government, his office said." />
                      <outline text="&quot;A delegation led by the head of the National Security Council, Rangin Dadfar Spanta was assigned to ask the coalition troops to hand over the mentioned armed groups to Afghan security institutions within three months,&quot; the office said late Thursday." />
                      <outline text="International forces had created &quot;parallel armed groups&quot; in the past years - using them for such tasks as searching houses - of which the government had been unaware, said Karzai&apos;s spokesman, Aimal Faizi." />
                      <outline text="Karzai had ordered all US special forces on Sunday to pull out of Wardak province within two weeks, accusing them of conducting operations that had led &quot;to the death and disappearances of Afghan civilians.&quot;" />
                      <outline text="&quot;The decision was made after the government received several complaints regarding abuses and misconduct by the US soldiers,&quot; Faizi said on Sunday." />
                      <outline text="The central province of Wardak, neighbouring Kabul, is one of the most strategically important areas in the country due to a highway linking the national capital with southern Afghanistan." />
                      <outline text="(C) Copyright 2013 Deutsche Presse-Agentur. All rights reserved. This material may not be published, broadcast, rewritten or redistributed." />
              </outline>

              <outline text="Chris Matthews: Support Gun Control or an American President Could Be Murdered">
                      <outline text="Link to Article" type="link" url="http://www.mrctv.org/videos/chris-matthews-support-gun-control-or-american-president-could-be-murdered" />        <outline text="Source: MRCTV - News &amp;amp; Politics" type="link" url="http://www.mrctv.org/taxonomy/term/1/0/feed" />
      <outline text="Sat, 02 Mar 2013 08:10" />
                      <outline text="" />
                      <outline text="On the February 27 Hardball, Chris Matthews insisted that if you aren&apos;t with the pro-gun control crowd, you&apos;re with the killers. " />
                      <outline text="In a closing commentary on Wednesday, Hardball&apos;s Chris Matthews ranted that opposing gun control could lead to the assassination of a future American president or politician. Matthews fumed that he supports new restrictions because &quot;the next mass shooter could well emerge out of this pack&quot; of the &quot;politically nutty.&quot;   - See more at: http://newsbusters.org/blogs/scott-whitlock/2013/02/27/chris-matthews-support-gun-control-or-american-president-could-be-mu#sthash.AqsS9ogU.dpuf" />
                      <outline text="Cross posted at NewsBusters " />
              </outline>

              <outline text="Kim Jong Un Gets Dennis Rodman&apos;s Crew &quot;Wasted&quot;!">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=_JI0WWM1jGc&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Sat, 02 Mar 2013 08:08" />
                      <outline text="" />
              </outline>

              <outline text="THE OBAMA TAR SANDS PIPELINE! Now Only Days Away Approval!">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=hRomDZX557I&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Sat, 02 Mar 2013 08:07" />
                      <outline text="" />
              </outline>

              <outline text="Next Big Future: General Atomics Calls for game-changing nuclear technology">
                      <outline text="Link to Article" type="link" url="http://nextbigfuture.com/2013/02/general-atomics-calls-for-game-changing.html?&amp;m=1" />      <outline text="Sat, 02 Mar 2013 03:22" />
                      <outline text="" />
                      <outline text="The principal barriers preventing nuclear power from competing in today&apos;s mix of energy technologies are relatively low efficiency and large scale. Current light water reactor technology tops out at about 34% efficiency, and typical advanced LWR plants cost on the order of $10 billion, which means that few utility companies in the US can afford them. And even small modular LWRs (SMLWRs) are not that small. For one such design, the reactor with its steam generator is more than 25 meters tall, not including the relatively large building for the turbine required to turn steam into electric power. The complexity of such a large structure makes its build time relatively long and its cost potentially high.Reducing reactor size while maintaining high thermal output is the key to better economics.The Energy Multiplier Module, is being developed by General Atomics. The EM2 is a compact fast reactor about 12 meters high, with 265 megawatts electric (MWe) output. The immediate challenge for the reactor is proving out the fuel element, which consists of novel ceramic cladding and fuel that enable the reactor to operate at high temperatures and high power densities. The company is also developing and testing a compact high-speed turbine generator that can achieve efficiencies of more than 50%." />
                      <outline text="The typical arguments against more advanced designs are that they will take too long and that the technical risks of fuel and power conversion are high. But what does &apos;&apos;too long&apos;&apos; mean? Photoelectric materials were discovered in the 1800s, yet we are still working on them. Windmills go back much further in history. Yet neither of those technologies is currently game changing. There are countless other examples. Moreover, due to market conditions, it is unlikely that many LWRs or SMLWRs will be built in the next 10&apos;&apos;20 years. So this would be a great time to come up with truly game-changing approaches." />
                      <outline text="If the energy content from known uranium reserves could be efficiently extracted, it would be 60 times that of known world oil reserves, 50 times the known gas reserves, 20 times the known coal reserves, 260 times the energy from using only LWR technology, or the equivalent of about 90 trillion barrels of oil&apos;--400 times the oil reserves of Saudi Arabia. Assuming an oil equivalent of $80 per barrel, the value of known uranium reserves would be $7.3 quadrillion." />
                      <outline text="It may be time for physicists, the professionals who led the creation of nuclear reactors, to take a hard look at the science of new materials and research on new processes to help continue the development of radically new technologies like those indicated above to provide energy for many centuries." />
                      <outline text="SOURCE - Physics Today" />
                      <outline text="If you liked this article, please give it a quick review on ycombinator or StumbleUpon. Thanks" />
              </outline>

              <outline text="&quot;I Am Not A Dictator! I&apos;m The President&quot; Obama Holds Press Conference On The Sequester">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=OfS3lYTanek&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Sat, 02 Mar 2013 08:05" />
                      <outline text="" />
              </outline>

              <outline text="RPi Easy SD Card Setup - OSX ODROID">
                      <outline text="Link to Article" type="link" url="http://elinux.org/RPi_Easy_SD_Card_Setup#Copying_an_image_to_the_SD_card_in_Mac.C2.A0OS.C2.A0X_.28command_line.29" />      <outline text="Sat, 02 Mar 2013 05:30" />
                      <outline text="" />
                      <outline text="Back to the Hub." />
                      <outline text="Getting Started:" />
                      <outline text="Buying Guide - for advice on buying the Raspberry Pi." />
                      <outline text="Preload your Card - for information on how to make the SD card used to boot your Raspberry Pi." />
                      <outline text="Basic Setup - for help with buying other hardware and setting it up." />
                      <outline text="Advanced Setup - for more extensive information on setting up." />
                      <outline text="Beginners Guide - you are up and running, now what can you do?" />
                      <outline text="To boot the Raspberry Pi, you need an SD card installed with a bootloader and a suitable operating system. Some Raspberry Pi kits will come with a ready-to-go card, but if you didn&apos;t receive one you will need to prepare your own:" />
                      <outline text="Official images are available from http://www.raspberrypi.org/downloads and there is an overview of available distributions here." />
                      <outline text="Warning! When you write the Raspberry Pi image to your SD card you will lose all data that was on the card." />
                      <outline text="Note: It is highly recommended that you start with the latest official Raspbian install image from the Raspberry Pi website. This includes the latest bug fixes and ensures you will not spend time dealing with problems that have already been fixed. The download page on the Raspberry Pi website is located at http://www.raspberrypi.org/downloads/. Once you have tried the latest Raspian build you can then move on to trying other operating systems if you so wish." />
                      <outline text="Buy a preloaded card from RS Components, Element14 or The Pi Hut&apos;s Raspberry Pi Store, who offer SD cards preloaded with either:" />
                      <outline text="Use an installer program. The Fedora ARM Installer will download and install Raspberry Pi Fedora Remix images, but it will also install other images if they are already downloaded and in uncompressed or .gz format.(Mac) The RPi-sd card builder utility is a app which will walk you through the process of installing to SD card. With graphical interface. Don&apos;t need to use commands in terminal.(Mac) The RasPiWrite utility is a python script which will walk you through the process of installing to SD card, it works with any Raspberry Pi compatible disk image, and can download one of the currently available distros if you don&apos;t have one.If your Pi is connected to the Internet, you can use the BerryBoot installer to let it download and install the operating system. This requires that you first use a normal Windows/Mac/Linux computer to download a small .zip file with the Berryboot system files and extract it to an empty SD card. Then you put the SD card in your Pi, and follow the on-screen prompts to complete the installation. An additional advantage is that Berryboot allows you to install more than one operating system on a single SD card. Also, it is not necessary to install any additional software on your normal Windows/Mac/Linux computer.To write your SD card you start by downloading the SD image (the data you will write to the card). The best way to do this is using BitTorrent. This generally results in a faster download as it is a highly distributed system (you will be downloading the data from users who have previously downloaded it)." />
                      <outline text="This guide assumes you have downloaded the Debian &quot;wheezy&quot; image, with name 2012-10-28-wheezy-raspbian. Obviously, if you are downloading a different or newer version, use the name of the version you have downloaded." />
                      <outline text="Copying the image to an SD card on WindowsDownload the image from a mirror or torrent. The remainder of this assumes you are using the Raspbian &apos;&apos;wheezy&apos;&apos; download 2012-12-16-wheezy-raspbian.zipExtract the image file 2012-12-16-wheezy-raspbian.img from the downloaded .zip file.Insert the SD card into your SD card reader and check what drive letter it was assigned. You can easily see the drive letter (for example G:) by looking in the left column of Windows Explorer. If the card is not new, you should format it and make sure there is only one partition (FAT32 is a good choice); otherwise Win32DiskImager can make corrupt your SD card!Download the Win32DiskImager utility. The download links are on the right hand side of the page, you want the binary zip.Extract the executable from the zip file and run the Win32DiskImager utility. You should run the utility as Administrator!Select the 2012-12-16-wheezy-raspbian.img image file you extracted earlierSelect the drive letter of the SD card in the device box. Be careful to select the correct drive; if you get the wrong one you can destroy your data on the computer&apos;s hard disk!Click Write and wait for the write to complete.Exit the imager and eject the SD card.Insert the card in the Raspberry Pi, power it on, and it should boot up. There is an option in the raspi-config script that comes up to automatically expand the partitions to use all of the SD card if you have used one larger than 4 GBIn Windows the SD card will appear only to have a fairly small size - about 75 Mbytes. This is because most of the card has a partition that is formatted for the Linux operating system that the Raspberry Pi uses and is not visible in Windows. If you are about to manually resize this Linux partition you should read this page as well." />
                      <outline text="Copying the image to an SD card on Windows if first option isn&apos;t successfulI wasn&apos;t able to choose device in Win32DiskImager on my notebook so I found a different way to achieve the same thing on a Windows machine.." />
                      <outline text="Download the image from a mirror or torrentExtract the image file 2012-10-28-wheezy-raspbian.img from 2012-10-28-wheezy-raspbian.zipInsert the SD card into your SD card reader and check what drive letter it was assigned. You can easily see the drive letter (for example H:) by looking in the left column of Windows Explorer.Download flashnul software from http://shounen.ru/soft/flashnul/ here is Translated versionDownload the latest version. At the time of writing it was flashnul-1rc1.Extract the application from the archive.Click Start button &gt; All Programs &gt; Accessories &gt; Command Prompt, right click on it and Run as Administrator.Run flashnul with argument &quot;-p&quot;:C:/flashnul/flashnul.exe -pFlashnul will tell you something like:Available physical drives:0 size = 250059350016 (232 Gb)1 size = 1990197248 (1898 Mb)Available logical disks:C:&#092;D:&#092;F:&#092;G:&#092;H:&#092;Press ENTER to exit.SDCARD number is on left! In my case it is number 1" />
                      <outline text="Now we will use the Load argument:C:/flashnul/flashnul.exe 1 -L C:/2012-10-28-wheezy-raspbian.imgwhere flashnul.exe -L" />
                      <outline text="Flashnul will give you a device summary and proceed caution, have a quick scan through the information to make sure you have selected the correct device, then type yes and press enter.If you get a access denied error, try re-plugging the SD card. Also make sure to close all explorer windows or folders open for the device.If you still get a access denied error, try substitute the device number with the drive letter followed by a colon. Eg:C:/flashnul/flashnul.exe H: -L C:/debian6/debian6-19-04-2012.imgIf the device summary does not match Your card (the size is smaller, for example, 75 MB), but you are sure, that the letter is correct - please continue and then try again with the device number.Copying an image to the SD card in Mac OS X (Only with graphical interface)The RPi-sd card builder utility is a app which will walk you through the process of installing to SD card. Note: This is a closed source app which requires your root password." />
                      <outline text="PiWriter" />
                      <outline text="PiWriter is a simple wizard made using shell scripts, PlatyPus and CocoaDialog. To prevent users from making mistakes the wizard auto-detect&apos;s the SD card you plan to use and prevents you from selecting your system disk. Also there is no need for a root password so even less damage can be done." />
                      <outline text="Note: This app is open source (BSD license) so use, copy, spread and fork as you please ;)" />
                      <outline text="Copying an image to the SD card in Mac OS X (mostly graphical interface)Download the image from a mirror or torrentExtract the image by double clicking on the download fileConnect the SD card reader with the SD card inside; note: must be formatted in FAT32!From the Apple (&#163;) menu, choose About This Mac, then click on More info...; if you are using Mac OS X 10.8.x Mountain Lion then click on System report.Click on USB (or Card Reader if using an in-built SD card reader) then search for your SD card in the upper right section of the window; click it, then search for BSD name in the lower right section: must be something like diskn where n is a number (for example, disk4). Note this numberUnmount the partition so that you will be allowed to overwrite the disk by opening Disk Utility and unmounting it (do not eject it, or you have to reconnect it). Note: On Mac OS X 10.8.x Mountain Lion, &quot;Verify Disk&quot; (before unmounting) will display the BSD name as &quot;/dev/disk1s1&quot; (or similar), allowing you to skip the previous two steps.From the Terminal run:sudo dd if=path_of_your_image.img of=/dev/diskn bs=1mRemember to replace n with the number that you noted before!Wait a LONG time!You&apos;re done! Insert it in the Raspberry Pi, and have funCopying an image to the SD card in Mac OS X (command line)Note: Some users have reported issues with using Mac OS X to create SD cards." />
                      <outline text="These commands and actions need to be performed from an account that has administrator privileges.Download the image from a mirror or torrentVerify if the the hash key is the same (optional), in the terminal run:shasum &#126;/Downloads/2012-12-16-wheezy-raspbian.zipExtract the image:unzip &#126;/Downloads/2012-12-16-wheezy-raspbian.zip(or: just double click the zip, it will extract automatically)From the terminal run df -hConnect the SD card reader with the SD card insideRun df -h again and look for the new device that wasn&apos;t listed last time. Record the device name of the filesystem&apos;s partition, for example, /dev/disk3s1Unmount the partition so that you will be allowed to overwrite the disk:sudo diskutil unmount /dev/disk3s1(or: open Disk Utility and unmount the partition of the SD card (do not eject it, or you have to reconnect it)Using the device name of the partition work out the raw device name for the entire disk, by omitting the final &quot;s1&quot; and replacing &quot;disk&quot; with &quot;rdisk&quot; (this is very important: you will lose all data on the hard drive on your computer if you get the wrong device name). Make sure the device name is the name of the whole SD card as described above, not just a partition of it (for example, rdisk3, not rdisk3s1. Similarly you might have another SD drive name/number like rdisk2 or rdisk4, etc. -- recheck by using the df -h command both before &amp; after you insert your SD card reader into your Mac if you have any doubts!):For example, /dev/disk3s1 =&gt; /dev/rdisk3In the terminal write the image to the card with this command, using the raw disk device name from above (read carefully the above step, to be sure you use the correct rdisk# here!):sudo dd bs=1m if=&#126;/Downloads/2012-10-28-wheezy-raspbian/2012-12-16-wheezy-raspbian.img of=/dev/rdisk3if the above command report an error(dd: bs: illegal numeric value), please change bs=1M to bs=1m(note that dd will not feedback any information until there is an error or it is finished, information will show and disk will re-mount when complete. However if you are curious as to the progresss - ctrl-T (SIGINFO, the status argument of your tty) will display some en-route statistics).After the dd command finishes, eject the card:sudo diskutil eject /dev/rdisk3(or: open Disk Utility and eject the SD card)Insert it in the Raspberry Pi, and have funCopying an image to the SD card in Linux (command line)Please note that the use of the &quot;dd&quot; tool can overwrite any partition of your machine. If you specify the wrong device in the instructions below you could delete your primary Linux partition. Please be careful." />
                      <outline text="Download the zip file containing the image from a mirror or torrentVerify if the the hash key of the zip file is the same as shown on the downloads page (optional). Assuming that you put the zip file in your home directory (&#126;/), in the terminal run:sha1sum &#126;/2012-12-16-wheezy-raspbian.zipThis will print out a long hex number which should match the &quot;SHA-1&quot; line for the SD image you have downloadedExtract the image, withunzip &#126;/2012-12-16-wheezy-raspbian.zipRun df -h to see what devices are currently mountedIf your computer has a slot for SD cards, insert the card. If not, insert the card into an SD card reader, then connect the reader to your computer.Run df -h again. The device that wasn&apos;t there last time is your SD card. The left column gives the device name of your SD card. It will be listed as something like &quot;/dev/mmcblk0p1&quot; or &quot;/dev/sdd1&quot;. The last part (&quot;p1&quot; or &quot;1&quot; respectively) is the partition number, but you want to write to the whole SD card, not just one partition, so you need to remove that part from the name (getting for example &quot;/dev/mmcblk0&quot; or &quot;/dev/sdd&quot;) as the device for the whole SD card. Note that the SD card can show up more than once in the output of df: in fact it will if you have previously written a Raspberry Pi image to this SD card, because the Raspberry Pi SD images have more than one partition.Now that you&apos;ve noted what the device name is, you need to unmount it so that files can&apos;t be read or written to the SD card while you are copying over the SD image. So run the command below, replacing &quot;/dev/sdd1&quot; with whatever your SD card&apos;s device name is (including the partition number)umount /dev/sdd1If your SD card shows up more than once in the output of df due to having multiple partitions on the SD card, you should unmount all of these partitions.In the terminal write the image to the card with this command, making sure you replace the input file if= argument with the path to your .img file, and the &quot;/dev/sdd&quot; in the output file of= argument with the right device name (this is very important: you will lose all data on the hard drive on your computer if you get the wrong device name). Make sure the device name is the name of the whole SD card as described above, not just a partition of it (for example, sdd, not sdds1 or sddp1, or mmcblk0 not mmcblk0p1)dd bs=4M if=&#126;/2012-12-16-wheezy-raspbian.img of=/dev/sddPlease note that block size set to 4M will work most of the time, if not, please try 1M, although 1M will take considerably longer.Note that if you are not logged in as root you will need to prefix this with sudoThe dd command does not give any information of its progress and so may appear to have frozen. It could take more than five minutes to finish writing to the card. If your card reader has an LED it may blink during the write process. To forcibly stop the copy operation you can run pkill -USR1 -n -x dd in another terminal (prefixed with sudo if you are not logged in as root).Instead of dd you can use dcfldd; it will give a progress report about how much has been written.You can check what&apos;s written to the SD card by dd-ing from the card back to your harddisk to another image, and then running diff (or md5sum) on those two images. There should be no difference.As root run the command sync or if a normal user run sudo sync (this will ensure the write cache is flushed and that it is safe to unmount your SD card)Remove SD card from card reader, insert it in the Raspberry Pi, and have funCopying an image to the SD card in Linux (graphical interface)If you are using Ubuntu and hesitate to use the terminal, you can use the ImageWriter tool (nice graphical user interface) to write the .img file to the SD card." />
                      <outline text="Download the zip file containing the image from a mirror or torrentRight click the zip file and select &quot;Extract here&quot;ATTENTION: As of this writing (15 June 2012), there is a bug in the ImageWriter program that causes it to fail if the filename of the image file or its path (i.e. all the names of any parent folders that you extract the image file into) contain any space characters. Before going any further, ensure that neither the file name of the image you&apos;re using or the path contain any spaces (or other odd characters, for that matter). A bug has been opened for this issue: https://bugs.launchpad.net/usb-imagewriter/+bug/1013834 Once the issue is fixed, edit this page to advise people to use an updated/patched version of ImageWriter.Insert the SD card into your computer or connect the SD card reader with the SD card insideInstall the ImageWriter tool from the Ubuntu Software CenterLaunch the ImageWriter tool (it needs your administrative password)Select the image file (example 2012-10-28-wheezy-raspbian.img) to be written to the SD card (note: because you started ImageWriter as administrator the starting point when selecting the image file is the administrator&apos;s home folder so you need to change to your own home folder to select the image file)Select the target device to write the image to (your device will be something like &quot;/dev/mmcblk0&quot; or &quot;/dev/sdc&quot;)Click the &quot;Write to device&quot; buttonWait for the process to finish and then insert the SD card in the Raspberry PiThe SD card image is sized for a 2 GB card. So, if you are using an SD card with a greater capacity, you may find that only 2 GB is available. If this is the case, then to gain more free space, the partitions must be resized. The Fedora Remix and the BerryBoot will automatically resize the partitions on the mounted card during the first boot. The Debian and Rasbian images won&apos;t, so you&apos;ll have to do it manually. The easiest way is to use the tool RPi raspi-config selecting menu item EXPAND-ROOTFS - Expand Root Partition to Fill SD Card. If you want to resize the SD card whilst the SD card is not mounted in the Pi, look here for instructions." />
                      <outline text="If you would rather not resize the partition on another machine as described above, either because you do not have another working Linux machine or you wish to keep your data on another partition to your operating system, you can instead create a new data partition and have that mount automatically at boot." />
                      <outline text="First you need to become root and install parted (I did all of this from the boot command prompt, although if you feel safer in a GUI, you can do all of this in a terminal window):sudo su -apt-get install partedThen you need to run parted on your SD card, mine is /dev/mmcblk0, ymmv:parted /dev/mmcblk0Once running, set the display units to something usable and then print your partition tableunit chsprintYou should see something like this:Model: SD SD08G (sd/mmc)Disk /dev/mmcblk0: 121279,3,31Sector size (logical/physical): 512B/512BBIOS cylinder,head,sector geometry: 121280,4,32. Each cylinder is 65.5kB.Partition Table: msdosNumber Start End Type File system Flags 1 16,0,0 1215,3,31 primary fat32 lba 2 1232,0,0 26671,3,31 primary ext4 3 26688,0,0 29743,3,31 primary linux-swap(v1)Now you need to create your data partition - you need to choose one more than the end of partition 3 with ,0,0 as your start and use the number from the line that starts with Disk as your end:mkpart primary 29744,0,0 121279,3,31printThat should show your new partition:Number Start End Type File system Flags 1 16,0,0 1215,3,31 primary fat32 lba 2 1232,0,0 26671,3,31 primary ext4 3 26688,0,0 29743,3,31 primary linux-swap(v1) 4 29744,0,0 121279,3,31 primaryNow quit and format the partition (again, ymmv with the specific device name, try ls /dev for some clues), and then label it:quitmkfs.ext4 /dev/mmcblk0p4e2label /dev/mmcblk0p4 dataNow we need to make sure that the partition is mounted automatically when the system boots (maybe don&apos;t use vi if you never have before, try nano):vi /etc/fstabEnter a line exactly like this at the end of the file and save and quit your text editor:/dev/mmcblk0p4 /data ext4 defaults 1 2mkdir /datamount /datacd /datalsYour new partition has been created!" />
              </outline>

              <outline text="President Obama Grants Pardons">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/03/01/president-obama-grants-pardons" />        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Fri, 01 Mar 2013 22:49" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="March 01, 2013" />
                      <outline text="WASHINGTON &apos;&apos; Today President Barack Obama granted pardons to the following seventeen individuals:" />
                      <outline text="&apos; Robert Leroy Bebee &apos;&apos; Rockville, Maryland.Offense: Misprision of a felony, 18 U.S.C. &#167; 4.Sentence:  Two years probation." />
                      <outline text="&apos; James Anthony Bordinaro &apos;&apos; Gloucester, Massachusetts.Offenses: Conspiracy to restrain, suppress, and eliminate competition in violation of the Sherman Act, 15 U.S.C. &#167; 1; conspiracy to submit false statements, 18 U.S.C. &#167; 371.Sentence:  12 months imprisonment, three years supervised release and a $55,000 fine.  " />
                      <outline text="&apos; Kelli Elisabeth Collins &apos;&apos; Harrison, Arkansas.Offense: Aiding and abetting a wire fraud, 18 U.S.C. &#167;&#167; 1343, 2.Sentence:  Five years probation." />
                      <outline text="&apos; Edwin Hardy Futch, Jr. &apos;&apos; Pembroke, Georgia.Offense: Theft from an interstate shipment, 18 U.S.C. &#167;&#167; 659, 2.Sentence:  Five years probation, $2,399.72 restitution." />
                      <outline text="&apos; Cindy Marie Griffith &apos;&apos; Moyock, North Carolina.Offense: Distribution of satellite cable television decryption devices, 47 U.S.C.&#167; 605(e)(4), 18 U.S.C. &#167; 2.Sentence:  Two years probation with 100 hours of community service. " />
                      <outline text="&apos; Roy Eugene Grimes, Sr. &apos;&apos; Athens, Tennessee.Offenses: Falsely altering a United States postal money order, 18 U.S.C. &#167; 500; passing,uttering, and publishing a forged and altered money order with intent to defraud,18 U.S.C. &#167; 500.Sentence:  18 months probation." />
                      <outline text="&apos; Jon Christopher Kozeliski &apos;&apos; Decatur, Illinois.Offense: Conspiracy to traffic counterfeit goods, 18 U.S.C. &#167;&#167; 371, 2320.Sentence:  One year of probation with six months of home confinement, $10,000 fine." />
                      <outline text="&apos; Jimmy Ray Mattison &apos;&apos; Anderson, South Carolina.Offenses: Conspiracy to transport and cause the transportation of altered securities ininterstate commerce, 18 U.S.C. &#167;&#167; 371, 2314; transporting and causing the transportationof altered securities in interstate commerce, 18 U.S.C. &#167;&#167; 2314, 2.Sentence:  Three years probation." />
                      <outline text="&apos; An Na Peng &apos;&apos; Honolulu, Hawaii.Offense: Conspiracy to defraud the Immigration and Naturalization Service,18 U.S.C. &#167; 371.Sentence:  Two years probation, $2,000 fine." />
                      <outline text="&apos; Michael John Petri &apos;&apos; Montrose, South Dakota.Offense: Conspiracy to possess with intent to distribute and distribution of a controlledsubstance (cocaine), 21 U.S.C. &#167;&#167; 841(a), 846.Sentence:  Five years imprisonment, three years supervised release." />
                      <outline text="&apos; Karen Alicia Ragee &apos;&apos; Decatur, Illinois.Offense: Conspiracy to traffic counterfeit goods, 18 U.S.C. &#167;&#167; 371, 2320.Sentence:  One year of probation with six months of home confinement, $2,500 fine." />
                      <outline text="&apos; Jamari Salleh &apos;&apos; Alexandria, Virginia.Offense: False claims upon and against the United States, 18 U.S.C. &#167;&#167; 287, 2.Sentence:  Four years probation, $5,000 fine, $5,900 restitution." />
                      <outline text="&apos; Alfor Sharkey &apos;&apos; Omaha, Nebraska.Offense: Unauthorized acquisition of food stamps, 7 U.S.C. &#167; 2024(b)(1).Sentence:  Three years probation with 100 hours of community service, $2,750 restitution." />
                      <outline text="&apos; Donald Barrie Simon, Jr. &apos;&apos; Chattanooga, Tennessee.Offense: Aiding and abetting in the theft of an interstate shipment, 18 U.S.C. &#167;&#167; 659, 2.Sentence:  Two years imprisonment, three years probation." />
                      <outline text="&apos; Lynn Marie Stanek &apos;&apos; Tualatin, Oregon.Offense: Unlawful use of a communication facility to distribute cocaine,21 U.S.C. &#167; 843(b).Sentence:  Six months in jail, five years probation conditioned on residence in acommunity treatment center for a period not to exceed one year." />
                      <outline text="&apos; Larry Wayne Thornton &apos;&apos; Forsyth, Georgia.Offense: Possession of an unregistered firearm, 26 U.S.C. &#167;&#167; 5861(d), 5871; possession ofa firearm without a serial number, 26 U.S.C. &#167;&#167; 5861(i), 5871.Sentence:  Four years probation." />
                      <outline text="&apos; Donna Kaye Wright &apos;&apos; Friendship, Tennessee.Offense: Embezzlement and misapplication of bank funds, 18 U.S.C. &#167; 656.Sentence:  54 days imprisonment, three years probation conditioned on performance of six hours of community service per week." />
              </outline>

              <outline text="Workplace bullying legislation: Keep your chins up parents">
                      <outline text="Link to Article" type="link" url="http://m.csmonitor.com/The-Culture/Family/Modern-Parenthood/2013/0301/Workplace-bullying-legislation-Keep-your-chins-up-parents?" />      <outline text="Fri, 01 Mar 2013 20:45" />
                      <outline text="" />
                      <outline text="The Culture/Family/Modern Parenthood" />
                      <outline text="(Read article summary)Workplace bullying legislation is making its way through multiple state houses. No more, hopefully, will parents have to convince their kids not to fear the school bully while struggling with a workplace bully. " />
                      <outline text="By Lisa Suhay, Guest Blogger / March 1, 2013" />
                      <outline text="Some bullies never grow up, they just transfer their search for dominance from school to the workplace and other venues like the Internet. As parents we have a game plan for helping our kids cope, but what are we to do when Mommy gets bullied at work and comes home carrying the weight of that stress?" />
                      <outline text="In the work place, bullying is like a vampire that drains victims of morale and self-confidence, sapping away their productive energy and increasing employee turnover. Which is pretty much what it does to our kids when it happens in the schoolyard or on the bus." />
                      <outline text="According to The Associated Press: &apos;&apos;Half the employers in a 2011 survey by the management association reported incidents of bullying in their workplace, and about a fourth of human resource professionals themselves said they had been bullied.&apos;&apos;" />
                      <outline text="The website BullyingStatistics.org explains bullying as, &apos;&apos;purposeful attempts to control another person through verbal abuse &apos;-- which can be in tone of voice or in content such as teasing or threats &apos;-- exclusion, or physical bullying or violence, which the victim does not want.&apos;&apos;" />
                      <outline text="The site adds, &apos;&apos;Cyber bullying can take many forms: Sending mean messages or threats to a person&apos;s email account or cell phone. Spreading rumors online or through texts and posting hurtful or threatening messages on social networking sites or web pages.&apos;&apos;" />
                      <outline text="&quot;It&apos;s usually the manager or senior executive who&apos;s just a complete out-of-control jerk,&quot; Margaret Fiester, who experienced workplace bullying, told the AP. &quot;Everyone&apos;s going to be walking around on eggshells around somebody like that. You&apos;re afraid to make mistakes, you&apos;re afraid to speak up, you&apos;re afraid to challenge.&quot;" />
              </outline>

              <outline text="U.S.C. Title 10 - ARMED FORCES">
                      <outline text="Link to Article" type="link" url="http://www.gpo.gov/fdsys/pkg/USCODE-2011-title10/html/USCODE-2011-title10-subtitleE-partII-chap1209-sec12304.htm" />      <outline text="Fri, 01 Mar 2013 17:52" />
                      <outline text="" />
                      <outline text="U.S.C. Title 10 - ARMED FORCES10 U.S.C.United States Code, 2011 EditionTitle 10 - ARMED FORCESSubtitle E - Reserve ComponentsPART II - PERSONNEL GENERALLYCHAPTER 1209 - ACTIVE DUTYSec. 12304 - Selected Reserve and certain Individual Ready Reserve members; order to active duty other than during war or national emergencyFrom the U.S. Government Printing Office, www.gpo.gov" />
                      <outline text="&#167;12304. Selected Reserve and certain Individual Ready Reserve members; order to active duty other than during war or national emergency(a) Authority.&apos;--Notwithstanding the provisions of section 12302(a) or any other provision of law, when the President determines that it is necessary to augment the active forces for any named operational mission or that it is necessary to provide assistance referred to in subsection (b), he may authorize the Secretary of Defense and the Secretary of Homeland Security with respect to the Coast Guard when it is not operating as a service in the Navy, without the consent of the members concerned, to order any unit, and any member not assigned to a unit organized to serve as a unit of the Selected Reserve (as defined in section 10143(a) of this title), or any member in the Individual Ready Reserve mobilization category and designated as essential under regulations prescribed by the Secretary concerned, under their respective jurisdictions, to active duty for not more than 365 consecutive days." />
                      <outline text="(b) Support for Responses to Certain Emergencies.&apos;--The authority under subsection (a) includes authority to order a unit or member to active duty to provide assistance in responding to an emergency involving&apos;--" />
                      <outline text="(1) a use or threatened use of a weapon of mass destruction; or" />
                      <outline text="(2) a terrorist attack or threatened terrorist attack in the United States that results, or could result, in significant loss of life or property." />
                      <outline text="(c) Limitations.&apos;--(1) No unit or member of a reserve component may be ordered to active duty under this section to perform any of the functions authorized by chapter 15 or section 12406 of this title or, except as provided in subsection (b), to provide assistance to either the Federal Government or a State in time of a serious natural or manmade disaster, accident, or catastrophe." />
                      <outline text="(2) Not more than 200,000 members of the Selected Reserve and the Individual Ready Reserve may be on active duty under this section at any one time, of whom not more than 30,000 may be members of the Individual Ready Reserve." />
                      <outline text="(3) No unit or member of a reserve component may be ordered to active duty under this section to provide assistance referred to in subsection (b) unless the President determines that the requirements for responding to an emergency referred to in that subsection have exceeded, or will exceed, the response capabilities of local, State, and Federal civilian agencies." />
                      <outline text="(d) Exclusion From Strength Limitations.&apos;--Members ordered to active duty under this section shall not be counted in computing authorized strength in members on active duty or members in grade under this title or any other law." />
                      <outline text="(e) Policies and Procedures.&apos;--The Secretary of Defense and the Secretary of Homeland Security shall prescribe such policies and procedures for the armed forces under their respective jurisdictions as they consider necessary to carry out this section." />
                      <outline text="(f) Notification of Congress.&apos;--Whenever the President authorizes the Secretary of Defense or the Secretary of Homeland Security to order any unit or member of the Selected Reserve or Individual Ready Reserve to active duty, under the authority of subsection (a), he shall, within 24 hours after exercising such authority, submit to Congress a report, in writing, setting forth the circumstances necessitating the action taken under this section and describing the anticipated use of these units or members." />
                      <outline text="(g) Termination of Duty.&apos;--Whenever any unit of the Selected Reserve or any member of the Selected Reserve not assigned to a unit organized to serve as a unit, or any member of the Individual Ready Reserve, is ordered to active duty under authority of subsection (a), the service of all units or members so ordered to active duty may be terminated by&apos;--" />
                      <outline text="(1) order of the President, or" />
                      <outline text="(2) law." />
                      <outline text="(h) Relationship to War Powers Resolution.&apos;--Nothing contained in this section shall be construed as amending or limiting the application of the provisions of the War Powers Resolution (50 U.S.C. 1541 et seq.)." />
                      <outline text="(i) Considerations for Involuntary Order to Active Duty.&apos;--(1) In determining which members of the Selected Reserve and Individual Ready Reserve will be ordered to duty without their consent under this section, appropriate consideration shall be given to&apos;--" />
                      <outline text="(A) the length and nature of previous service, to assure such sharing of exposure to hazards as the national security and military requirements will reasonably allow;" />
                      <outline text="(B) the frequency of assignments during service career;" />
                      <outline text="(C) family responsibilities; and" />
                      <outline text="(D) employment necessary to maintain the national health, safety, or interest." />
                      <outline text="(2) The Secretary of Defense shall prescribe such policies and procedures as the Secretary considers necessary to carry out this subsection." />
                      <outline text="(j) Definitions.&apos;--In this section:" />
                      <outline text="(1) The term &apos;&apos;Individual Ready Reserve mobilization category&apos;&apos; means, in the case of any reserve component, the category of the Individual Ready Reserve described in section 10144(b) of this title." />
                      <outline text="(2) The term &apos;&apos;weapon of mass destruction&apos;&apos; has the meaning given that term in section 1403 of the Defense Against Weapons of Mass Destruction Act of 1996 (50 U.S.C. 2302(1))." />
                      <outline text="(Added Pub. L. 94&apos;&apos;286, &#167;1, May 14, 1976, 90 Stat. 517, &#167;673b; amended Pub. L. 96&apos;&apos;584, &#167;2, Dec. 23, 1980, 94 Stat. 3377; Pub. L. 97&apos;&apos;295, &#167;1(9), Oct. 12, 1982, 96 Stat. 1289; Pub. L. 99&apos;&apos;661, div. A, title V, &#167;521, Nov. 14, 1986, 100 Stat. 3870; renumbered &#167;12304 and amended, Pub. L. 103&apos;&apos;337, div. A, title V, &#167;511(a), title XVI, &#167;&#167;1662(e)(2), 1675(c)(2), Oct. 5, 1994, 108 Stat. 2752, 2992, 3017; Pub. L. 105&apos;&apos;85, div. A, title V, &#167;511(b)&apos;&apos;(e)(1), Nov. 18, 1997, 111 Stat. 1728, 1729; Pub. L. 105&apos;&apos;261, div. A, title V, &#167;511(a), Oct. 17, 1998, 112 Stat. 2005; Pub. L. 107&apos;&apos;296, title XVII, &#167;1704(b)(1), Nov. 25, 2002, 116 Stat. 2314; Pub. L. 107&apos;&apos;314, div. A, title V, &#167;514(a), Dec. 2, 2002, 116 Stat. 2539; Pub. L. 108&apos;&apos;136, div. A, title V, &#167;515, Nov. 24, 2003, 117 Stat. 1460; Pub. L. 108&apos;&apos;375, div. A, title V, &#167;514(c), Oct. 28, 2004, 118 Stat. 1883; Pub. L. 109&apos;&apos;364, div. A, title V, &#167;522, title X, &#167;1076(c), Oct. 17, 2006, 120 Stat. 2192, 2406; Pub. L. 110&apos;&apos;181, div. A, title X, &#167;&#167;1063(a)(15), 1068(c), Jan. 28, 2008, 122 Stat. 322, 326; Pub. L. 112&apos;&apos;81, div. A, title V, &#167;516(b), Dec. 31, 2011, 125 Stat. 1397.)" />
                      <outline text="References in TextThe War Powers Resolution, referred to in subsec. (h), is Pub. L. 93&apos;&apos;148, Nov. 7, 1973, 87 Stat. 555, which is classified generally to chapter 33 (&#167;1541 et seq.) of Title 50, War and National Defense. For complete classification of this Resolution to the Code, see Short Title note set out under section 1541 of Title 50 and Tables." />
                      <outline text="Amendments2011&apos;--Subsec. (a). Pub. L. 112&apos;&apos;81 inserted &apos;&apos;named&apos;&apos; before &apos;&apos;operational mission&apos;&apos; and substituted &apos;&apos;365 consecutive days&apos;&apos; for &apos;&apos;365 days&apos;&apos;." />
                      <outline text="2008&apos;--Subsec. (a). Pub. L. 110&apos;&apos;181, &#167;1063(a)(15), struck out second period at end." />
                      <outline text="Subsec. (c)(1). Pub. L. 110&apos;&apos;181, &#167;1068(c), substituted &apos;&apos;No unit or member of a reserve component may be ordered to active duty under this section to perform any of the functions authorized by chapter 15 or section 12406 of this title or, except as provided in subsection (b),&apos;&apos; for &apos;&apos;Except to perform any of the functions authorized by chapter 15 or section 12406 of this title or by subsection (b), no unit or member of a reserve component may be ordered to active duty under this section&apos;&apos;." />
                      <outline text="2006&apos;--Subsec. (a). Pub. L. 109&apos;&apos;364, &#167;522(a), substituted &apos;&apos;365 days.&apos;&apos; for &apos;&apos;270 days&apos;&apos;." />
                      <outline text="Subsec. (c)(1). Pub. L. 109&apos;&apos;364, &#167;1076(c), substituted &apos;&apos;Except to perform any of the functions authorized by chapter 15 or section 12406 of this title or by subsection (b), no unit or member of a reserve component may be ordered to active duty under this section&apos;&apos; for &apos;&apos;No unit or member of a reserve component may be ordered to active duty under this section to perform any of the functions authorized by chapter 15 or section 12406 of this title or, except as provided in subsection (b),&apos;&apos;." />
                      <outline text="Subsecs. (i), (j). Pub. L. 109&apos;&apos;364, &#167;522(b), added subsec. (i) and redesignated former subsec. (i) as (j)." />
                      <outline text="2004&apos;--Subsec. (a). Pub. L. 108&apos;&apos;375 struck out &apos;&apos;(other than for training)&apos;&apos; after &apos;&apos;active duty&apos;&apos;." />
                      <outline text="2003&apos;--Subsec. (b)(2). Pub. L. 108&apos;&apos;136, &#167;515(1), substituted &apos;&apos;significant&apos;&apos; for &apos;&apos;catastrophic&apos;&apos;." />
                      <outline text="Subsec. (c)(3). Pub. L. 108&apos;&apos;136, &#167;515(2), added par. (3)." />
                      <outline text="2002&apos;--Subsec. (a). Pub. L. 107&apos;&apos;296 substituted &apos;&apos;of Homeland Security&apos;&apos; for &apos;&apos;of Transportation&apos;&apos;." />
                      <outline text="Subsec. (b). Pub. L. 107&apos;&apos;314 substituted &apos;&apos;involving&apos;--" />
                      <outline text="&apos;&apos;(1) a use or threatened use of a weapon of mass destruction; or" />
                      <outline text="&apos;&apos;(2) a terrorist attack or threatened terrorist attack in the United States that results, or could result, in catastrophic loss of life or property.&apos;&apos;" />
                      <outline text="for &apos;&apos;involving a use or threatened use of a weapon of mass destruction.&apos;&apos;" />
                      <outline text="Subsecs. (e), (f). Pub. L. 107&apos;&apos;296 substituted &apos;&apos;of Homeland Security&apos;&apos; for &apos;&apos;of Transportation&apos;&apos;." />
                      <outline text="1998&apos;--Subsec. (a). Pub. L. 105&apos;&apos;261, &#167;511(a)(1)(A), (3)(A), inserted heading and inserted &apos;&apos;or that it is necessary to provide assistance referred to in subsection (b)&apos;&apos; after &apos;&apos;operational mission&apos;&apos; in text." />
                      <outline text="Subsec. (b). Pub. L. 105&apos;&apos;261, &#167;511(a)(1)(D), added subsec. (b). Former subsec. (b) redesignated subsec. (c)(1)." />
                      <outline text="Subsec. (c). Pub. L. 105&apos;&apos;261, &#167;511(a)(1)(B), (C), redesignated subsec. (b) as par. (1) of subsec. (c), inserted subsec. heading, substituted &apos;&apos;or, except as provided in subsection (b), to provide&apos;&apos; for &apos;&apos;, or to provide&apos;&apos;, and redesignated former subsec. (c) as par. (2)." />
                      <outline text="Subsecs. (d) to (h). Pub. L. 105&apos;&apos;261, &#167;511(a)(3)(B)&apos;&apos;(F), inserted headings." />
                      <outline text="Subsec. (i). Pub. L. 105&apos;&apos;261, &#167;511(a)(2), amended subsec. (i) generally. Prior to amendment, subsec. (i) read as follows: &apos;&apos;For purposes of this section, the term &apos;Individual Ready Reserve mobilization category&apos; means, in the case of any reserve component, the category of the Individual Ready Reserve described in section 10144(b) of this title.&apos;&apos;" />
                      <outline text="1997&apos;--Pub. L. 105&apos;&apos;85, &#167;511(e)(1), inserted &apos;&apos;and certain Individual Ready Reserve members&apos;&apos; after &apos;&apos;Selected Reserve&apos;&apos; in section catchline." />
                      <outline text="Subsec. (a). Pub. L. 105&apos;&apos;85, &#167;511(b), inserted &apos;&apos;or any member in the Individual Ready Reserve mobilization category and designated as essential under regulations prescribed by the Secretary concerned,&apos;&apos; after &apos;&apos;of this title),&apos;&apos;." />
                      <outline text="Subsec. (c). Pub. L. 105&apos;&apos;85, &#167;511(c), inserted &apos;&apos;and the Individual Ready Reserve&apos;&apos; after &apos;&apos;Selected Reserve&apos;&apos; and &apos;&apos;, of whom not more than 30,000 may be members of the Individual Ready Reserve&apos;&apos; before period at end." />
                      <outline text="Subsec. (f). Pub. L. 105&apos;&apos;85, &#167;511(d)(1), inserted &apos;&apos;or Individual Ready Reserve&apos;&apos; after &apos;&apos;Selected Reserve&apos;&apos;." />
                      <outline text="Subsec. (g). Pub. L. 105&apos;&apos;85, &#167;511(d)(2), inserted &apos;&apos;, or any member of the Individual Ready Reserve,&apos;&apos; after &apos;&apos;to serve as a unit&apos;&apos; in introductory provisions." />
                      <outline text="Subsec. (i). Pub. L. 105&apos;&apos;85, &#167;511(d)(3), added subsec. (i)." />
                      <outline text="1994&apos;--Pub. L. 103&apos;&apos;337, &#167;1662(e)(2), renumbered section 673b of this title as this section." />
                      <outline text="Subsec. (a). Pub. L. 103&apos;&apos;337, &#167;1675(c)(2)(A), (B), substituted &apos;&apos;12302(a)&apos;&apos; for &apos;&apos;673(a)&apos;&apos; and &apos;&apos;10143(a)&apos;&apos; for &apos;&apos;268(b)&apos;&apos;." />
                      <outline text="Pub. L. 103&apos;&apos;337, &#167;511(a)(1), substituted &apos;&apos;270 days&apos;&apos; for &apos;&apos;90 days&apos;&apos;." />
                      <outline text="Subsec. (b). Pub. L. 103&apos;&apos;337, &#167;1675(c)(2)(C), substituted &apos;&apos;12406&apos;&apos; for &apos;&apos;3500 or 8500&apos;&apos;." />
                      <outline text="Subsec. (i). Pub. L. 103&apos;&apos;337, &#167;511(a)(2), struck out subsec. (i) which read as follows: &apos;&apos;When a unit of the Selected Reserve, or a member of the Selected Reserve not assigned to a unit organized to serve as a unit of the Selected Reserve, is ordered to active duty under this section and the President determines that an extension of the service of such unit or member on active duty is necessary in the interests of national security, he may authorize the Secretary of Defense and the Secretary of Transportation with respect to the Coast Guard when it is not operating as a service in the Navy to extend the period of such order to active duty for a period of not more than 90 additional days. Whenever the President exercises his authority under this subsection, he shall immediately notify Congress of such action and shall include in the notification a statement of reasons for the action. Nothing in this subsection shall be construed as limiting the authorities to terminate the service of units or members ordered to active duty under this section under subsection (g).&apos;&apos;" />
                      <outline text="1986&apos;--Subsec. (b). Pub. L. 99&apos;&apos;661, &#167;521(c)(1), substituted &apos;&apos;reserve component&apos;&apos; for &apos;&apos;Reserve component&apos;&apos;." />
                      <outline text="Subsec. (c). Pub. L. 99&apos;&apos;661, &#167;521(a), substituted &apos;&apos;200,000&apos;&apos; for &apos;&apos;100,000&apos;&apos;." />
                      <outline text="Subsec. (e). Pub. L. 99&apos;&apos;661, &#167;521(c)(2), substituted &apos;&apos;armed forces&apos;&apos; for &apos;&apos;Armed Forces&apos;&apos;." />
                      <outline text="Subsec. (f). Pub. L. 99&apos;&apos;661, &#167;521(c)(3), substituted &apos;&apos;Congress&apos;&apos; for &apos;&apos;the Speaker of the House of Representatives and to the President pro tempore of the Senate&apos;&apos;." />
                      <outline text="Subsec. (g)(2). Pub. L. 99&apos;&apos;661, &#167;521(c)(4), substituted &apos;&apos;law&apos;&apos; for &apos;&apos;a concurrent resolution of the Congress&apos;&apos;." />
                      <outline text="Subsec. (i). Pub. L. 99&apos;&apos;661, &#167;521(b), added subsec. (i)." />
                      <outline text="1982&apos;--Subsec. (h). Pub. L. 97&apos;&apos;295 inserted &apos;&apos;(50 U.S.C. 1541 et seq.)&apos;&apos; after &apos;&apos;the War Powers Resolution&apos;&apos;." />
                      <outline text="1980&apos;--Subsec. (c). Pub. L. 96&apos;&apos;584 substituted &apos;&apos;100,000&apos;&apos; for &apos;&apos;50,000&apos;&apos;." />
                      <outline text="Effective Date of 2002 AmendmentAmendment by Pub. L. 107&apos;&apos;296 effective on the date of transfer of the Coast Guard to the Department of Homeland Security, see section 1704(g) of Pub. L. 107&apos;&apos;296, set out as a note under section 101 of this title." />
                      <outline text="Effective Date of 1994 AmendmentAmendment by sections 1662(e)(2) and 1675(c)(2) of Pub. L. 103&apos;&apos;337 effective Dec. 1, 1994, except as otherwise provided, see section 1691 of Pub. L. 103&apos;&apos;337, set out as an Effective Date note under section 10001 of this title." />
                      <outline text="Orders to Active Duty for Selected Reserve Combat Units Involved in Operation Desert Shield; Extensions of Time for Fiscal Year 1991Pub. L. 101&apos;&apos;511, title VIII, &#167;8132, Nov. 5, 1990, 104 Stat. 1908, provided that, during fiscal year 1991, the President, in authorizing under this section the order to active duty of units and members of the Selected Reserve, could use that authority in the case of orders to active duty in support of operations in and around the Arabian Peninsula and Operation Desert Shield as if &apos;&apos;180&apos;&apos; were substituted for &apos;&apos;90&apos;&apos; in subsecs. (a) and (i) of this section." />
                      <outline text="Ex. Ord. No. 12727. Ordering Selected Reserve of Armed Forces to Active DutyEx. Ord. No. 12727, Aug. 22, 1990, 55 F.R. 35027, as amended by Ex. Ord. No. 13286, &#167;39, Feb. 28, 2003, 68 F.R. 10626, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 673b [now 12304] of title 10 of the United States Code, I hereby determine that it is necessary to augment the active armed forces of the United States for the effective conduct of operational missions in and around the Arabian Peninsula. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Homeland Security with respect to the Coast Guard when the latter is not operating as a service in the Department of the Navy, to order to active duty units and individual members not assigned to units, of the Selected Reserve." />
                      <outline text="This order is intended only to improve the internal management of the executive branch, and is not intended to create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its agencies, its officers, or any person." />
                      <outline text="This order shall be published in the Federal Register and transmitted promptly to the Congress." />
                      <outline text="Ex. Ord. No. 12733. Authorizing Extension of Period of Active Duty of Personnel of Selected Reserve of Armed ForcesEx. Ord. No. 12733, Nov. 13, 1990, 55 F.R. 47837, as amended by Ex. Ord. No. 13286, &#167;37, Feb. 28, 2003, 68 F.R. 10626, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 673b(i) [673b now 12304] of title 10 of the United States Code, I hereby determine that, in the interests of national security, extending the period of active duty is necessary for the following: units of the Selected Reserve, and members of the Selected Reserve not assigned to a unit organized to serve as a unit of the Selected Reserve, now serving on or hereafter ordered to active duty pursuant to section 673b(a) [now 12304(a)] of title 10 of the United States Code and Executive Order No. 12727 of August 22, 1990 [set out above]. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Homeland Security with respect to the Coast Guard when the latter is not operating as a service in the Department of the Navy, to extend the period of active duty of such units and members of the Selected Reserve." />
                      <outline text="This order is intended only to improve the internal management of the executive branch, and is not intended to create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its agencies, its officers, or any person." />
                      <outline text="This order shall be published in the Federal Register and transmitted promptly to the Congress." />
                      <outline text="Ex. Ord. No. 12927. Ordering Selected Reserve of Armed Forces to Active DutyEx. Ord. No. 12927, Sept. 15, 1994, 59 F.R. 47781, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 673b [now 12304] of title 10 of the United States Code, I hereby determine that it is necessary to augment the active armed forces of the United States for the effective conduct of operational missions to restore the civilian government in Haiti. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Transportation with respect to the Coast Guard when it is not operating as a service in the Department of the Navy, to order to active duty any units, and any individual members not assigned to a unit organized to serve as a unit, of the Selected Reserve." />
                      <outline text="This order is intended only to improve the internal management of the executive branch, and is not intended to create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its agencies, its officers, or any person." />
                      <outline text="This order is effective immediately and shall be published in the Federal Register and transmitted to the Congress." />
                      <outline text="William J. Clinton.      " />
                      <outline text="Ex. Ord. No. 12982. Ordering Selected Reserve of Armed Forces to Active DutyEx. Ord. No. 12982, Dec. 8, 1995, 60 F.R. 63895, as amended by Ex. Ord. No. 13286, &#167;21, Feb. 28, 2003, 68 F.R. 10624, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 12304 of title 10, United States Code, I hereby determine that it is necessary to augment the active armed forces of the United States for the effective conduct of operations in and around former Yugoslavia. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Homeland Security with respect to the Coast Guard when it is not operating as a service in the Department of the Navy, to order to active duty any units, and any individual members not assigned to a unit organized to serve as a unit, of the Selected Reserve." />
                      <outline text="This order is intended only to improve the internal management of the executive branch and is not intended to create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its agencies, its officers, or any person." />
                      <outline text="This order shall be published in the Federal Register and transmitted to the Congress." />
                      <outline text="Ex. Ord. No. 13076. Ordering Selected Reserve of Armed Forces to Active DutyEx. Ord. No. 13076, Feb. 24, 1998, 63 F.R. 9719, as amended by Ex. Ord. No. 13286, &#167;17, Feb. 28, 2003, 68 F.R. 10623, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 12304 of title 10, United States Code, I hereby determine that it is necessary to augment the active armed forces of the United States for the effective conduct of operations in and around Southwest Asia. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Homeland Security with respect to the Coast Guard when it is not operating as a service in the Department of the Navy, to order to active duty any units, and any individual members not assigned to a unit organized to serve as a unit, of the Selected Reserve." />
                      <outline text="This order is intended only to improve the internal management of the executive branch and is not intended to create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its agencies, its officers, or any person." />
                      <outline text="Ex. Ord. No. 13120. Ordering Selected Reserve and Certain Individual Ready Reserve Members of Armed Forces to Active DutyEx. Ord. No. 13120, Apr. 27, 1999, 64 F.R. 23007, as amended by Ex. Ord. No. 13286, &#167;14, Feb. 28, 2003, 68 F.R. 10623, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 12304 of title 10, United States Code, I hereby determine that it is necessary to augment the active armed forces of the United States for the effective conduct of operations in and around the former Yugoslavia related to the conflict in Kosovo. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Homeland Security with respect to the Coast Guard when it is not operating as a service in the Department of the Navy, under their respective jurisdictions, to order to active duty any units, and any individual members not assigned to a unit organized to serve as a unit, of the Selected Reserve, or any member in the Individual Ready Reserve mobilization category and designated as essential under regulations prescribed by the Secretary concerned, and to terminate the service of those units and members ordered to active duty." />
                      <outline text="This order is intended only to improve the internal management of the executive branch and is not intended to create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its agencies, its officers, or any person." />
                      <outline text="Ex. Ord. No. 13529. Ordering the Selected Reserve and Certain Individual Ready Reserve Members of the Armed Forces to Active DutyEx. Ord. No. 13529, Jan. 16, 2010, 75 F.R. 3331, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 12304 of title 10, United States Code, I hereby determine that it is necessary to augment the active Armed Forces of the United States for the effective conduct of operational missions, including those involving humanitarian assistance, related to relief efforts in Haiti necessitated by the earthquake on January 12, 2010. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Homeland Security with respect to the Coast Guard when it is not operating as a service in the Navy, under their respective jurisdictions, to order to active duty any units, and any individual members not assigned to a unit organized to serve as a unit, of the Selected Reserve, or any member in the Individual Ready Reserve mobilization category and designated as essential under regulations prescribed by the Secretary concerned, and to terminate the service of those units and members ordered to active duty." />
                      <outline text="This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity, by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person." />
                      <outline text="Barack Obama.      " />
                      <outline text="U.S.C. Title 10 - ARMED FORCES10 U.S.C.United States Code, 2011 EditionTitle 10 - ARMED FORCESSubtitle E - Reserve ComponentsPART II - PERSONNEL GENERALLYCHAPTER 1209 - ACTIVE DUTYSec. 12304 - Selected Reserve and certain Individual Ready Reserve members; order to active duty other than during war or national emergencyFrom the U.S. Government Printing Office, www.gpo.gov" />
                      <outline text="&#167;12304. Selected Reserve and certain Individual Ready Reserve members; order to active duty other than during war or national emergency(a) Authority.&apos;--Notwithstanding the provisions of section 12302(a) or any other provision of law, when the President determines that it is necessary to augment the active forces for any named operational mission or that it is necessary to provide assistance referred to in subsection (b), he may authorize the Secretary of Defense and the Secretary of Homeland Security with respect to the Coast Guard when it is not operating as a service in the Navy, without the consent of the members concerned, to order any unit, and any member not assigned to a unit organized to serve as a unit of the Selected Reserve (as defined in section 10143(a) of this title), or any member in the Individual Ready Reserve mobilization category and designated as essential under regulations prescribed by the Secretary concerned, under their respective jurisdictions, to active duty for not more than 365 consecutive days." />
                      <outline text="(b) Support for Responses to Certain Emergencies.&apos;--The authority under subsection (a) includes authority to order a unit or member to active duty to provide assistance in responding to an emergency involving&apos;--" />
                      <outline text="(1) a use or threatened use of a weapon of mass destruction; or" />
                      <outline text="(2) a terrorist attack or threatened terrorist attack in the United States that results, or could result, in significant loss of life or property." />
                      <outline text="(c) Limitations.&apos;--(1) No unit or member of a reserve component may be ordered to active duty under this section to perform any of the functions authorized by chapter 15 or section 12406 of this title or, except as provided in subsection (b), to provide assistance to either the Federal Government or a State in time of a serious natural or manmade disaster, accident, or catastrophe." />
                      <outline text="(2) Not more than 200,000 members of the Selected Reserve and the Individual Ready Reserve may be on active duty under this section at any one time, of whom not more than 30,000 may be members of the Individual Ready Reserve." />
                      <outline text="(3) No unit or member of a reserve component may be ordered to active duty under this section to provide assistance referred to in subsection (b) unless the President determines that the requirements for responding to an emergency referred to in that subsection have exceeded, or will exceed, the response capabilities of local, State, and Federal civilian agencies." />
                      <outline text="(d) Exclusion From Strength Limitations.&apos;--Members ordered to active duty under this section shall not be counted in computing authorized strength in members on active duty or members in grade under this title or any other law." />
                      <outline text="(e) Policies and Procedures.&apos;--The Secretary of Defense and the Secretary of Homeland Security shall prescribe such policies and procedures for the armed forces under their respective jurisdictions as they consider necessary to carry out this section." />
                      <outline text="(f) Notification of Congress.&apos;--Whenever the President authorizes the Secretary of Defense or the Secretary of Homeland Security to order any unit or member of the Selected Reserve or Individual Ready Reserve to active duty, under the authority of subsection (a), he shall, within 24 hours after exercising such authority, submit to Congress a report, in writing, setting forth the circumstances necessitating the action taken under this section and describing the anticipated use of these units or members." />
                      <outline text="(g) Termination of Duty.&apos;--Whenever any unit of the Selected Reserve or any member of the Selected Reserve not assigned to a unit organized to serve as a unit, or any member of the Individual Ready Reserve, is ordered to active duty under authority of subsection (a), the service of all units or members so ordered to active duty may be terminated by&apos;--" />
                      <outline text="(1) order of the President, or" />
                      <outline text="(2) law." />
                      <outline text="(h) Relationship to War Powers Resolution.&apos;--Nothing contained in this section shall be construed as amending or limiting the application of the provisions of the War Powers Resolution (50 U.S.C. 1541 et seq.)." />
                      <outline text="(i) Considerations for Involuntary Order to Active Duty.&apos;--(1) In determining which members of the Selected Reserve and Individual Ready Reserve will be ordered to duty without their consent under this section, appropriate consideration shall be given to&apos;--" />
                      <outline text="(A) the length and nature of previous service, to assure such sharing of exposure to hazards as the national security and military requirements will reasonably allow;" />
                      <outline text="(B) the frequency of assignments during service career;" />
                      <outline text="(C) family responsibilities; and" />
                      <outline text="(D) employment necessary to maintain the national health, safety, or interest." />
                      <outline text="(2) The Secretary of Defense shall prescribe such policies and procedures as the Secretary considers necessary to carry out this subsection." />
                      <outline text="(j) Definitions.&apos;--In this section:" />
                      <outline text="(1) The term &apos;&apos;Individual Ready Reserve mobilization category&apos;&apos; means, in the case of any reserve component, the category of the Individual Ready Reserve described in section 10144(b) of this title." />
                      <outline text="(2) The term &apos;&apos;weapon of mass destruction&apos;&apos; has the meaning given that term in section 1403 of the Defense Against Weapons of Mass Destruction Act of 1996 (50 U.S.C. 2302(1))." />
                      <outline text="(Added Pub. L. 94&apos;&apos;286, &#167;1, May 14, 1976, 90 Stat. 517, &#167;673b; amended Pub. L. 96&apos;&apos;584, &#167;2, Dec. 23, 1980, 94 Stat. 3377; Pub. L. 97&apos;&apos;295, &#167;1(9), Oct. 12, 1982, 96 Stat. 1289; Pub. L. 99&apos;&apos;661, div. A, title V, &#167;521, Nov. 14, 1986, 100 Stat. 3870; renumbered &#167;12304 and amended, Pub. L. 103&apos;&apos;337, div. A, title V, &#167;511(a), title XVI, &#167;&#167;1662(e)(2), 1675(c)(2), Oct. 5, 1994, 108 Stat. 2752, 2992, 3017; Pub. L. 105&apos;&apos;85, div. A, title V, &#167;511(b)&apos;&apos;(e)(1), Nov. 18, 1997, 111 Stat. 1728, 1729; Pub. L. 105&apos;&apos;261, div. A, title V, &#167;511(a), Oct. 17, 1998, 112 Stat. 2005; Pub. L. 107&apos;&apos;296, title XVII, &#167;1704(b)(1), Nov. 25, 2002, 116 Stat. 2314; Pub. L. 107&apos;&apos;314, div. A, title V, &#167;514(a), Dec. 2, 2002, 116 Stat. 2539; Pub. L. 108&apos;&apos;136, div. A, title V, &#167;515, Nov. 24, 2003, 117 Stat. 1460; Pub. L. 108&apos;&apos;375, div. A, title V, &#167;514(c), Oct. 28, 2004, 118 Stat. 1883; Pub. L. 109&apos;&apos;364, div. A, title V, &#167;522, title X, &#167;1076(c), Oct. 17, 2006, 120 Stat. 2192, 2406; Pub. L. 110&apos;&apos;181, div. A, title X, &#167;&#167;1063(a)(15), 1068(c), Jan. 28, 2008, 122 Stat. 322, 326; Pub. L. 112&apos;&apos;81, div. A, title V, &#167;516(b), Dec. 31, 2011, 125 Stat. 1397.)" />
                      <outline text="References in TextThe War Powers Resolution, referred to in subsec. (h), is Pub. L. 93&apos;&apos;148, Nov. 7, 1973, 87 Stat. 555, which is classified generally to chapter 33 (&#167;1541 et seq.) of Title 50, War and National Defense. For complete classification of this Resolution to the Code, see Short Title note set out under section 1541 of Title 50 and Tables." />
                      <outline text="Amendments2011&apos;--Subsec. (a). Pub. L. 112&apos;&apos;81 inserted &apos;&apos;named&apos;&apos; before &apos;&apos;operational mission&apos;&apos; and substituted &apos;&apos;365 consecutive days&apos;&apos; for &apos;&apos;365 days&apos;&apos;." />
                      <outline text="2008&apos;--Subsec. (a). Pub. L. 110&apos;&apos;181, &#167;1063(a)(15), struck out second period at end." />
                      <outline text="Subsec. (c)(1). Pub. L. 110&apos;&apos;181, &#167;1068(c), substituted &apos;&apos;No unit or member of a reserve component may be ordered to active duty under this section to perform any of the functions authorized by chapter 15 or section 12406 of this title or, except as provided in subsection (b),&apos;&apos; for &apos;&apos;Except to perform any of the functions authorized by chapter 15 or section 12406 of this title or by subsection (b), no unit or member of a reserve component may be ordered to active duty under this section&apos;&apos;." />
                      <outline text="2006&apos;--Subsec. (a). Pub. L. 109&apos;&apos;364, &#167;522(a), substituted &apos;&apos;365 days.&apos;&apos; for &apos;&apos;270 days&apos;&apos;." />
                      <outline text="Subsec. (c)(1). Pub. L. 109&apos;&apos;364, &#167;1076(c), substituted &apos;&apos;Except to perform any of the functions authorized by chapter 15 or section 12406 of this title or by subsection (b), no unit or member of a reserve component may be ordered to active duty under this section&apos;&apos; for &apos;&apos;No unit or member of a reserve component may be ordered to active duty under this section to perform any of the functions authorized by chapter 15 or section 12406 of this title or, except as provided in subsection (b),&apos;&apos;." />
                      <outline text="Subsecs. (i), (j). Pub. L. 109&apos;&apos;364, &#167;522(b), added subsec. (i) and redesignated former subsec. (i) as (j)." />
                      <outline text="2004&apos;--Subsec. (a). Pub. L. 108&apos;&apos;375 struck out &apos;&apos;(other than for training)&apos;&apos; after &apos;&apos;active duty&apos;&apos;." />
                      <outline text="2003&apos;--Subsec. (b)(2). Pub. L. 108&apos;&apos;136, &#167;515(1), substituted &apos;&apos;significant&apos;&apos; for &apos;&apos;catastrophic&apos;&apos;." />
                      <outline text="Subsec. (c)(3). Pub. L. 108&apos;&apos;136, &#167;515(2), added par. (3)." />
                      <outline text="2002&apos;--Subsec. (a). Pub. L. 107&apos;&apos;296 substituted &apos;&apos;of Homeland Security&apos;&apos; for &apos;&apos;of Transportation&apos;&apos;." />
                      <outline text="Subsec. (b). Pub. L. 107&apos;&apos;314 substituted &apos;&apos;involving&apos;--" />
                      <outline text="&apos;&apos;(1) a use or threatened use of a weapon of mass destruction; or" />
                      <outline text="&apos;&apos;(2) a terrorist attack or threatened terrorist attack in the United States that results, or could result, in catastrophic loss of life or property.&apos;&apos;" />
                      <outline text="for &apos;&apos;involving a use or threatened use of a weapon of mass destruction.&apos;&apos;" />
                      <outline text="Subsecs. (e), (f). Pub. L. 107&apos;&apos;296 substituted &apos;&apos;of Homeland Security&apos;&apos; for &apos;&apos;of Transportation&apos;&apos;." />
                      <outline text="1998&apos;--Subsec. (a). Pub. L. 105&apos;&apos;261, &#167;511(a)(1)(A), (3)(A), inserted heading and inserted &apos;&apos;or that it is necessary to provide assistance referred to in subsection (b)&apos;&apos; after &apos;&apos;operational mission&apos;&apos; in text." />
                      <outline text="Subsec. (b). Pub. L. 105&apos;&apos;261, &#167;511(a)(1)(D), added subsec. (b). Former subsec. (b) redesignated subsec. (c)(1)." />
                      <outline text="Subsec. (c). Pub. L. 105&apos;&apos;261, &#167;511(a)(1)(B), (C), redesignated subsec. (b) as par. (1) of subsec. (c), inserted subsec. heading, substituted &apos;&apos;or, except as provided in subsection (b), to provide&apos;&apos; for &apos;&apos;, or to provide&apos;&apos;, and redesignated former subsec. (c) as par. (2)." />
                      <outline text="Subsecs. (d) to (h). Pub. L. 105&apos;&apos;261, &#167;511(a)(3)(B)&apos;&apos;(F), inserted headings." />
                      <outline text="Subsec. (i). Pub. L. 105&apos;&apos;261, &#167;511(a)(2), amended subsec. (i) generally. Prior to amendment, subsec. (i) read as follows: &apos;&apos;For purposes of this section, the term &apos;Individual Ready Reserve mobilization category&apos; means, in the case of any reserve component, the category of the Individual Ready Reserve described in section 10144(b) of this title.&apos;&apos;" />
                      <outline text="1997&apos;--Pub. L. 105&apos;&apos;85, &#167;511(e)(1), inserted &apos;&apos;and certain Individual Ready Reserve members&apos;&apos; after &apos;&apos;Selected Reserve&apos;&apos; in section catchline." />
                      <outline text="Subsec. (a). Pub. L. 105&apos;&apos;85, &#167;511(b), inserted &apos;&apos;or any member in the Individual Ready Reserve mobilization category and designated as essential under regulations prescribed by the Secretary concerned,&apos;&apos; after &apos;&apos;of this title),&apos;&apos;." />
                      <outline text="Subsec. (c). Pub. L. 105&apos;&apos;85, &#167;511(c), inserted &apos;&apos;and the Individual Ready Reserve&apos;&apos; after &apos;&apos;Selected Reserve&apos;&apos; and &apos;&apos;, of whom not more than 30,000 may be members of the Individual Ready Reserve&apos;&apos; before period at end." />
                      <outline text="Subsec. (f). Pub. L. 105&apos;&apos;85, &#167;511(d)(1), inserted &apos;&apos;or Individual Ready Reserve&apos;&apos; after &apos;&apos;Selected Reserve&apos;&apos;." />
                      <outline text="Subsec. (g). Pub. L. 105&apos;&apos;85, &#167;511(d)(2), inserted &apos;&apos;, or any member of the Individual Ready Reserve,&apos;&apos; after &apos;&apos;to serve as a unit&apos;&apos; in introductory provisions." />
                      <outline text="Subsec. (i). Pub. L. 105&apos;&apos;85, &#167;511(d)(3), added subsec. (i)." />
                      <outline text="1994&apos;--Pub. L. 103&apos;&apos;337, &#167;1662(e)(2), renumbered section 673b of this title as this section." />
                      <outline text="Subsec. (a). Pub. L. 103&apos;&apos;337, &#167;1675(c)(2)(A), (B), substituted &apos;&apos;12302(a)&apos;&apos; for &apos;&apos;673(a)&apos;&apos; and &apos;&apos;10143(a)&apos;&apos; for &apos;&apos;268(b)&apos;&apos;." />
                      <outline text="Pub. L. 103&apos;&apos;337, &#167;511(a)(1), substituted &apos;&apos;270 days&apos;&apos; for &apos;&apos;90 days&apos;&apos;." />
                      <outline text="Subsec. (b). Pub. L. 103&apos;&apos;337, &#167;1675(c)(2)(C), substituted &apos;&apos;12406&apos;&apos; for &apos;&apos;3500 or 8500&apos;&apos;." />
                      <outline text="Subsec. (i). Pub. L. 103&apos;&apos;337, &#167;511(a)(2), struck out subsec. (i) which read as follows: &apos;&apos;When a unit of the Selected Reserve, or a member of the Selected Reserve not assigned to a unit organized to serve as a unit of the Selected Reserve, is ordered to active duty under this section and the President determines that an extension of the service of such unit or member on active duty is necessary in the interests of national security, he may authorize the Secretary of Defense and the Secretary of Transportation with respect to the Coast Guard when it is not operating as a service in the Navy to extend the period of such order to active duty for a period of not more than 90 additional days. Whenever the President exercises his authority under this subsection, he shall immediately notify Congress of such action and shall include in the notification a statement of reasons for the action. Nothing in this subsection shall be construed as limiting the authorities to terminate the service of units or members ordered to active duty under this section under subsection (g).&apos;&apos;" />
                      <outline text="1986&apos;--Subsec. (b). Pub. L. 99&apos;&apos;661, &#167;521(c)(1), substituted &apos;&apos;reserve component&apos;&apos; for &apos;&apos;Reserve component&apos;&apos;." />
                      <outline text="Subsec. (c). Pub. L. 99&apos;&apos;661, &#167;521(a), substituted &apos;&apos;200,000&apos;&apos; for &apos;&apos;100,000&apos;&apos;." />
                      <outline text="Subsec. (e). Pub. L. 99&apos;&apos;661, &#167;521(c)(2), substituted &apos;&apos;armed forces&apos;&apos; for &apos;&apos;Armed Forces&apos;&apos;." />
                      <outline text="Subsec. (f). Pub. L. 99&apos;&apos;661, &#167;521(c)(3), substituted &apos;&apos;Congress&apos;&apos; for &apos;&apos;the Speaker of the House of Representatives and to the President pro tempore of the Senate&apos;&apos;." />
                      <outline text="Subsec. (g)(2). Pub. L. 99&apos;&apos;661, &#167;521(c)(4), substituted &apos;&apos;law&apos;&apos; for &apos;&apos;a concurrent resolution of the Congress&apos;&apos;." />
                      <outline text="Subsec. (i). Pub. L. 99&apos;&apos;661, &#167;521(b), added subsec. (i)." />
                      <outline text="1982&apos;--Subsec. (h). Pub. L. 97&apos;&apos;295 inserted &apos;&apos;(50 U.S.C. 1541 et seq.)&apos;&apos; after &apos;&apos;the War Powers Resolution&apos;&apos;." />
                      <outline text="1980&apos;--Subsec. (c). Pub. L. 96&apos;&apos;584 substituted &apos;&apos;100,000&apos;&apos; for &apos;&apos;50,000&apos;&apos;." />
                      <outline text="Effective Date of 2002 AmendmentAmendment by Pub. L. 107&apos;&apos;296 effective on the date of transfer of the Coast Guard to the Department of Homeland Security, see section 1704(g) of Pub. L. 107&apos;&apos;296, set out as a note under section 101 of this title." />
                      <outline text="Effective Date of 1994 AmendmentAmendment by sections 1662(e)(2) and 1675(c)(2) of Pub. L. 103&apos;&apos;337 effective Dec. 1, 1994, except as otherwise provided, see section 1691 of Pub. L. 103&apos;&apos;337, set out as an Effective Date note under section 10001 of this title." />
                      <outline text="Orders to Active Duty for Selected Reserve Combat Units Involved in Operation Desert Shield; Extensions of Time for Fiscal Year 1991Pub. L. 101&apos;&apos;511, title VIII, &#167;8132, Nov. 5, 1990, 104 Stat. 1908, provided that, during fiscal year 1991, the President, in authorizing under this section the order to active duty of units and members of the Selected Reserve, could use that authority in the case of orders to active duty in support of operations in and around the Arabian Peninsula and Operation Desert Shield as if &apos;&apos;180&apos;&apos; were substituted for &apos;&apos;90&apos;&apos; in subsecs. (a) and (i) of this section." />
                      <outline text="Ex. Ord. No. 12727. Ordering Selected Reserve of Armed Forces to Active DutyEx. Ord. No. 12727, Aug. 22, 1990, 55 F.R. 35027, as amended by Ex. Ord. No. 13286, &#167;39, Feb. 28, 2003, 68 F.R. 10626, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 673b [now 12304] of title 10 of the United States Code, I hereby determine that it is necessary to augment the active armed forces of the United States for the effective conduct of operational missions in and around the Arabian Peninsula. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Homeland Security with respect to the Coast Guard when the latter is not operating as a service in the Department of the Navy, to order to active duty units and individual members not assigned to units, of the Selected Reserve." />
                      <outline text="This order is intended only to improve the internal management of the executive branch, and is not intended to create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its agencies, its officers, or any person." />
                      <outline text="This order shall be published in the Federal Register and transmitted promptly to the Congress." />
                      <outline text="Ex. Ord. No. 12733. Authorizing Extension of Period of Active Duty of Personnel of Selected Reserve of Armed ForcesEx. Ord. No. 12733, Nov. 13, 1990, 55 F.R. 47837, as amended by Ex. Ord. No. 13286, &#167;37, Feb. 28, 2003, 68 F.R. 10626, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 673b(i) [673b now 12304] of title 10 of the United States Code, I hereby determine that, in the interests of national security, extending the period of active duty is necessary for the following: units of the Selected Reserve, and members of the Selected Reserve not assigned to a unit organized to serve as a unit of the Selected Reserve, now serving on or hereafter ordered to active duty pursuant to section 673b(a) [now 12304(a)] of title 10 of the United States Code and Executive Order No. 12727 of August 22, 1990 [set out above]. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Homeland Security with respect to the Coast Guard when the latter is not operating as a service in the Department of the Navy, to extend the period of active duty of such units and members of the Selected Reserve." />
                      <outline text="This order is intended only to improve the internal management of the executive branch, and is not intended to create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its agencies, its officers, or any person." />
                      <outline text="This order shall be published in the Federal Register and transmitted promptly to the Congress." />
                      <outline text="Ex. Ord. No. 12927. Ordering Selected Reserve of Armed Forces to Active DutyEx. Ord. No. 12927, Sept. 15, 1994, 59 F.R. 47781, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 673b [now 12304] of title 10 of the United States Code, I hereby determine that it is necessary to augment the active armed forces of the United States for the effective conduct of operational missions to restore the civilian government in Haiti. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Transportation with respect to the Coast Guard when it is not operating as a service in the Department of the Navy, to order to active duty any units, and any individual members not assigned to a unit organized to serve as a unit, of the Selected Reserve." />
                      <outline text="This order is intended only to improve the internal management of the executive branch, and is not intended to create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its agencies, its officers, or any person." />
                      <outline text="This order is effective immediately and shall be published in the Federal Register and transmitted to the Congress." />
                      <outline text="William J. Clinton.      " />
                      <outline text="Ex. Ord. No. 12982. Ordering Selected Reserve of Armed Forces to Active DutyEx. Ord. No. 12982, Dec. 8, 1995, 60 F.R. 63895, as amended by Ex. Ord. No. 13286, &#167;21, Feb. 28, 2003, 68 F.R. 10624, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 12304 of title 10, United States Code, I hereby determine that it is necessary to augment the active armed forces of the United States for the effective conduct of operations in and around former Yugoslavia. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Homeland Security with respect to the Coast Guard when it is not operating as a service in the Department of the Navy, to order to active duty any units, and any individual members not assigned to a unit organized to serve as a unit, of the Selected Reserve." />
                      <outline text="This order is intended only to improve the internal management of the executive branch and is not intended to create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its agencies, its officers, or any person." />
                      <outline text="This order shall be published in the Federal Register and transmitted to the Congress." />
                      <outline text="Ex. Ord. No. 13076. Ordering Selected Reserve of Armed Forces to Active DutyEx. Ord. No. 13076, Feb. 24, 1998, 63 F.R. 9719, as amended by Ex. Ord. No. 13286, &#167;17, Feb. 28, 2003, 68 F.R. 10623, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 12304 of title 10, United States Code, I hereby determine that it is necessary to augment the active armed forces of the United States for the effective conduct of operations in and around Southwest Asia. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Homeland Security with respect to the Coast Guard when it is not operating as a service in the Department of the Navy, to order to active duty any units, and any individual members not assigned to a unit organized to serve as a unit, of the Selected Reserve." />
                      <outline text="This order is intended only to improve the internal management of the executive branch and is not intended to create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its agencies, its officers, or any person." />
                      <outline text="Ex. Ord. No. 13120. Ordering Selected Reserve and Certain Individual Ready Reserve Members of Armed Forces to Active DutyEx. Ord. No. 13120, Apr. 27, 1999, 64 F.R. 23007, as amended by Ex. Ord. No. 13286, &#167;14, Feb. 28, 2003, 68 F.R. 10623, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 12304 of title 10, United States Code, I hereby determine that it is necessary to augment the active armed forces of the United States for the effective conduct of operations in and around the former Yugoslavia related to the conflict in Kosovo. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Homeland Security with respect to the Coast Guard when it is not operating as a service in the Department of the Navy, under their respective jurisdictions, to order to active duty any units, and any individual members not assigned to a unit organized to serve as a unit, of the Selected Reserve, or any member in the Individual Ready Reserve mobilization category and designated as essential under regulations prescribed by the Secretary concerned, and to terminate the service of those units and members ordered to active duty." />
                      <outline text="This order is intended only to improve the internal management of the executive branch and is not intended to create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its agencies, its officers, or any person." />
                      <outline text="Ex. Ord. No. 13529. Ordering the Selected Reserve and Certain Individual Ready Reserve Members of the Armed Forces to Active DutyEx. Ord. No. 13529, Jan. 16, 2010, 75 F.R. 3331, provided:" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, including sections 121 and 12304 of title 10, United States Code, I hereby determine that it is necessary to augment the active Armed Forces of the United States for the effective conduct of operational missions, including those involving humanitarian assistance, related to relief efforts in Haiti necessitated by the earthquake on January 12, 2010. Further, under the stated authority, I hereby authorize the Secretary of Defense, and the Secretary of Homeland Security with respect to the Coast Guard when it is not operating as a service in the Navy, under their respective jurisdictions, to order to active duty any units, and any individual members not assigned to a unit organized to serve as a unit, of the Selected Reserve, or any member in the Individual Ready Reserve mobilization category and designated as essential under regulations prescribed by the Secretary concerned, and to terminate the service of those units and members ordered to active duty." />
                      <outline text="This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity, by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person." />
                      <outline text="Barack Obama.      " />
              </outline>

              <outline text="Federal Register | Federal Acquisition Regulation; Definition of Contingency Operation">
                      <outline text="Link to Article" type="link" url="https://www.federalregister.gov/articles/2013/02/28/2013-04599/federal-acquisition-regulation-definition-of-contingency-operation" />      <outline text="Thu, 28 Feb 2013 16:54" />
                      <outline text="" />
                      <outline text="DoD, GSA, and NASA are issuing an interim rule amending the Federal Acquisition Regulation (FAR) to revise the definition of &apos;&apos;contingency operation&apos;&apos; to address the statutory change to the definition made by the National Defense Authorization Act for Fiscal Year 2012." />
                      <outline text=" " />
                      <outline text="Effective February 28, 2013." />
                      <outline text="Comment Date: Interested parties should submit written comments to the Regulatory Secretariat on or before April 29, 2013 to be considered in the formulation of a final rule." />
                      <outline text="Submit comments identified by FAC 2005-66, FAR Case 2013-003, by any of the following methods:" />
                      <outline text="Regulations.gov: http://www.regulations.gov. Submit comments via the Federal eRulemaking portal by searching for &apos;&apos;FAR Case 2013-003&apos;&apos;. Select the link &apos;&apos;Submit a Comment&apos;&apos; that corresponds with &apos;&apos;FAR Case 2013-003&apos;&apos;. Follow the instructions provided at the &apos;&apos;Submit a Comment&apos;&apos; screen. Please include your name, company name (if any), and &apos;&apos;FAR Case 2013-003&apos;&apos; on your attached document.Fax: 202-501-4067.Mail: General Services Administration, Regulatory Secretariat (MVCB), ATTN: Hada Flowers, 1275 First Street NE., 7th Floor, Washington, DC 20417.Instructions: Please submit comments only and cite FAC 2005-66, FAR Case 2013-003, in all correspondence related to this case. All comments received will be posted without change to http://www.regulations.gov, including any personal and/or business confidential information provided." />
                      <outline text="Ms. Patricia Corrigan, Procurement Analyst, at 202-208-1963, for clarification of content. For information pertaining to status or publication schedules, contact the Regulatory Secretariat at 202-501-4755. Please cite FAC 2005-66, FAR Case 2013-003." />
                      <outline text="DoD, GSA, and NASA are publishing an interim rule amending the FAR to revise the definition of &apos;&apos;contingency operation&apos;&apos; at FAR 2.101 in accordance with the statutory change to the definition made by paragraph (b) of section 515 of the National Defense Authorization Act for Fiscal Year 2012 (Pub. L. 112-81, enacted December 31, 2011). The definition of &apos;&apos;contingency operation&apos;&apos; was amended at 10 U.S.C. 101(a)(13) by adding &apos;&apos;12304a&apos;&apos;." />
                      <outline text="Paragraph (a) of section 515 of the National Defense Authorization Act for Fiscal Year 2012 (Pub. L. 112-81), entitled &apos;&apos;Authority to Order Army Reserve, Navy Reserve, Marine Corps Reserve, and Air Force Reserve to Active Duty to Provide Assistance in Response to a Major Disaster or Emergency&apos;&apos;, amends chapter 1209 of title 10, United States Code, by incorporating a new provision at section 12304a that provides for treatment of an operation as a contingency operation when the Secretary of Defense activates Reserves under the terms of 10 U.S.C. 12304a in response to a Governor&apos;s request for Federal assistance in responding to a major disaster or emergency declared by the President." />
                      <outline text="This interim rule adds a reference to section 12304a of Title 10, United States Code (from section 515 of the National Defense Authorization Act for Fiscal Year 2012 (Pub. L. 112-81)) to the list of references in section (2) of the definition of &apos;&apos;contingency operation&apos;&apos; in FAR 2.101, Definitions." />
                      <outline text="Executive Orders (E.O.s) 12866 and 13563 direct agencies to assess all costs and benefits of available regulatory alternatives and, if regulation is necessary, to select regulatory approaches that maximize net benefits (including potential economic, environmental, public health and safety effects, distributive impacts, and equity). E.O. 13563 emphasizes the importance of quantifying both costs and benefits, of reducing costs, of harmonizing rules, and of promoting flexibility. The Office of Information and Regulatory Affairs (OIRA) has deemed that this is not a significant regulatory action and, therefore, was not subject to review under section 6(b) of E.O. 12866, Regulatory Planning and Review, dated September 30, 1993, and that this rule is not a major rule under 5 U.S.C. 804." />
                      <outline text="The change may have a significant economic impact on a substantial number of small entities within the meaning of the Regulatory Flexibility Act 5 U.S.C. 601, et seq. The Initial Regulatory Flexibility Analysis (IRFA) is summarized as follows:" />
                      <outline text="The Regulatory Secretariat has submitted a copy of the IRFA to the Chief Counsel for Advocacy of the Small Business Administration. A copy of the IRFA may be obtained from the Regulatory Secretariat. DoD, GSA, and NASA invite comments from small business concerns and other interested parties on the expected impact of this rule on small entities." />
                      <outline text="DoD, GSA, and NASA will also consider comments from small entities concerning the existing regulations in subparts affected by this rule in accordance with 5 U.S.C. 610. Interested parties must submit such comments separately and should cite 5 U.S.C. 610 (FAC 2005-66, FAR Case 2013-003) in correspondence." />
                      <outline text="The interim rule does not contain any information collection requirements that require the approval of the Office of Management and Budget under the Paperwork Reduction Act (44 U.S.C. chapter 35)." />
                      <outline text="A determination has been made under the authority of the Secretary of Defense (DoD), the Administrator of General Services (GSA), and the Administrator of the National Aeronautics and Space Administration (NASA) that urgent and compelling reasons exist to promulgate this interim rule without prior opportunity for public comment. This action is necessary because section 515 of the National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2012 (Pub. L. 112-81) was enacted on December 31, 2011, and was effective upon enactment. Section 515 provided the legal basis for declaration of contingency operations and the exercise of related procurement flexibilities in support of Hurricane Sandy relief in October 2012. It remains necessary to implement the statute by revising the definition of &apos;&apos;contingency operation&apos;&apos; in FAR 2.101 to ensure regulatory conformance with statute. However, pursuant to 41 U.S.C. 1707 and FAR 1.501-3(b), DoD, GSA, and NASA will consider public comments received in response to this interim rule in the formation of the final rule." />
                      <outline text="Dated: February 20, 2013." />
                      <outline text="Laura Auletta," />
                      <outline text="Director, Office of Governmentwide Acquisition Policy, Office of Acquisition Policy, Office of Governmentwide Policy." />
                      <outline text="Therefore, DoD, GSA, and NASA amend 48 CFR part 2 as set forth below:" />
                      <outline text="begin regulatory text" />
                      <outline text="1.The authority citation for 48 CFR part 2 continues to read as follows:" />
                      <outline text="Authority:40 U.S.C. 121(c); 10 U.S.C. chapter 137; and 51 U.S.C. 20115." />
                      <outline text="2.Amend section 2.101, in paragraph (b)(2), by revising paragraph (2) of the definition &apos;&apos;Contingency operation&apos;&apos; to read as follows:" />
                      <outline text="* * * * *" />
                      <outline text="(b) * * *" />
                      <outline text="(2) * * *" />
                      <outline text="Contingency operation* * *" />
                      <outline text="(2) Results in the call or order to, or retention on, active duty of members of the uniformed services under sections 688, 12301(a), 12302, 12304, 12304a, 12305, or 12406 of title 10 of the United States Code, Chapter 15 of title 10 of the United States Code, or any other provision of law during a war or during a national emergency declared by the President or Congress." />
                      <outline text="* * * * *" />
                      <outline text="end regulatory text" />
                      <outline text="[FR Doc. 2013-04599 Filed 2-27-13; 8:45 am]" />
                      <outline text="BILLING CODE 6820-EP-P" />
              </outline>

              <outline text="MUST READ: Jarrett&apos;s Warning Reveals Itself  (WSI Related)">
                      <outline text="Link to Article" type="link" url="http://theulstermanreport.com/2013/02/28/must-read-jarretts-warning-reveals-itself-wsi-related/" />        <outline text="Source: The Ulsterman Report" type="link" url="http://theulstermanreport.com/feed/" />
      <outline text="Fri, 01 Mar 2013 17:50" />
                      <outline text="" />
                      <outline text="}r6vUIKc{ks&#201;&#150;{gf4gg&gt;W/h&#211;yQfu&amp;Yo614d61&#207;&#149;R 6ie6W3_rCl&#210;&apos;+bj7_H&#127;Hk%&#207;&gt;&gt;VfylU7&apos;p|a@&#127;L#p&#198;&amp;" />
              </outline>

              <outline text="Delinquencies On Student Loans Surpass Those On Credit Card Debt">
                      <outline text="Link to Article" type="link" url="http://www.zerohedge.com/news/2013-02-28/delinquencies-student-loans-surpass-those-credit-card-debt" />        <outline text="Source: What Jamie Flarity is reading." type="link" url="http://s3.amazonaws.com/jamie-river/cartulary.rss" />
      <outline text="Fri, 01 Mar 2013 17:49" />
                      <outline text="" />
                      <outline text="Those who have been following our year-long series exposing the student debt bubble are by now well aware that this latest $1 trillion+ reincarnation of subprime will have a very unhappy ending. Which is why today&apos;s release of the quarterly Fed report on household debt and credit will hold few surprises for them. There is however, one data point which is notable: as of December 31, 2012, the soaring delinquency rate on student loans (first reported here, and subsequently confirmed by the Fed itself), has surpassed that of credit card debt." />
                      <outline text="Which makes perfect sense: because as consumers are still aggressively deleveraging their revolving balances, they are simply replacing them with far cheaper, Federally-funded credit in the form of non-revolving student debt, which as all know, is used for most other purposes but paying down study-related expenses. And why not: since the government is providing a cheap credit subsidy to the big banks, why should consumers not find the cheapest cost of funding. That everyone else will have to pay for this blow up when it ineivtably does happen, as every credit bubble always ends, is a different story." />
                      <outline text="And as a tangent, these three charts should effectively explain why the &quot;Housing recovery&quot;, i.e., the second housing bubble is in full force in California and Nevada." />
                      <outline text="The epic California debt balance per capita:" />
                      <outline text="And the rebound in Nevada, already highest, delinquency rate." />
                      <outline text="Source: NY Fed" />
                      <outline text="Average:Your rating: NoneAverage: 4.9(13 votes)" />
              </outline>

              <outline text="VIDEO-Press Availability on Syria">
                      <outline text="Link to Article" type="link" url="http://www.state.gov/secretary/remarks/2013/02/205435.htm" />      <outline text="Fri, 01 Mar 2013 17:47" />
                      <outline text="" />
                      <outline text="SECRETARY KERRY: Good afternoon again. I just have a very brief statement, then I&apos;m happy to take a few questions. I just got to look outdoors and actually see that it is a beautiful day here in Rome, and I want to again thank our host, the Foreign Minister, and thank Italy for bringing us here today. We&apos;re enormously appreciative and I&apos;m very grateful to them for that, and also to all of the partner nations who came here today. I have to tell you that around that table was a very important, competent, and powerful group of countries ranging through Europe down into the Gulf as well as Turkey and Egypt, and everybody was unanimous in their conclusions." />
                      <outline text="Aiding the people who are fighting for a free Syria is a cause to which President Obama and all of us are deeply committed. And what unites us today is our shared conviction that the best solution for Syria is a political solution. The sooner we can get started, the more lives we&apos;ll save, and the better chance we have of preserving Syria&apos;s institutions and its rich culture and of restoring its unity. That&apos;s our goal here." />
                      <outline text="Working together, we&apos;ve already been able to do a lot. We&apos;ve imposed broad sanctions on the Assad regime that dry up some of the funds that fuel his war machine. In addition, we have supported the Syrian Opposition Coalition with training, organization, and some of the communications resources that they need to reach out to the Syrian people. We continue to increase our humanitarian support for those who are suffering. But today, President Obama has encouraged all of us to embrace the notion that we need to do more." />
                      <outline text="So the $60 million that I announced on his behalf today will do the following: It will strengthen the organizational capacity of the Syrian Opposition Coalition. It will help war-torn communities be able to survive devastating situations with respect to sanitation, food delivery, medical care. It will speed the delivery of basic goods and services including security and education. It will help to initiate discussions with those who are providing for public order and for justice as the transition itself unfolds. And we will help the SNC, Free Syrian Army, and the civilian opposition to feed those in need and tend to the sick and the wounded." />
                      <outline text="We do this because we need to stand on the side of those in this fight who want to see Syria rise again in unity and see a democracy and human rights and justice. The stakes are really high. And we can&apos;t risk letting this country, in the heart of the Middle East, be destroyed by vicious autocrats or hijacked by the extremists. In supporting the Syrian Opposition Coalition and the Free Syrian Army, we reject both of those choices, and we stand with those Syrians fighting for the right to choose dignity and democracy and justice. That&apos;s our battle. I&apos;d be happy to take your questions." />
                      <outline text="MS. NULAND: We&apos;ll take three today. We&apos;ll start with Fox News, James Rosen." />
                      <outline text="QUESTION: Thank you very much, Mr. Secretary. As you know from your many years in the United States Senate and from your many years traveling the globe, the kind of multifaceted program in the tens of millions of dollars that you&apos;ve announced here today will take many months before it is fully operational and longer still before its impacts are discernable on the ground. As you also said today, President Assad seems only to increase in his viciousness and his brutality. Aren&apos;t you concerned, sir, that while you&apos;re trying to stand up local councils and extend the rule of law in these places in Syria that perhaps we could see another 20,000 lives lost? In short, as the Syrians are sure to say, is this the best you can do?" />
                      <outline text="SECRETARY KERRY: Well, (inaudible) it&apos;s a very good question and it&apos;s an appropriate one, and the answer is I am confident about our ability to be able to deliver this money rapidly. Part of this money we have programmed in some of the things that we are doing now, but in addition to that, I&apos;ve touched base with key members of Congress who I think are prepared to be helpful. And I will &apos;&apos; I&apos;ve agreed to brief them the minute I get back from this trip. I will personally be engaged in that process and I &apos;&apos; so I feel very confident about it, as does the President and his advisors in the White House who signed off on this knowing that this would require rapid delivery." />
                      <outline text="MS. NULAND: Next question, from the Italian side, Alessandro Casari, TG1, please." />
                      <outline text="QUESTION: (Via interpreter.) Good morning, Mr. Secretary of State. Thank you. You mentioned the wonderful climate here in Rome, but of course, you&apos;re here as a Secretary of State at a very complicated time, right after our political elections. At international level, many people have expressed their concerns with regard to the political stability here in Italy and with regard to the consequences, the spillover &apos;&apos; economic spillover &apos;&apos; not only in Europe. And in fact, over the past few days, we&apos;ve been hearing this from the president of the Fed, and yesterday the German Minister of the Economy, Mr. Schaeuble. Do you share these concerns? Do you see that Italy, this political instability can somehow impact macroeconomics?" />
                      <outline text="SECRETARY KERRY: Well, one of the first things I learned as a recovering politician, as a new Secretary of State, is don&apos;t make judgments about other people&apos;s political system. So I&apos;m going to be somewhat wary about digging in in any depth to the situation." />
                      <outline text="Let me just say this: I am really personally very confident about Italy&apos;s ability and desire to work through the complicated, obviously, returns and results. Italy is a strong, stable democracy. It&apos;s an important member of the European Union. It&apos;s a Eurozone member. A lot of different positive things have happened over the last months, as the reforms have somewhat been implemented. And frankly, I want to congratulate the Italian people. They had a very robust, interesting, challenging election. And it was very hard-fought. And what I read out of it was that almost everybody in Italy wanted reform and they wanted change." />
                      <outline text="So Italy will remain a critical partner on European, on other issues. Look at the role Italy is playing today, notwithstanding the fact they had an election and it&apos;s in the midst of a government change. So I&apos;m very confident that we will continue to lend our support as Italy pursues further reforms. And I&apos;m &apos;&apos; I have great confidence in the ability of the voice of the Italian people to work its way through your political process." />
                      <outline text="MS. NULAND: Last question today. New York Times, Michael Gordon, please." />
                      <outline text="QUESTION: Mr. Secretary, you&apos;ve talked over the past several days about the importance of changing Assad&apos;s calculations and his belief that he can hang onto power. But all you&apos;re offering by way of nonlethal assistance to the Free Syrian Army is food rations and medical supplies. How is that supposed to change the mind of a man like Assad who has used SCUDs in Aleppo and employed force indiscriminately? And secondarily, are you prepared to state today that if the Free Syrian Army demonstrates that it&apos;s able to use this limited assistance in a proper way &apos;&apos;" />
                      <outline text="SECRETARY KERRY: Can you hold the mike a little closer there?" />
                      <outline text="QUESTION: Can you state today that if the Free Syrian Army is &apos;&apos; demonstrates it&apos;s able to use the limited assistance you&apos;re offering in a proper way, can you commit to providing more substantial assistance in the future, such as communications equipment, armored cars, bulletproof vests, night vision goggles, the things of that nature?" />
                      <outline text="SECRETARY KERRY: Well, here&apos;s what President Obama is committing to today in his decision to make a significant stepping-up of the policy that he has been pursuing. What the President is doing is coming together by sending me here with all of the other key 11 partners who have been meeting on this on a regular basis, all of whom have agreed today that we need to change President Assad&apos;s calculation, and we need to do more." />
                      <outline text="What we are doing in our part of that doing more is part of a whole. Different countries are choosing to do different things, and we make this evaluation based on the whole. I am absolutely confident from what I heard in there from other foreign ministers that the totality of this effort is going to have an impact on the ability of the Syrian opposition to accomplish its goals." />
                      <outline text="Now, when you said &apos;&apos;all you are doing is providing,&apos;&apos; that&apos;s not all we&apos;re doing. We are providing some $60 million, the most significant portion of which is going directly to the Syrian opposition to enable it to be able to organize more effectively, to be able to carry its message more effectively, to be able to reach people within Syria so that in secured areas, they have an ability to be able to deliver what they can&apos;t deliver today. That will help them build support much more rapidly." />
                      <outline text="In addition, we have &apos;&apos; under &apos;&apos; I mean, we are going to continue to consult with each other, as we have said, on an urgent basis. And I am going back to Washington with a number of thoughts and ideas that were put on the table today, and I&apos;m confident we&apos;re going to have a robust and ongoing conversation." />
                      <outline text="So this is &apos;&apos; don&apos;t look at this as the whole &apos;&apos; this is not &apos;&apos; what the President has announced and what we&apos;re doing today is part of a whole, and I am very confident that that whole is going to have the ability for President Assad to realize he better start measuring more effectively what his future is, what his choices are, and what kinds of weapons he uses. And I think that the international community is going to continue to be intensely focused on this issue. So I&apos;m very confident in what the President has put forward today as the beginning of a process that will, in fact, change his calculation." />
                      <outline text="MS. NULAND: Thank you all very much." />
                      <outline text="SECRETARY KERRY: Thank you all. Appreciate it." />
              </outline>

              <outline text="Presidential Proclamation -- Read Across America Day, 2013">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/02/28/presidential-proclamation-read-across-america-day-2013" />        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Fri, 01 Mar 2013 17:41" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="February 28, 2013" />
                      <outline text="READ ACROSS AMERICA DAY, 2013" />
                      <outline text="- - - - - - -" />
                      <outline text="BY THE PRESIDENT OF THE UNITED STATES OF AMERICA" />
                      <outline text="A PROCLAMATION" />
                      <outline text="Today, people of all ages will mark Read Across America Day by celebrating stories that have shaped us. We take this opportunity to reflect on the transformative power of the written word and lift up literacy as a key to success in the 21st century." />
                      <outline text="We also take time to remember Theodor Seuss Geisel -- better known as Dr. Seuss -- whose works of humor and heart remind us that it is never too early to kindle a passion for reading. Books open the window to worlds of imagination, and the lessons they teach form the bedrock for a lifetime of learning. By encouraging reading at home and in school, parents, caregivers, and educators help set our children on the path to years of fulfillment and possibility. American progress depends on what we do for our students, so all of us must strive to empower the next generation with the tools they need to build a brighter future." />
                      <outline text="Great written works resonate with us. They challenge us. They reveal new insights about ourselves and the world we share. Today, as we celebrate the ways reading has enriched our lives, let us recommit to giving our sons and daughters the fullest opportunity to find inspiration on the printed page." />
                      <outline text="NOW, THEREFORE, I, BARACK OBAMA, President of the United States of America, by virtue of the authority vested in me by the Constitution and the laws of the United States, do hereby proclaim March 1, 2013, as Read Across America Day. I call upon children, families, educators, librarians, public officials, and all the people of the United States to observe this day with appropriate programs, ceremonies, and activities." />
                      <outline text="IN WITNESS WHEREOF, I have hereunto set my hand this twenty-eighth day of February, in the year of our Lord two thousand thirteen, and of the Independence of the United States of America the two hundred and thirty-seventh." />
                      <outline text="BARACK OBAMA" />
              </outline>

              <outline text="Presidential Proclamation -- American Red Cross Month, 2013">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/02/28/presidential-proclamation-american-red-cross-month-2013" />        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Fri, 01 Mar 2013 17:40" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="February 28, 2013" />
                      <outline text="AMERICAN RED CROSS MONTH, 2013" />
                      <outline text="- - - - - - -" />
                      <outline text="BY THE PRESIDENT OF THE UNITED STATES OF AMERICA" />
                      <outline text="A PROCLAMATION" />
                      <outline text="Since our Nation&apos;s founding, seasons of trial and bitter hardship have revealed a core belief we share as Americans: that when we see our neighbors in need, we will always stand united in helping them get back on their feet. This month, we honor men and women who deliver relief to communities around the world, and we renew the compassionate spirit that continues to keep our country strong and our people safe." />
                      <outline text="The American Red Cross has proudly upheld a commitment to service that spans generations. Witness to the scars left by civil war, Clara Barton founded the organization in 1881 as a way to lift up the suffering -- from warriors wounded in the line of duty to families displaced by damaging storms. In the years since, countless service and relief organizations have joined the American Red Cross in realizing that noble vision." />
                      <outline text="We saw the depth of their dedication just 4 months ago, when the sweeping devastation of Hurricane Sandy put millions of Americans in harm&apos;s way. In darkness and danger, thousands of professionals and volunteers stepped up to serve. They secured supplies and shelter when our people needed them most. And when times were tough, they proved that America is tougher because we all pull together." />
                      <outline text="That sense of resolve has seen our Nation through our greatest challenges, and the conviction that we are our brothers&apos; and sisters&apos; keepers will always remain at the heart of who we are as a people. As we reflect on the ties that bind us together, let us pay tribute to humanitarian organizations working here at home and around the world, and let us rededicate ourselves to service in the months ahead." />
                      <outline text="NOW, THEREFORE, I, BARACK OBAMA, President of the United States of America and Honorary Chairman of the American Red Cross, by virtue of the authority vested in me by the Constitution and the laws of the United States, do hereby proclaim March 2013 as American Red Cross Month. I encourage all Americans to observe this month with appropriate programs, ceremonies, and activities, and by supporting the work of service and relief organizations." />
                      <outline text="IN WITNESS WHEREOF, I have hereunto set my hand this twenty-eighth day of February, in the year of our Lord two thousand thirteen, and of the Independence of the United States of America the two hundred and thirty-seventh." />
                      <outline text="BARACK OBAMA" />
              </outline>

              <outline text="Piers Morgan to Gun Rights Advocate: &apos;I Suggest You Keep Quiet&apos;">
                      <outline text="Link to Article" type="link" url="http://www.mrctv.org/videos/piers-morgan-gun-rights-advocate-i-suggest-you-keep-quiet" />        <outline text="Source: MRCTV - News &amp;amp; Politics" type="link" url="http://www.mrctv.org/taxonomy/term/1/0/feed" />
      <outline text="Fri, 01 Mar 2013 17:39" />
                      <outline text="" />
                      <outline text="MRC TV is an online platform for people to share and view videos, articles and opinions on topics that are important to them -- from news to political issues and rip-roaring humor." />
                      <outline text="MRC TV is brought to you by the Media Research Center, a 501(c) 3 nonprofit research and education organization. The MRC is located at: 325 South Patrick Street, Alexandria, VA  22314. For information about the MRC, please visit www.MRC.org." />
                      <outline text="Copyright (C) 2013, Media Research Center. All Rights Reserved." />
              </outline>

              <outline text="the UN? Cholera? No WAY!">
                      <outline text="Link to Article" type="link" url="http://www.aljazeera.com/news/africa/2013/03/2013310270138931.html" />        <outline text="Source: BadChad's ThoughtPile" type="link" url="http://cartusers.curry.com/chad.christiandgk2/badchad" />
      <outline text="Fri, 01 Mar 2013 17:37" />
                      <outline text="" />
                      <outline text="A United Nations investigation has reached a damning verdict on its own humanitarian operation, accusing it of &quot;managerial ineptitude, high handed conduct and bad faith.&quot;" />
                      <outline text="The findings refer to its operations during a Cholera outbreak in Zimbabwe that started in 2008 and claimed more than 4,000 lives." />
                      <outline text="The UN dispute tribunal in Nairobi, Kenya, in effect found that UN bosses did not want to upset the government of Robert Mugabe, and did not act on warnings by a senior member of its staff. One hundred thousand people caught the disease." />
                      <outline text="Months before the outbreak of the cholera epidemic in 2008, which coincided with a time of heightened political tensions in Zimbabwe, Georges Tadonki, the then head of the UN humanitarian office in Zimbabwe, warned his superiors of the severe risks, but no action was taken." />
                      <outline text="Tadonki claims that he was fired in January 2009, partly because he sounded the alarm about the cholera crisis." />
                      <outline text="&apos;&apos;Mr Tadonke pressed the issue, and this tribunal has heard that he was hounded out of his job, and his lawyers said he suffered a nervous breakdown as a result.&apos;&apos; Al Jazeera&apos;s Diplomatic Editor James Bays said." />
                      <outline text="&apos;&apos;What the UN also said is that there should be disciplinary action against four very senior UN officials, including the former humanitarian chief of the UN, John Holmes.&apos;&apos; Al Jazeera&apos;s Bays added." />
                      <outline text="&apos;&apos;Now, all those four officials are no longer in their posts, so it is not clear what kind of action can be taken against them.&apos;&apos;" />
                      <outline text="The UN Office for the Coordination of Humanitarian Affairs told Al Jazeera that the world organisation intends to appeal the judgment." />
                      <outline text="&apos;&apos;The Organisation intends to file an appeal of this judgment. Consistent with the established policy regarding ongoing cases, which includes cases under appeal, the Organisation is not in a position to provide any further comments at this time.&apos;&apos;" />
                      <outline text="306" />
              </outline>

              <outline text="Pfc. Bradley E. Manning&apos;s Statement for the Providence Inquiry">
                      <outline text="Link to Article" type="link" url="http://www.alexaobrien.com/secondsight/wikileaks/bradley_manning/pfc_bradley_e_manning_providence_hearing_statement.html" />      <outline text="Fri, 01 Mar 2013 17:36" />
                      <outline text="" />
                      <outline text="This statement below was read by Private First Class Bradley E. Bradley at a providence inquiry for his formal plea of guilty to one specification as charged and nine specifications for lesser included offenses. He pled not guilty to 12 other specifications. This rush transcript was taken by journalist Alexa O&apos;Brien at the Article 39(a) session of United States v. Pfc. Bradley Manning on February 28, 2013 at Fort Meade, MD, USA." />
                      <outline text="Judge Lind: Pfc. Manning you may read your statement." />
                      <outline text="Pfc. Bradley Manning: Yes, your Honor. I wrote this statement in the confinement facility. The following facts are provided in support of the providence inquiry for my court martial, United States v. Pfc. Bradley E. Manning." />
                      <outline text="Personal Facts." />
                      <outline text="I am a twenty-five year old Private First Class in the United States Army currently assigned to Headquarters and Headquarters Company, HHC, US Army Garrison (USAG), Joint Base Myer, Henderson Hall, Fort Meyer, Virginia." />
                      <outline text="My [missed word] assignment I was assigned to HHC, 2nd Brigade Combat Team, 10th Mountain Division at Fort Drum, NY. My primary military occupational specialty or MOS is 35 Foxtrot intelligence analyst. I entered active duty status on 2 October 2007. I enlisted with the hope of obtaining both real world experience and earning benefits under the GI Bill for college opportunities." />
                      <outline text="Facts regarding my position as an intelligence analyst." />
                      <outline text="In order to enlist in the Army I took the Standard Armed Services Aptitude Battery or [ASVAB?]. My score on this battery was high enough for me to qualify for any enlisted MOS positon. My recruiter informed me that I should select an MOS that complimented my interests outside the military. In response, I told him that I was interested in geopolitical matters and information technology. He suggested that I consider becoming an intelligence analyst." />
                      <outline text="After researching the intelligence analyst position, I agreed that this would be a good fit for me. In particular, I enjoyed the fact that an analyst could use information derived from a variety of sources to create work products that informed the command of its available choices for determining the best course of action or COA&apos;s. Although the MOS required working knowledge of computers, it primarily required me to consider how raw information can be combined with other available intelligence sources in order to create products that assisted the command in it&apos;s situational awareness or SA." />
                      <outline text="I accessed that my natural interest in geopolitical affairs and my computer skills would make me an excellent intelligence analyst. After enlisting I reported to the Fort Meade military entrance processing station on 1 October 2007. I then traveled to and reported at Fort Leonard Wood, Missouri on 2 October 2007 to begin basic combat training or BCT." />
                      <outline text="Once at Fort Leonard Wood I quickly realized that I was neither physically nor mentally prepared for the requirements of basic training. My BCT experience lasted six months instead of the normal ten weeks. Due to medical issues, I was placed on a hold status. A physical examination indicated that I sustained injuries to my right soldier and left foot." />
                      <outline text="Due to those injuries I was unable to continue &apos;basic&apos;. During medical hold, I was informed that I may be out processed from the Army, however, I resisted being chaptered out because I felt that I could overcome my medical issues and continue to serve. On 2[8 or 20?] January 2008, I returned to basic combat training. This time I was better prepared and I completed training on 2 April 2008." />
                      <outline text="I then reported for the MOS specific Advanced Individual Training or AIT on 7 April 2008. AIT was an enjoyable experience for me. Unlike basic training where I felt different from the other soldiers, I fit in did well. I preferred the mental challenges of reviewing a large amount of information from various sources and trying to create useful or actionable products. I especially enjoyed the practice of analysis through the use of computer applications and methods that I was familiar with." />
                      <outline text="I graduated from AIT on 16 August 2008 and reported to my first duty station, Fort Drum, NY on 28 August 2008. As an analyst, Significant Activities or SigActs were a frequent source of information for me to use in creating work products. I started working extensively with SigActs early after my arrival at Fort Drum. My computer background allowed me to use the tools of organic to the Distributed Common Ground System-Army or D6-A computers to create polished work products for the 2nd Brigade Combat Team chain of command." />
                      <outline text="The non-commissioned officer in charge, or NCOIC, of the S2 section, then Master Sergeant David P. Adkins recognized my skills and potential and tasked me to work on a tool abandoned by a previously assigned analyst, the incident tracker. The incident tracker was viewed as a back up to the Combined Information Data Network Exchange or CIDNE and as a unit, historical reference to work with." />
                      <outline text="In the months preceding my upcoming deployment, I worked on creating a new version of the incident tracker and used SigActs to populate it. The SigActs I used were from Afghanistan, because at the time our unit was scheduled to deploy to the Logar and Wardak Provinces of Afghanistan. Later my unit was reassigned to deploy to Eastern Baghdad, Iraq. At that point, I removed the Afghanistan SigActs and switched to Iraq SigActs." />
                      <outline text="As and analyst I viewed the SigActs as historical data. I believed this view is shared by other all-source analysts as well. SigActs give a first look impression of a specific or isolated event. This event can be an improvised explosive device attack or IED, small arms fire engagement or SAF engagement with a hostile force, or any other event a specific unit documented and recorded in real time." />
                      <outline text="In my perspective the information contained within a single SigAct or group of SigActs is not very sensitive. The events encapsulated within most SigActs involve either enemy engagements or causalities. Most of this information is publicly reported by the public affairs office or PAO, embedded media pools, or host nation HN media." />
                      <outline text="As I started working with SigActs I felt they were similar to a daily journal or log that a person may keep. They capture what happens on a particular day in time. They are created immediately after the event, and are potentially updated over a period of hours until final version is published on the Combined Information Data Network Exchange. Each unit has it&apos;s own Standard Operating Procedure or SOP for reporting recording SigActs. The SOP may differ between reporting in a particular deployment and reporting in garrison." />
                      <outline text="In garrison a SigAct normally involves personnel issues such as driving under the influence or DUI incidents or an automobile accident involving the death or serious injury of a soldier. The reports starts at the company level and goes up to the battalion, brigade, and even up to the division level." />
                      <outline text="In deployed environment a unit may observe or participate in an event and a platoon leader or platoon sergeant may report the event as a SigAct to the company headquarters and the radio transmission operator or RTO. The commander or RTO will then forward the report to the battalion battle captain or battle non-commissioned officer or NCO. Once the battalion battle captain or battle NCO receives the report they will either (1) notify the battalion operations officer or S3; (2) conduct an action, such as launching a quick reaction force; or (3) record the event and report and further report it up the chain of command to the brigade." />
                      <outline text="The reporting of each event is done by radio or over the Secret Internet Protocol Router Network or SIPRNet, normally by an assigned soldier, usually junior enlisted E-4 and below. Once the SigAct is recorded, the SigAct is further sent up the chain of command. At each level, additional information can either be added or corrected as needed. Normally within 24 to 48 hours, the updating and reporting or a particular SigAct is complete. Eventually all reports and SigActs go through the chain of command from brigade to division and division to corp. At corp level the SigAct is finalized and [missed word]." />
                      <outline text="The CIDNE system contains a database that is used by thousands of Department of Defense--DoD personel including soldiers, civilians, and contractors support. It was the United States Central Command or CENTCOM reporting tool for operational reporting in Iraq and Afghanistan. Two separate but similar databases were maintained for each theater-- CIDNE-I for Iraq and CIDNE-A for Afghanistan. Each database encompasses over a hundred types of reports and other historical information for access. They contain millions of vetted and finalized directories including operational intelligence reporting." />
                      <outline text="CIDNE was created to collect and analyze battle-space data to provide daily operational and Intelligence Community (IC) reporting relevant to a commander&apos;s daily decision making process. The CIDNE-I and CIDNE-A databases contain reporting and analysis fields for multiple disciplines including Human Intelligence or HUMINT reports, Psychological Operations or PSYOP reports, Engagement reports, Counter Improvised Explosive Device or CIED reports, SigAct reports, Targeting reports, Social and Cultural reports, Civil Affairs reports, and Human Terrain reporting." />
                      <outline text="As an intelligence analyst, I had unlimited access to the CIDNE-I and CIDNE-A databases and the information contained within them. Although each table within the database is important, I primarily dealt with HUMINT reports, SigAct reports and Counter IED reports, because these reports were used to create a work-product I was required to published as an analyst." />
                      <outline text="In working on an assignment I looked anywhere and everywhere for information. As an all-source analyst, this was something that was expected. The D6-A systems had databases built in, and I utilized them on a daily basis. This simply was--the search tools available on the D6-A systems on SIPRNet such as Query Tree and the DoD and Intellink search engines." />
                      <outline text="Primarily, I utilized the CIDNE database using the historical and HUMINT reporting to conduct my analysis and provide a back up for my work product. I did statistical analysis on historical data including SigActs to back up analysis that were based on HUMINT reporting and produce charts, graphs, and tables. I also created maps and charts to conduct predictive analysis based on statistical trends. The SigAct reporting provided a reference point for what occurred and provided myself and other analysts with the information to conclude possible outcome." />
                      <outline text="Although SigAct reporting is sensitive at the time of their creation, their sensitivity normally dissipates within 48 to 72 hours as the information is either publicly released or the unit involved is no longer in the area and not in danger." />
                      <outline text="It is my understanding that the SigAct reports remain classified only because they are maintained within CIDNE-- because it is only accessible on SIPRnet. Everything on CIDNE-I and CIDNE-A to include SigAct reporting was treated as classified information." />
                      <outline text="Facts regarding the storage of SigAct Reports." />
                      <outline text="As part of my training at Fort Drum, I was instructed to ensure that I create back ups of my work product. The need to create back ups was particularly acute given the relative instability and reliability of the computer systems we used in the field during deployment. These computer systems included both organic and theater provided equipment (TPE) D6-A machines." />
                      <outline text="The organic D6-A machines we brought with us into the field on our deployment were Dell [missed word] laptops and the TPE D6-A machines were Alienware brand laptops. The [M90?] D6-A laptops were the preferred machine to use as they were slightly faster and had fewer problems with dust and temperature than the theater provided Alienware laptops. I used several D6-A machines during the deployment due to various technical problems with the laptops." />
                      <outline text="With these issues several analysts lost information, but I never lost information due to the multiple backups I created. I attempted to backup as much relevant information as possible. I would save the information so that I or another analyst could quickly access it whenever a machine crashed, SIPRnet connectivity was down, or I forgot where the data was stored." />
                      <outline text="When backing up information I would do one or all of the following things based on my training:" />
                      <outline text="[(1)] Physical back up. I tried to keep physical back up copies of information on paper so that the information could be grabbed quickly. Also, it was easier to brief from hard copies of research and HUMINT reports." />
                      <outline text="(2) Local drive back up. I tried to sort out information I deemed relevant and keep complete copies of the information on each of the computers I used in the Temporary Sensitive Compartmented Information Facility or T-SCIF, including my primary and secondary D6-A machines. This was stored under my user profile on the desktop." />
                      <outline text="[(3)] Shared drive backup. Each analyst had access to a &apos;T&apos; drive-- what we called &apos;T&apos; drive shared across the SIPRnet. It allowed others to access information that was stored on it. S6 operated the &apos;T&apos; drive." />
                      <outline text="[(4)] Compact disk rewritable or CD-RW back up. For larger datasets I saved the information onto a re-writable disk, labeled the disks, and stored them in the conference room of the T-SCIF. This redundancy permitted us to not worry about information loss. If the system crashed, I could easily pull the information from a secondary computer, the &apos;T&apos; drive, or one of the CD-RWs." />
                      <outline text="If another analysts wanted to access my data, but I was unavailable she could find my published products directory on the &apos;T&apos; drive or on the CD-RWs. I sorted all of my products or research by date, time, and group; and updated the information on each of the storage methods to ensure that the latest information was available to them." />
                      <outline text="During the deployment I had several of the D6-A machines crash on me. Whenever one of the computer crashed, I usually lost information but the redundancy method ensured my ability to quickly restore old backup data and add my current information to the machine when it was repaired or replaced." />
                      <outline text="I stored the backup CD-RW with larger datasets in the conference room of the T-SCIF or next to my workstation. I marked the CD-RWs based on the classification level and its content. Unclassified CD-RWs were only labeled with the content type and not marked with classification markings. Early on in the deployment, I only saved and stored the SigActs that were within or near operational environment." />
                      <outline text="Later I thought it would be easier to just to save all of the SigActs onto a CD-RW. The process would not take very long to complete and so I downloaded the SigActs from CIDNE-I onto a CD-RW. After finishing with CIDNE-I, I did the same with CIDNE-A. By retrieving the CIDNE-I and CIDNE-A SigActs I was able to retrieve the information whenever I needed it, and not rely upon the unreliable and slow SIPRnet connectivity needed to pull. Instead, I could just find the CD-RW and open up a pre-loaded spreadsheet." />
                      <outline text="This process began in late December 2009 and continued through early January 2010. I could quickly export one month of the SigAct data at a time and download in the background as I did other tasks." />
                      <outline text="The process took approximately a week for each table. After downloading the SigAct tables, I periodically updated them, by pulling the most recent SigActs and simply copying them and pasting them into the database saved on the CD-RW. I never hid the fact that I had downloaded copies of both the SigAct tables from CIDNE-I and CIDNE-A. They were stored on appropriately labeled and marked CD-RW, stored in the open." />
                      <outline text="I viewed this the saving copies of CIDNE-I and CIDNE-A as for both for my use and the use of anyone within the S2 section during the SIPRnet connectivity issues." />
                      <outline text="In addition to the SigAct tables, I had a large repository of HUMINT reports and Counter IED reports downloaded from CIDNE-I. These contained reports that were relevant to the area in and around our operational environment in Eastern Baghdad and the Diyala Province of Iraq." />
                      <outline text="In order to compress the data to fit onto a CD-RW, I used a compression algorithm called &apos;bzip2&apos;. The program used to compress the data is called &apos;WinRAR&apos;. WinRAR is an application that is free, and can be easily downloaded from the internet via the Non-Secure Internet Relay Protocol Network or NIPRnet. I downloaded WinRAR on NIPRnet and transfered it to the D6-A machine user profile desktop using a CD-RW. I did not try to hide the fact that I was downloading WinRAR onto my SIPRnet D6-A machine or computer." />
                      <outline text="With the assistance of the bzip2 algorithm using the WinRAR program, I was able to fit All of the SigActs onto a single CD-RW and relevant HUMINT and Counter ID reports onto a separate CD-RW." />
                      <outline text="Facts regarding my knowledge of the WikiLeaks Organization or WLO." />
                      <outline text="I first became vaguely aware of the WLO during my AIT at Fort Huachuca, Arizona, although I did not fully pay attention until the WLO released purported Short Messaging System or SMS messages from 11 September 2001 on 25 November 2009. At that time references to the release and the WLO website showed up in my daily Google news open source search for information related to US foreign policy." />
                      <outline text="The stories were about how WLO published about approximately 500,000 messages. I then reviewed the messages myself and realized that the posted messages were very likely real given the sheer volume and detail of the content." />
                      <outline text="After this, I began conducting research on WLO. I conducted searched on both NIPRnet and SIPRnet on WLO beginning in late November 2009 and early December 2009. At this time I also began to routinely monitor the WLO website. In response to one of my searches in 2009, I found the United States Army Counter Intelligence Center or USACIC report on the WikiLeaks organization. After reviewing the report, I believed that this report was possibly the one that my AIT referenced in early 2008." />
                      <outline text="I may or may not have saved the report on my D6-A workstation. I know I reviewed the document on other occasions throughout early 2010, and saved it on both my primary and secondary laptops. After reviewing the report, I continued doing research on WLO. However, based upon my open-source collection, I discovered information that contradicted the 2008 USACIC report including information that indicated that similar to other press agencies, WLO seemed to be dedicated to exposing illegal activities and corruption." />
                      <outline text="WLO received numerous award and recognition for its reporting activities. Also, in reviewing the WLO website, I found information regarding US military SOPs for Camp Delta at Guantanamo Bay, Cuba and information on the then outdated rules of engagement for ROE in Iraq for cross-border pursuits of former members of Saddam Hussein [missed word] government." />
                      <outline text="After seeing the information available on the WLO website, I continued following it and collecting open sources information from it. During this time period, I followed several organizations and groups including wire press agencies such as the Associated Press and Reuters and private intelligence agencies including Strategic Forecasting or Stratfor. This practice was something I was trained to do during AIT, and was something that good analysts were expected to do." />
                      <outline text="During the searches of WLO, I found several pieces of information that I found useful in my work product in my work as an analyst, specifically I recall WLO publishing documents related to weapons trafficking between two nations that affected my OP. I integrated this information into one or more of my work products." />
                      <outline text="In addition to visiting the WLO website, I began following WLO using Instand Relay Chat or IRC Client called &apos;XChat&apos; sometime in early January 2010." />
                      <outline text="IRC is a protocol for real time internet communications by messaging and conferencing, colloquially referred to as chat rooms or chats. The IRC chat rooms are designed for group communication discussion forums. Each IRC chat room is called a channel-- similar to a Television where you can tune in or follow a channel-- so long as it is open and does not require [missed word]." />
                      <outline text="Once you [missed word] a specific IRC conversation, other users in the conversation can see that you have joined the room. On the Internet there are millions of different IRC channels across several services. Channel topics span a range of topics covering all kinds of interests and hobbies. The primary reason for following WLO on IRC was curiosity-- particularly in regards to how and why they obtained the SMS messages referenced above. I believed that collecting information on the WLO would assist me in this goal." />
                      <outline text="Initially I simply observed the IRC conversations. I wanted to know how the organization was structured, and how they obtained their data. The conversations I viewed were usually technical in nature but sometimes switched to a lively debate on issue the particular individual may have felt strongly about." />
                      <outline text="Over a period of time I became more involved in these discussions especially when conversations turned to geopolitical events and information technology topics, such as networking and encryption methods. Based on these observations, I would describe the WL organization as almost academic in nature. In addition to the WLO conversations, I participated in numerous other IRC channels acros at least three different networks. The other IRC channels I participated in normally dealt with technical topics including with Linux and Berkley Secure Distribution BSD operating systems or OS&apos;s, networking, encryption algorithms and techniques and other more political topics, such as politics and [missed word]." />
                      <outline text="I normally engaged in multiple IRC conversations simultaneously--mostly publicly, but often privately. The XChat client enabled me to manage these multiple conversations across different channels and servers. The screen for XChat was often busy, but its screens enabled me to see when something was interesting. I would then select the conversation and either observe or participate." />
                      <outline text="I really enjoyed the IRC conversations pertaining to and involving the WLO, however, at some point in late February or early March of 2010, the WLO IRC channel was no longer accessible. Instead, regular participants of this channel switched to using the Jabber server. Jabber is another internet communication [missed word] similar but more sophisticated than IRC." />
                      <outline text="The IRC and Jabber conversations, allowed me to feel connected to others even when alone. They helped pass the time and keep motivated throughout the deployment." />
                      <outline text="Facts regarding the unauthorized storage and disclosure of the SigActs." />
                      <outline text="As indicated above I created copies of the CIDNE-I and CIDNE-A SigAct tables as part of the process of backing up information. At the time I did so, I did not intend to use this information for any purpose other than for back up. However, I later decided to release this information publicly. At that time, I believe and still believe that these tables are two of the most significant documents of our time." />
                      <outline text="On 8 January 2010, I collected the CD-RW I stored in the conference room of the T-SCIF and placed it into the cargo pocket of my ACU or Army Combat Uniform. At the end of my shift, I took the CD-RW out of the T-SCIF and brought it to my Containerized Housing Unit of CHU. I copied the data onto my personal laptop. Later at the beginning of my shift, I returned the CD-RW back to the conference room of the T-SCIF. At the time I saved the SigActs to my laptop, I planned to take them with me on mid-tour leave and decide what to do with them." />
                      <outline text="At some point prior to my mid-tour, I transfered the information from my computer to a Secure Digital memory card from my digital camera. The SD card for the camera also worked on my computer and allowed me to store the SigAct tables in a secure manner for transport." />
                      <outline text="I began mid-tour leave on 23 January 2010, flying from Atlanta, Georgia to Reagan National Airport in Virginia. I arrived at the home of my aunt, Debra M. Van Alstyne, in Potomac, Maryland and quickly got into contact with my then boyfriend, Tyler R. Watkins. Tyler, then a student at Brandeis University in Waltham, Massachusetts, and I made plans for me to visit him him Boston, Massachusetts [missed word]." />
                      <outline text="I was excited to see Tyler and planned on talking to Tyler about where our relationship was going and about my time in Iraq. However, when I arrived in the Boston area Tyler and I seemed to become distant. He did not seem very excited about my return from Iraq. I tried talking to him about our relationship but he refused to make any plans." />
                      <outline text="I also tried to raising the topic of releasing the CIDNE-I and CIDNE-A SigAct tables to the public. I asked Tyler hypothetical questions about what he would do if he had documents that he thought the public needed access to. Tyler really didn&apos;t have a specific answer for me. He tried to answer the questions and be supportive, but seemed confused by the question in this context." />
                      <outline text="I then tried to be more specific, but he asked too many questions. Rather than try to explain my dilemma, I decided to just drop the conversation. After a few days in Waltham, I began to feel really bad. I was over staying my welcome, and I returned to Maryland. I spent the remainder of my time on leave in the Washington, DC area." />
                      <outline text="During this time a blizzard bombarded the mid-atlantic, and I spent a significant period of time essentially stuck in my aunt&apos;s house in Maryland. I began to think about what I knew and the information I still had in my possession. For me, the SigActs represented the on the ground reality of both the conflicts in Iraq and Afghanistan." />
                      <outline text="I felt that we were risking so much for people that seemed unwilling to cooperate with us, leading to frustration and anger on both sides. I began to become depressed with the situation that we found ourselves increasingly mired in year after year. The SigActs documented this in great detail and provide a context of what we were seeing on the ground." />
                      <outline text="In attempting to conduct counter-terrorism or CT and counter-insurgency COIN operations we became obsessed with capturing and killing human targets on lists and not being suspicious of and avoiding cooperation with our Host Nation partners, and ignoring the second and third order effects of accomplishing short-term goals and missions. I believe that if the general public, especially the American public, had access to the information contained within the CIDNE-I and CIDNE-A tables this could spark a domestic debate on the role of the military and our foreign policy in general as [missed word] as it related to Iraq and Afghanistan." />
                      <outline text="I also believed the detailed analysis of the data over a long period of time by different sectors of society might cause society to reevaluate the need or even the desire to even to engage in counterterrorism and counterinsurgency operations that ignore the complex dynamics of the people living in the effected environment everyday." />
                      <outline text="At my aunt&apos;s house I debated what I should do with the SigActs-- in particular whether I should hold on to them-- or expose them through a press agency. At this point I decided that it made sense to try to expose the SigAct tables to an American newspaper. I first called my local news paper, The Washington Post, and spoke with a woman saying that she was a reporter. I asked her if the Washington Post would be interested in receiving information that would have enormous value to the American public." />
                      <outline text="Although we spoke for about five minutes concerning the general nature of what I possessed, I do not believe she took me seriously. She informed me that the Washington Post would possibly be interested, but that such decisions were made only after seeing the information I was referring to and after consideration by senior editors." />
                      <outline text="I then decided to contact [missed word] the most popular newspaper, The New York Times. I called the public editor number on The New York Times website. The phone rang and was answered by a machine. I went through the menu to the section for news tips. I was routed to an answering machine. I left a message stating I had access to information about Iraq and Afghanistan that I believed was very important. However, despite leaving my Skype phone number and personal email address, I never received a reply from The New York Times." />
                      <outline text="I also briefly considered dropping into the office for the Political Commentary blog, Politico, however the weather conditions during my leave hampered my efforts to travel. After these failed efforts I had ultimately decided to submit the materials to the WLO. I was not sure if the WLO would actually publish these SigAct tables [missed a few words]. I was concerned that they might not be noticed by the American media. However, based upon what I read about the WLO through my research described above, this seemed to be the best medium for publishing this information to the world within my reach." />
                      <outline text="At my aunts house I joined in on an IRC conversation and stated I had information that needed to be shared with the world. I wrote that the information would help document the true cost of the wars in Iraq and Afghanistan. One of the individuals in the IRC asked me to describe the information. However, before I could describe the information another individual pointed me to the link for the WLO web site online submission system. After ending my IRC connection, I considered my options one more time. Ultimately, I felt that the right thing to do was to release the SigActs." />
                      <outline text="On 3 February 2010, I visited the WLO website on my computer and clicked on the submit documents link. Next I found the submit your information online link and elected to submit the SigActs via the onion router or TOR anonymizing network by special link. TOR is a system intended to provide anonymity online. The software routes internet traffic through a network of servers and other TOR clients in order to conceal the user&apos;s location and identity." />
                      <outline text="I was familiar with TOR and had it previously installed on a computer to anonymously monitor the social media website of militia groups operating within central Iraq. I followed the prompts and attached the compressed data files of CIDNE-I and CIDNE-A SigActs. I attached a text file I drafted while preparing to provide the documents to the Washington Post. It provided rough guidelines saying &apos;It&apos;s already been sanitized of any source identifying information. You might need to sit on this information-- perhaps 90 to 100 days to figure out how best to release such a large amount of data and to protect its source. This is possibly one of the more significant documents of our time removing the fog of war and revealing the true nature of twenty-first century asymmetric warfare. Have a good day.&apos;" />
                      <outline text="After sending this, I left the SD card in a camera case at my aunt&apos;s house in the event I needed it again in the future. I returned from mid-tour leave on 11 February 2010. Although the information had not yet been publicly by the WLO, I felt this sense of relief by them having it. I felt I had accomplished something that allowed me to have a clear conscience based upon what I had seen and read about and knew were happening in both Iraq and Afghanistan everyday." />
                      <outline text="Facts regarding the unauthorized storage and disclosure of 10 Reykjavik 13." />
                      <outline text="I first became aware of the diplomatic cables during my training period in AIT. I later learned about the Department of State or DoS Net-centric Diplomacy NCD portal from the 2/10 Brigade Combat Team S2, Captain Steven Lim. Captain Lim sent a section wide email to the other analysts and officer in late December 2009 containing the SIPRnet link to the portal along with the instructions to look at the cables contained within them and to incorporate them into our work product." />
                      <outline text="Shortly after this I also noticed the diplomatic cables were being reported to in products from the corp level US Forces Iraq or US-I. Based upon Captain Lim&apos;s direction to become familiar with its contents, I read virtually every published cable concerning Iraq." />
                      <outline text="I also began scanning the database and reading other random cables that piqued my curiosity. It was around this time-- in early to mid-January of 2010, that I began searching the database for information on Iceland. I became interested in Iceland due to the IRC conversations I viewed in the WLO channel discussing an issue called Icesave. At this time I was not very familiar with the topic, but it seemed to be a big issue for those participating in the conversation. This is when I decided to investigate and conduct a few searches on Iceland and find out more." />
                      <outline text="At the time, I did not find anything discussing the Icesave issue either directly or indirectly. I then conducted an open source search for Icesave. I then learned that Iceland was involved in a dispute with the United Kingdom and the Netherlands concerning the financial collapse of one or more of Iceland&apos;s banks. According to open source reporting much of the public controversy involved the United Kingdom&apos;s use of anti-terrorism legislation against Iceland in order to freeze Icelandic access for payment of the guarantees for UK depositors that lost money." />
                      <outline text="Shortly after returning from mid-tour leave, I returned to the Net Centric Diplomacy portal to search for information on Iceland and Icesave as the topic had not abated on the WLO IRC channel. To my surprise, on 14 February 2010, I found the cable 10 Reykjavik 13, which referenced the Icesave issue directly." />
                      <outline text="The cable published on 13 January 2010 was just over two pages in length. I read the cable and quickly concluded that Iceland was essentially being bullied diplomatically by two larger European powers. It appeared to me that Iceland was out viable options and was coming to the US for assistance. Despite the quiet request for assistance, it did not appear that we were going to do anything." />
                      <outline text="From my perspective it appeared that we were not getting involved due to the lack of long term geopolitical benefit to do so. After digesting the contents of 10 Reykjavik 13 I debated whether this was something I should send to the WLO. At this point the WLO had not published or acknowledged receipt of the CIDNE-I and CIDNE-A tables. Despite not knowing that the SigActs were a priority for the WLO, I decided the cable was something that would be important. I felt that I would be able to right a wrong by having them publish this document. I burned the information onto a CD-RW on 15 February 2010, took it to my CHU, and saved it onto my personal laptop." />
                      <outline text="I navigated to the WLO website via a TOR connection like before and uploaded the document via the secure form. Amazingly, when WLO published 10 Reykjavik 13 within hours, proving that the form worked and that they must have received the SigAct tables." />
                      <outline text="Facts regarding the unauthorized storage and disclosure of the 12 July 2007 aerial weapons team or AW team video." />
                      <outline text="During the mid-February 2010 time frame the 2nd Brigade Combat Team, 10th Mountain Division targeting analysts, then Specialist Jihrleah W. Showman discussed a video that Ms. Showman had found on the &apos;T&apos; drive." />
                      <outline text="The video depicted several individuals being engaged by an aerial weapons team. At first I did not consider the video very special, as I have viewed countless other war porn type videos depicting combat. However, the recording of audio comments by the aerial weapons team crew and the second engagement in the video of an unarmed bongo truck troubled me." />
                      <outline text="As Showman and a few other analysts and officers in the T-SCIF commented on the video and debated whether the crew violated the rules of engagement or ROE in the second engagement, I shied away from this debate, instead conducting some research on the event. I wanted to learn what happened and whether there was any background to the events of the day that the event occurred, 12 July 2007." />
                      <outline text="Using Google I searched for the event by its date by its general location. I found several new accounts involving two Reuters employees who were killed during the aerial weapon team engagement. Another story explained that Reuters had requested for a copy of the video under the Freedom of Information Act or FOIA. Reuters wanted to view the video in order to understand what had happened and to improve their safety practices in combat zones. A spokesperson for Reuters was quoted saying that the video might help avoid the reoccurrence of the tragedy and believed there was a compelling need for the immediate release of the video." />
                      <outline text="Despite the submission of the FOIA request, the news account explained that CENTCOM replied to Reuters stating that they could not give a time frame for considering a FOIA request and that the video might no longer exist. Another story I found written a year later said that even though Reuters was still pursuing their request. They still did not receive a formal response or written determination in accordance with FOIA." />
                      <outline text="The fact neither CENTCOM or Multi National Forces Iraq or MNF-I would not voluntarily release the video troubled me further. It was clear to me that the event happened because the aerial weapons team mistakenly identified Reuters employees as a potential threat and that the people in the bongo truck were merely attempting to assist the wounded. The people in the van were not a threat but merely &apos;good samaritans&apos;. The most alarming aspect of the video to me, however, was the seemly delightful bloodlust they appeared to have." />
                      <outline text="The dehumanized the individuals they were engaging and seemed to not value human life by referring to them as quote &quot;dead bastards&quot; unquote and congratulating each other on the ability to kill in large numbers. At one point in the video there is an individual on the ground attempting to crawl to safety. The individual is seriously wounded. Instead of calling for medical attention to the location, one of the aerial weapons team crew members verbally asks for the wounded person to pick up a weapon so that he can have a reason to engage. For me, this seems similar to a child torturing ants with a magnifying glass." />
                      <outline text="While saddened by the aerial weapons team crew&apos;s lack of concern about human life, I was disturbed by the response of the discovery of injured children at the scene. In the video, you can see that the bongo truck driving up to assist the wounded individual. In response the aerial weapons team crew-- as soon as the individuals are a threat, they repeatedly request for authorization to fire on the bongo truck and once granted they engage the vehicle at least six times." />
                      <outline text="Shortly after the second engagement, a mechanized infantry unit arrives at the scene. Within minutes, the aerial weapons team crew learns that children were in the van and despite the injuries the crew exhibits no remorse. Instead, they downplay the significance of their actions, saying quote &apos;Well, it&apos;s their fault for bringing their kid&apos;s into a battle&apos; unquote." />
                      <outline text="The aerial weapons team crew members sound like they lack sympathy for the children or the parents. Later in a particularly disturbing manner, the aerial weapons team verbalizes enjoyment at the sight of one of the ground vehicles driving over a body-- or one of the bodies. As I continued my research, I found an article discussing the book, The Good Soldiers, written by Washington Post writer David Finkel." />
                      <outline text="In Mr. Finkel book, he writes about the aerial weapons team attack. As, I read an online excerpt in Google Books, I followed Mr. Finkel&apos;s account of the event belonging to the video. I quickly realize that Mr. Finkel was quoting, I feel in verbatim, the audio communications of the aerial weapons team crew." />
                      <outline text="It is clear to me that Mr. Finkel obtained access and a copy of the video during his tenue as an embedded journalist. I was aghast at Mr. Finkel&apos;s portrayal of the incident. Reading his account, one would believe the engagement was somehow justified as &apos;payback&apos; for an earlier attack that lead to the death of a soldier. Mr. Finkel ends his account by discussing how a soldier finds an individual still alive from the attack. He writes that the soldier finds him and sees him gesture with his two forefingers together, a common method in the Middle East to communicate that they are friendly. However, instead of assisting him, the soldier makes an obscene gesture extending his middle finger." />
                      <outline text="The individual apparently dies shortly thereafter. Reading this, I can only think of how this person was simply trying to help others, and then he quickly finds he needs help as well. To make matter worse, in the last moments of his life, he continues to express his friendly gesture-- only to find himself receiving this well known gesture of unfriendliness. For me it&apos;s all a big mess, and I am left wondering what these things mean, and how it all fits together. It burdens me emotionally." />
                      <outline text="I saved a copy of the video on my workstation. I searched for and found the rules of engagement, the rules of engagement annexes, and a flow chart from the 2007 time period-- as well as an unclassified Rules of Engagement smart card from 2006. On 15 February 2010 I burned these documents onto a CD-RW, the same time I burned the 10 Reykjavik 13 cable onto a CD-RW. At the time, I placed the video and rules for engagement information onto my personal laptop in my CHU. I planned to keep this information there until I redeployed in Summer 2010. I planned on providing this to the Reuters office in London to assist them in preventing events such as this in the future." />
                      <outline text="However, after the WLO published 10 Reykjavik 13 I altered my plans. I decided to provide the video and the rules of engagement to them so that Reuters would have this information before I re-deployed from Iraq. On about 21 February 2010, I described above, I used the WLO submission form and uploaded the documents. The WLO released the video on 5 April 2010. After the release, I was concern about the impact of the video and how it would been received by the general public." />
                      <outline text="I hoped that the public would be as alarmed as me about the conduct of the aerial weapons team crew members. I wanted the American public to know that not everyone in Iraq and Afghanistan are targets that needed to be neutralized, but rather people who were struggling to live in the pressure cooker environment of what we call asymmetric warfare. After the release I was encouraged by the response in the media and general public, who observed the aerial weapons team video. As I hoped, others were just as troubled-- if not more troubled that me by what they saw." />
                      <outline text="At this time, I began seeing reports claiming that the Department of Defense an CENTCOM could not confirm the authenticity of the video. Additionally, one of my supervisors, Captain Casey Fulton, stated her belief that the video was not authentic. In her response, I decided to ensure that the authenticity of the video would not be questioned in the future. On 25 February 2010, I emailed Captain Fulton, a link to the video that was on our &apos;T&apos; drive, and a copy of the video published by WLO that was collected by the open source center, so she could compare them herself." />
                      <outline text="Around this time frame, I burned a second CD-RW containing the aerial weapons team video. In order to made it appear authentic, I placed a classification sticker and wrote Reuters FOIA REQ on its face. I placed the CD-RW in one of my personal CD cases containing a set of &apos;Starting Out in Arabic CD&apos;s.&apos; I planned on mailing out the CD-RW to Reuters after our re-deployment, so they could have a copy that was unquestionably authentic." />
                      <outline text="Almost immediately after submitting the aerial weapons team video and rules of engagement documents I notified the individuals in the WLO IRC to expect an important submission. I received a response from an individual going by the handle of &apos;ox&apos;-- at first our conversations were general in nature, but over time as our conversations progressed, I accessed this individual to be an important part of the WLO." />
                      <outline text="Due to the strict adherence of anonymity by the WLO, we never exchanged identifying information. However, I believe the individual was likely Mr. Julian Assange [he pronounced it with three syllables], Mr. Daniel Schmidt, or a proxy representative of Mr. Assange and Schmidt." />
                      <outline text="As the communications transfered from IRC to the Jabber client, I gave &apos;ox&apos; and later &apos;pressassociation&apos; the name of Nathaniel Frank in my address book, after the author of a book I read in 2009." />
                      <outline text="After a period of time, I developed what I felt was a friendly relationship with Nathaniel. Our mutual interest in information technology and politics made our conversations enjoyable. We engaged in conversation often. Sometimes as long as an hour or more. I often looked forward to my conversations with Nathaniel after work." />
                      <outline text="The anonymity that was provided by TOR and the Jabber client and the WLO&apos;s policy allowed me to feel I could just be myself, free of the concerns of social labeling and perceptions that are often placed upon me in real life. In real life, I lacked a closed friendship with the people I worked with in my section, the S2 section." />
                      <outline text="In my section, the S2 section supported battalions and the 2nd Brigade Combat Team as a whole. For instance, I lacked close ties with my roommate to his discomfort regarding my perceived sexual orientation. Over the next few months, I stayed in frequent contact with Nathaniel. We conversed on nearly a daily basis and I felt that we were developing a friendship." />
                      <outline text="Conversations covered many topics and I enjoyed the ability to talk about pretty much everything, and not just the publications that the WLO was working on. In retrospect that these dynamics were artificial and were valued more by myself than Nathaniel. For me these conversations represented an opportunity to escape from the immense pressures and anxiety that I experienced and built up through out the deployment. It seems that as I tried harder to fit in at work, the more I seemed to alienate my peers and lose respect, trust, and support I needed." />
                      <outline text="Facts regarding the unauthorized storage and disclosure of documents related to the detainments by the Iraqi Federal Police or FP, and the Detainee Assessment Briefs, and the USACIC United States Army Counter Intelligence Center report." />
                      <outline text="On 27 February 2010, a report was received from a subordinate battalion. The report described an event in which the Federal Police or FP detained 15 individuals for printing anti-Iraqi literature. On 2 March 2010, I received instructions from an S3 section officer in the 2nd Brigade Combat Team, 10th Mountain Division Tactical Operation Center or TOC to investigate the matter, and figure out who the quote &apos;bad guys&apos; unquote were and how significant this event was for the Federal Police." />
                      <outline text="Over the course of my research I found that none of the individuals had previous ties to anti-Iraqi actions or suspected terrorist militia groups. A few hours later, I received several [playlist?] from the scene-- from this subordinate battalion. They were accidentally sent to an officer on a different team on the S2 section and she forwarded them to me." />
                      <outline text="These photos included picture of the individuals, pallets of unprinted paper and seized copies of the final printed material or the printed document; and a high resolution photo of the printed material itself. I printed up one [missed word] copy of a high resolution photo-- I laminated it for ease of use and transfer. I then walked to the TOC and delivered the laminated copy to our category two interpreter." />
                      <outline text="She reviewed the information and about a half and hour later delivered a rough written transcript in English to the S2 section. I read the transcript and followed up with her, asking her for her take on the content. She said it was easy for her to transcribe verbatim, since I blew up the photograph and laminated it. She said the general nature of the document was benign. The document, as I had sensed as well, was merely a scholarly critique of the then current Iraqi Prime Minister Nouri al-Maliki." />
                      <outline text="It detailed corruption within the cabinet of al-Maliki&apos;s government and the financial impact of his corruption on the Iraqi people. After discovering this discrepancy between the Federal Police&apos;s report and the interpreter&apos;s transcript, I forwarded this discovery to the top OIC and the battle NCOIC. The top OIC and the overhearing battle captain informed me that they didn&apos;t need or want to know this information anymore. They told me to quote &quot;drop it&quot; unquote and to just assist them and the Federal Police in finding out, where more of these print shops creating quote&apos; anti-Iraqi literature&apos; unquote." />
                      <outline text="I couldn&apos;t believe what I heard and I returned to the T-SCIF and complained to the other analysts and my section NCOIC about what happened. Some were sympathetic, but no one wanted to do anything about it." />
                      <outline text="I am the type of person who likes to know how things work. And, as an analyst, this means I always want to figure out the truth. Unlike other analysts in my section or other sections within the 2nd Brigade Combat Team, I was not satisfied with just scratching the surface and producing canned or cookie cutter assessments. I wanted to know why something was the way it was, and what we could to correct or mitigate a situation." />
                      <outline text="I knew that if I continued to assist the Baghdad Federal Police in identifying the political opponents of Prime Minister al-Maliki, those people would be arrested and in the custody of the Special Unit of the Baghdad Federal Police and very likely tortured and not seen again for a very long time-- if ever." />
                      <outline text="Instead of assisting the Special Unit of the Baghdad Federal Police, I decided to take the information and expose it to the WLO, in the hope that before the upcoming 7 March 2010 election, they could generate some immediate press on the issue and prevent this unit of the Federal Police from continuing to crack down in political opponents of al-Maliki." />
                      <outline text="On 4 March 2010, I burned the report, the photos, the high resolution copy of the pamphlet, and the interpreters hand written transcript onto a CD-RW. I took the CD-RW to my CHU and copied the data onto my personal computer. Unlike the times before, instead of uploading the information through the WLO website submission form. I made a Secure File Transfer Protocol or SFTP connection to a file drop box operated by the WLO." />
                      <outline text="The drop box contained a folder that allowed me to upload directly into it. Saving files into this directory. Allowed anyone with log in access to server to view and download them. After uploading these files to the WLO, on 5 March 2010, I notified Nathaniel over Jabber. Although sympathetic, he said that the WLO needed more information to confirm the event in order for it to be published or to gain interest in the international media." />
                      <outline text="I attempted to provide the specifics, but to my disappointment, the WLO website chose not to publish this information. At the same time, I began sifting through information from the US Southern Command or SOUTHCOM and Joint Task Force Guantanamo, Cuba or JTF-GTMO. The thought occurred to me-- although unlikely, that I wouldn&apos;t be surprised if the individuals detainees by the Federal Police might be turned over back into US custody-- and ending up in the custody of Joint Task Force Guantanamo." />
                      <outline text="As I digested through the information on Joint Task Force Guantanamo, I quickly found the Detainee Assessment Briefs or DABs. I previously came across the document&apos;s before in 2009 but did not think much about them. However, this time I was more curious in this search and I found them again." />
                      <outline text="The DABs were written in standard DoD memorandum format and addressed the commander US SOUTHCOM. Each memorandum gave basic and background information about a detainee held at some point by Joint Task Force Guantanamo. I have always been interested on the issue of the moral efficacy of our actions surrounding Joint Task Force Guantanamo. On the one hand, I have always understood the need to detain and interrogate individuals who might wish to harm the United States and our allies, however, I felt that what we were trying to do at Joint Task Force Guantanamo." />
                      <outline text="However, the more I became educated on the topic, it seemed that we found ourselves holding an increasing number of individuals indefinitely that we believed or knew to be innocent, low level foot soldiers that did not have useful intelligence and would be released if they were still held in theater." />
                      <outline text="I also recall that in early 2009 the, then newly elected president, Barack Obama, stated that he would close Joint Task Force Guantanamo, and that the facility compromised our standing over all, and diminished our quote &apos;moral authority&apos; unquote." />
                      <outline text="After familiarizing myself with the Detainee Assessment Briefs, I agree. Reading through the Detainee Assessment Briefs, I noticed that they were not analytical products, instead they contained summaries of tear line versions of interim intelligence reports that were old or unclassified. None of the DABs contained the names of sources or quotes from tactical interrogation reports or TIR&apos;s. Since the DABs were being sent to the US SOUTHCOM commander, I assessed that they were intended to provide very general background information on each of the detainees and not a detailed assessment." />
                      <outline text="In addition to the manner in which the DAB&apos;s were written, I recognized that they were at least several years old, and discussed detainees that were already released from Joint Task Force Guantanamo. Based on this, I determined that the DAB&apos;s were not very important fro either an intelligence or a national security standpoint. On 7 March 2010, during my Jabber conversation with Nathaniel, I asked him if he thought the DAB&apos;s were of any use to anyone." />
                      <outline text="Nathaniel indicated, although he did not believe that they were of political significance, he did believe that they could be used to merge into the general historical account of what occurred at Joint Task Force Guantanamo. He also thought that the DAB&apos;s might be helpful to the legal counsel of those currently and previously held at JTF-GTMO." />
                      <outline text="After this discussion, I decided to download the data. I used an application called Wget to download the DAB&apos;s. I downloaded Wget off of the NIPRnet laptop in the T-SCIF, like other programs. I saved that onto a CD-RW, and placed the executable in my &apos;My Documents&apos; directory on my user profile, on the D6-A SIPRnet workstation." />
                      <outline text="On 7 March 2010, I took the list of links for the detainee assessment briefs, and Wget downloaded them sequentially. I burned the data onto a CD-RW, and took it into my CHU, and copied them onto my personal computer. On 8 March 2010, I combined the Detainee Assessment Briefs with the United States Army Counterintelligence Center reports on the WLO, into a compressed IP file. Zip files contain multiple files which are compressed to reduce their size." />
                      <outline text="After creating the zip file, I uploaded the file onto their cloud drop box via Secure File Transfer Protocol. Once these were uploaded, I notified Nathaniel that the information was in the &apos;x&apos; directory, which had been designated for my own use. Earlier that day, I downloaded the USACIC report on WLO." />
                      <outline text="As discussed about, I previously reviewed the report on numerous occasions and although I saved the document onto the work station before, I could not locate it. After I found the document again, I downloaded it to my work station, and saved it onto the same CD-RW as the Detainee Assessment Briefs described above." />
                      <outline text="Although my access included a great deal of information, I decided I had nothing else to send to WLO after sending the Detainee Assessment Briefs and the USACIC report. Up to this point I had sent them the following: the CIDNE-I and CIDNE-A SigActs tables; the Reykjavik 13 Department of State Cable; the 12 July 2007 aerial weapons team video and the 2006-2007 rules of engagement documents; the SigAct report and supporting documents concerning the 15 individuals detained by the Baghdad Federal Police; the USSOUTHCOM and Joint Task Force Guantanamo Detainee Assessment Briefs; a USACIC report on the WikiLeaks website and the WikiLeaks organization." />
                      <outline text="Over the next few weeks I did not send any additional information to the WLO. I continued to converse with Nathaniel over the Jabber client and in the WLO IRC channel. Although I stopped sending documents to WLO, no one associated with the WLO pressures me into giving more information. The decisions that I made to send documents and information to the WLO and the website were my own decisions, and I take full responsibility for my actions." />
                      <outline text="Facts regarding the unauthorized disclosure of Other Government Documents." />
                      <outline text="One 22 March 2010, I downloaded two documents. I found these documents over the course of my normal duties as an analysts. Based on my training and the guidance of my superiors, I look at as much information as possible." />
                      <outline text="Doings so provided me with the ability to make connections that others might miss. On several occasions during the month of March, I accessed information from a Government entity. I read several documents from a section within this Government entity. The content of two of these documents upset me greatly. I had difficulty believing what this section was doing." />
                      <outline text="On 22 March 2010, I downloaded the two documents that I found troubling. I compressed them into a zip file named blah.zip and burned them onto a CD-RW. I took the CD-RW to my CHU and saved the file to my personal computer." />
                      <outline text="I uploaded the information to the WLO website using the designated prompts." />
                      <outline text="Facts regarding the unauthorized storage and disclosure of the Net Centric Diplomacy Department of State Cables." />
                      <outline text="In late March of 2010, I received a warning over Jabber from Nathaniel, that the WLO website would be publishing the aerial weapons team video. He indicated that the WLO would be very busy and the frequency and intensity of our Jabber conversations decrease significantly. During this time, I had nothing but work to distract me." />
                      <outline text="I read more of the diplomatic cables published on the Department of State Net Centric Diplomacy. With my insatiable curiosity and interest in geopolitics I became fascinated with them. I read not only the cables on Iraq, but also about countries and events that I found interesting." />
                      <outline text="The more I read, the more I was fascinated with the way that we dealt with other nations and organizations. I also began to think the documented backdoor deals and seemingly criminal activity that didn&apos;t seem characteristic of the de facto leader of the free world." />
                      <outline text="Up to this point,during the deployment, I had issues I struggled with and difficulty at work. Of the documents release, the cables were the only one I was not absolutely certain couldn&apos;t harm the United States. I conducted research on the cables published on the Net Centric Diplomacy, as well as how Department of State cables worked in general." />
                      <outline text="In particular, I wanted to know how each cable was published on SIRPnet via the Net Centric Diplomacy. As part of my open source research, I found a document published by the Department of State on its official website." />
                      <outline text="The document provided guidance on caption markings for individual cables and handling instructions for their distribution. I quickly learned the caption markings clearly detailed the sensitivity of the Department of State cables. For example, NODIS or No Distribution was used for messages at the highest sensitivity and were only distributed to the authorized recipients." />
                      <outline text="The SIPDIS or SIPRnet distribution caption was applied only to recording of other information messages that were deemed appropriate for a release for a wide number of individuals. According to the Department of State guidance for a cable to have the SIPDIS [missed word] caption, it could not include other captions that were intended to limit distribution." />
                      <outline text="The SIPDIS caption was only for information that could only be shared with anyone with access to SIPRnet. I was aware that thousands of military personel, DoD, Department of State, and other civilian agencies had easy access to the tables. The fact that the SIPDIS caption was only for wide distribution made sense to me, given that the vast majority of the Net Centric Diplomacy Cables were not classified." />
                      <outline text="The more I read the cables, the more I came to the conclusion that this was the type of information that should become public. I once read a and used a quote on open diplomacy written after the First World War and how the world would be a better place if states would avoid making secret pacts and deals with and against each other." />
                      <outline text="I thought these cables were a prime example of a need for a more open diplomacy. Given all of the Department of State cables that I read, the fact that most of the cables were unclassified, and that all the cables have a SIPDIS caption." />
                      <outline text="I believe that the public release of these cables would not damage the United States, however, I did believe that the cables might be embarrassing, since they represented very honest opinions and statements behind the backs of other nations and organizations." />
                      <outline text="In many ways these cables are a catalogue of cliques and gossip. I believed exposing this information might make some within the Department of State and other government entities unhappy. On 22 March 2010, I began downloading a copy of the SIPDIS cables using the program Wget, described above." />
                      <outline text="I used instances of the Wget application to download the Net Centric Diplomacy cables in the background. As I worked on my daily tasks, the Net centric Diplomacy cables were downloaded from 28 March 2010 to 9 April 2010. After downloading the cables, I saved them on to a CD-RW." />
                      <outline text="These cables went from the earliest dates in Net Centric Diplomacy to 28 February 2010. I took the CD-RW to my CHU on 10 April 2010. I sorted the cables on my personal computer, compressed them using the bzip2 compression algorithm described above, and uploaded them to the WLO via designated drop box described above." />
                      <outline text="On 3 May 2010, I used Wget to download and update of the cables for the months of March 2010 and April 2010 and saved the information onto a zip file and burned it to a CD-RW. I then took the CD-RW to my CHU and saved those to my computer. I later found that the file was corrupted during the transfer. Although I intended to re-save another copy of these cables, I was removed from the T-SCIF on 8 May 2010 after an altercation." />
                      <outline text="Facts regarding the unauthorized storage and disclosure of Garani, Farah Province Afghanistan 15-6 Investigation and Videos." />
                      <outline text="[NB Pfc. Manning plead &apos;not guilty&apos; to the Specification 11, Charge II for the Garani Video as charged by the government, which alleged as November charge date. Read more here.]" />
                      <outline text="In late March 2010, I discovered a US CENTCOM directly on a 2009 airstrike in Afghanistan. I was searching CENTCOM I could use as an analyst. As described above, this was something that myself and other officers did on a frequent basis. As I reviewed the incident and what happened. The airstrike occurred in the Garani village in the Farah Province, Northwestern Afghanistan. It received worldwide press coverage during the time as it was reported that up to 100 to 150 Afghan civilians-- mostly women and children-- were accidentally killed during the airstrike." />
                      <outline text="After going through the report and the [missed word] annexes, I began to review the incident as being similar to the 12 July 2007 aerial weapons team engagements in Iraq. However, this event was noticeably different in that it involved a significantly higher number of individuals, larger aircraft and much heavier munitions. Also, the conclusions of the report are more disturbing than those of the July 2007 incident." />
                      <outline text="I did not see anything in the 15-6 report or its annexes that gave away sensitive information. Rather, the investigation and its conclusions were-- what those involved should have done, and how to avoid an event like this from occurring again." />
                      <outline text="After investigating the report and its annexes, I downloaded the 15-6 investigation, PowerPoint presentations, and several other supporting documents to my D6-A workstation. I also downloaded three zip files containing the videos of the incident. I burned this information onto a CD-RW and transfered it to the personal computer in my CHU. I did later that day or the next day-- I uploaded the information to the WL website this time using a new version of the WLO website submission form." />
                      <outline text="Unlike other times using the submission form above, I did not activate the TOR anonymizer. Your Honor, this concludes my statement and facts for this providence inquiry." />
              </outline>

              <outline text="Biden Advises Shooting Shotgun Through Door - US News &amp; World Report">
                      <outline text="Link to Article" type="link" url="http://www.usnews.com/news/articles/2013/02/28/biden-advises-shooting-shotgun-through-door" />      <outline text="Fri, 01 Mar 2013 03:35" />
                      <outline text="" />
                      <outline text="Vice President Joseph Biden speaks following a roundtable discussion on gun safety at Girard College in Philadelphia, Pa., Feb. 11, 2013." />
                      <outline text="Vice President Joe Biden told Field &amp; Stream magazine in an interview published Monday, &quot;[if] you want to keep someone away from your house, just fire the shotgun through the door.&quot;" />
                      <outline text="Coincidentally, a 22-year-old man in Virginia Beach, Va., was charged Monday with reckless handling of a firearm after doing just that a couple days earlier." />
                      <outline text="Local TV station WAVY 10 reports that the man observed two masked men leaning into his bedroom window. The men allegedly had weapons and told him to close his bedroom door. He stepped outside of his bedroom and did as instructed, then fired his shotgun through the closed door and then several more times at the window." />
                      <outline text="[ENJOY: Political Cartoons About Gun Control]" />
                      <outline text="According to the news report there were no injuries and the suspects were not apprehended by police." />
                      <outline text="Biden&apos;s comments to Field &amp; Stream came as he summarized a hypothetical question in which someone from California pondered &quot;when the end days come&quot; or if there&apos;s an earthquake." />
                      <outline text="Earlier this month, Biden told an interviewer that he had advised his wife, Jill, &quot;if there&apos;s ever a problem, just walk out on the balcony here, walk out and put that double-barrel shotgun and fire two blasts outside the house.&quot;" />
                      <outline text="According to Delaware attorneys contacted by U.S. News, in Biden&apos;s home state it is only legal to use deadly force if there is reason to fear imminent loss of life. Shooting a gun in the air could result in felony reckless endangering and aggravated menacing charges, in addition to misdemeanor charges, the lawyers said." />
                      <outline text="[RELATED: Biden&apos;s Gun Advice Could Land Wife in Jail]" />
                      <outline text="In December, Biden was selected by President Barack Obama to lead a task force on establishing new federal gun control laws. In January, Biden presented Obama will proposals including limiting the bullet capacity of gun magazines and establishing universal background checks for all gun purchases." />
                      <outline text="A spokeswoman for Biden did not immediately respond to a request for comment." />
                      <outline text="More News:" />
              </outline>

              <outline text="Remarks by the First Lady on Walmart and Other American Companies Making Healthy Changes">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/02/28/remarks-first-lady-walmart-and-other-american-companies-making-healthy-c" />        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Fri, 01 Mar 2013 16:56" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the First Lady" />
                      <outline text="For Immediate Release" />
                      <outline text="February 28, 2013" />
                      <outline text=" " />
                      <outline text="REMARKS BY THE FIRST LADY" />
                      <outline text="ON WALMART AND OTHER AMERICAN COMPANIES MAKING HEALTHY CHANGES" />
                      <outline text=" " />
                      <outline text="Walmart Neighborhood Market" />
                      <outline text="Springfield, Missouri " />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text="4:11 P.M. CST" />
                      <outline text=" " />
                      <outline text="MRS. OBAMA:  Thank you all so much.  (Applause.)  You all can rest yourselves.  You don&apos;t have to exercise in front of me just because of Let&apos;s Move. (Laughter.)  " />
                      <outline text=" " />
                      <outline text="I am really thrilled to be here today to celebrate the groundbreaking steps that Walmart has taken to make healthier food more affordable and accessible for American families.  And I want to start by thanking Stephanie for her eloquent and kind introduction.  Again, I got to spend time with Stephanie and a few other parents just sharing the ways, the improvements that Walmart has made -- really impacting their families and their families&apos; dinner tables.  And I just appreciate all of them for willing to spend time with me.  " />
                      <outline text=" " />
                      <outline text="This is the reason why we&apos;re doing this.  We&apos;re trying to make our families stronger.  We&apos;re trying to make it easier to make the healthy choices.  And to see all of this in action here, all the changes that we&apos;ve worked on for so long -- to see them actually coming to fruition is very refreshing." />
                      <outline text=" " />
                      <outline text="And of course, we wouldn&apos;t be doing this if it weren&apos;t for  Leslie Dach and the amazing Walmart team, who has just been tireless in doing all this work.  And I want to thank Leslie and everyone at Walmart who has -- they&apos;ve proven to be very open and very strong and very passionate supporters.  " />
                      <outline text=" " />
                      <outline text="Now, for years, the conventional wisdom said that healthy products simply didn&apos;t sell -- that the demand wasn&apos;t there, that higher profits were found elsewhere, so it just wasn&apos;t worth the investment.  But thanks to Walmart and so many other great American businesses, we&apos;re proving that conventional wisdom wrong.  Every day, with their success, these companies are showing us that what&apos;s good for kids and what&apos;s good for families&apos; budgets can also be good for business." />
                      <outline text=" " />
                      <outline text="Now, all of you at Walmart, you all really took a risk in doing this.  And you didn&apos;t just make a few tweaks around the edges.  I mean, one of the reasons why we&apos;ve been so thrilled to partner with you is because you didn&apos;t just dip your toe into the water.  Instead, you went all in.  You transformed the way that you did businesses to bring your customers healthy products at prices they can afford.  " />
                      <outline text=" " />
                      <outline text="As Leslie mentioned, in just two years, Walmart saved customers $2.3 billion on fresh fruits and vegetables across the nation.  And I&apos;m going to repeat these accomplishments because they&apos;re worth saying over and over again, because Walmart is still making money.  You reduced the amount of sugar in products across the store by 10 percent.  You&apos;ve cut price premiums for healthy items, making the healthier item more affordable or just as affordable as the alternative.  " />
                      <outline text=" " />
                      <outline text="You have opened 86 new stores -- one of the most important calls, most important work to eliminating food deserts, because you&apos;ve opened these stores, including this one, in underserved communities.  And now you&apos;ve launched your &apos;&apos;Great for You&apos;&apos; seal that I got to see firsthand -- that helps customers immediately spot healthy items on the shelf.  So they don&apos;t have to spend hours poring over those fine-print labels that you can barely understand to figure out which foods are healthy and which ones aren&apos;t.  " />
                      <outline text=" " />
                      <outline text="And today, Walmart is seeing increased sales of fresh produce.  You&apos;re building better relationships with your customers and stronger connections to your communities.  And Walmart executives like Leslie are confident that the changes that you&apos;ve made are good for Walmart&apos;s top line and bottom line going forward.  " />
                      <outline text=" " />
                      <outline text="And Walmart isn&apos;t alone in discovering that healthier products actually sell.  That&apos;s the good thing.  The statistics on consumer demand couldn&apos;t be more clear.  Today, 82 percent of consumers feel that it&apos;s important for companies to offer healthy products that fit family budgets.  In recent years, healthier foods have generated more than 70 percent of growth in sales -- and sales of fresh fruits and vegetables have increased by 6 percent last year.  And a recent report showed that companies selling a higher percentage of healthier foods have delivered significantly higher returns to their shareholders." />
                      <outline text=" " />
                      <outline text="And let&apos;s be clear, these trends didn&apos;t -- they don&apos;t just matter for businesses that produce and sell food.  Right now, we spend in this country $190 billion a year treating obesity-related health conditions, and a significant portion of those costs are borne by America&apos;s businesses.  And we&apos;re not just talking about higher health care costs.  We&apos;re talking about things like the cost that come with higher absenteeism and lower worker productivity, costs that will only continue to rise unless we finally solve this problem once and for all.  " />
                      <outline text="And that&apos;s why businesses across America are stepping up, and ultimately, that&apos;s really what Let&apos;s Move is all about.  I say this time and time again -- it&apos;s not about government telling companies what to sell or telling people what to buy.  It&apos;s about businesses like Walmart stepping up to give people the information they need to make the healthy choices that are right for them, and then offering those choices at prices they can afford.  Because ultimately, Walmart knows that when the healthy choice is also the affordable choice, that&apos;s what&apos;s good for business." />
                      <outline text=" " />
                      <outline text="But more than that, at Walmart, you can believe that as America&apos;s largest retailer, you have an obligation that goes far beyond the bottom line.  You know that every day, with the products you sell, you&apos;re helping parents get by on a budget -- which is what everybody in this country is trying to do.  You&apos;re helping kids get the nutrition they need to learn and grow and fulfill their God-given potential.  And those aren&apos;t just business opportunities. They&apos;re moral obligations -- truly.  They&apos;re responsibilities to the health of our families and the future of our next generation." />
                      <outline text=" " />
                      <outline text="And in the coming months and years, we need more American businesses to step up and meet those responsibilities.  We need more companies to do what Walmart has done -- to dig deep and to find new ways to make money by giving families better information and healthier choices.  " />
                      <outline text=" " />
                      <outline text="And as parents and consumers, all of us need to step up as well.  We were talking about this earlier.  We need to take advantage of these choices once we have them.  We need to speak with our wallets, because ultimately, we are the ones who create the demand for these products.  With every dollar we spend, we&apos;re the ones who ensure that healthy choices are good for business." />
                      <outline text=" " />
                      <outline text="And that&apos;s why I have never been more optimistic about our ability to solve this problem -- because the fact is we know what works.  We see it every day.  We know what works.  We know how to get the results we want.  And we are seeing unprecedented leadership from every sector -- from educators and faith leaders, from elected officials and parents, from businesses like Walmart." />
                      <outline text=" " />
                      <outline text="And if we keep stepping up as we&apos;re doing, if we keep doing our part, all of us, for our children, I am absolutely confident that together, we can give our kids the bright futures they so richly deserve -- because in the end, that&apos;s what this is all about.  I mean, in the end, we all care about our kids, right?  In the end, we all would sacrifice anything for them to give them the very best we can.  (Applause.)  We&apos;re all on the same page as far as that&apos;s concerned.  So we&apos;re going to keep working.  We&apos;re going to keep partnering with companies like Walmart." />
                      <outline text=" " />
                      <outline text="So again, it has been a privilege to be here, to see this, to share.  I want to thank Walmart for everything that you&apos;ve done and everything you&apos;re going to do.  I look forward to working with you, but I also look forward to working with any companies out there that are ready to do innovative things and dig deep and make the big commitments." />
                      <outline text=" " />
                      <outline text="So we&apos;re going to keep working, and we&apos;re looking forward to working with each of you, hand in hand, as parents, as community leaders, to keep giving our kids the healthy start they deserve. " />
                      <outline text=" " />
                      <outline text="So, congratulations, and thank you.  Thank you.  Thank you so much.  (Applause.) " />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text="END" />
                      <outline text="4:22 P.M. CST" />
              </outline>

              <outline text="Pat Robertson Tells His Viewers God Will Grant One of Them a Million Bucks">
                      <outline text="Link to Article" type="link" url="http://videocafe.crooksandliars.com/heather/pat-robertson-tells-his-viewers-god-going" />        <outline text="Source: Crooks and Liars" type="link" url="http://feeds.feedburner.com/crooksandliars/YaCP" />
      <outline text="Fri, 01 Mar 2013 16:55" />
                      <outline text="" />
                      <outline text="I predict that this latest pronouncement by Pat Robertson is going to go over about as well as his supposed secret messages from God about who was going to win the presidential election, or his more recent remarks about casting demons out of used clothing." />
                      <outline text="Pat Robertson&apos;s Prayers Can Make You A Millionaire:" />
                      <outline text="Televangelist Pat Robertson regularly hosts a segment on the 700 Club in which he cures viewers of ailments that God has revealed to him. This is part of positive confession, where Word-Faith pastors like Robertson claim to speak things into existence. Quite regularly it involves money." />
                      <outline text="For example, today Robertson announced that God is going to grant a lucky 700 Club viewer one million dollars: &apos;&apos;God is going to supply a million dollars, somebody is praying right now, right this second, you&apos;re praying for a million dollars and God said, &apos;I have heard your prayer, I know your need, and I&apos;m going to supply the need that you requested,&apos; it&apos;s done, in Jesus&apos; name.&apos;&apos;&apos;" />
                      <outline text="Can&apos;t wait to see who it is!" />
              </outline>

              <outline text="ABC Panics: Sequester &apos;Armageddon&apos; Will Lead to &apos;Jobs Vaporizing&apos; and &apos;Criminals Walking Free&apos;">
                      <outline text="Link to Article" type="link" url="http://www.mrctv.org/videos/abc-panics-sequester-armageddon-will-lead-jobs-vaporizing-and-criminals-walking-free" />        <outline text="Source: MRCTV - News &amp;amp; Politics" type="link" url="http://www.mrctv.org/taxonomy/term/1/0/feed" />
      <outline text="Fri, 01 Mar 2013 16:54" />
                      <outline text="" />
                      <outline text="MRC TV is an online platform for people to share and view videos, articles and opinions on topics that are important to them -- from news to political issues and rip-roaring humor." />
                      <outline text="MRC TV is brought to you by the Media Research Center, a 501(c) 3 nonprofit research and education organization. The MRC is located at: 325 South Patrick Street, Alexandria, VA  22314. For information about the MRC, please visit www.MRC.org." />
                      <outline text="Copyright (C) 2013, Media Research Center. All Rights Reserved." />
              </outline>

              <outline text="Federal Register | Delegation of Authority To Submit to the Congress Certain Certifications, Reports, and Notifications">
                      <outline text="Link to Article" type="link" url="https://www.federalregister.gov/articles/2013/03/01/2013-04975/delegation-of-authority-to-submit-to-the-congress-certain-certifications-reports-and-notifications" />      <outline text="Fri, 01 Mar 2013 16:28" />
                      <outline text="" />
                      <outline text=" " />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, I hereby delegate to you:" />
                      <outline text="(1) the function of the President to make all certifications, reports, and notifications to the Congress prior to entry into force of the Treaty Between the Government of the United States of America and the Government of Australia Concerning Defense Trade Cooperation, as well as to provide annual reports thereafter, consistent with section 2 of the Senate Resolution of Advice and Consent to Ratification of the Treaty, dated September 29, 2010; and" />
                      <outline text="(2) the responsibility of the President, under the Defense Trade Cooperation Treaties Implementation Act of 2010 (the &apos;&apos;Act&apos;&apos;), to provide congressional notification of amendments to the implementing arrangements that are made pursuant to section 105(c) of the Act." />
                      <outline text="You are authorized and directed to publish this memorandum in the Federal Register." />
                      <outline text="THE WHITE HOUSE,Washington, February 20, 2013." />
                      <outline text="[FR Doc. 2013-04975Filed 2-28-13; 11:15 am]" />
                      <outline text="Billing code 4710-10" />
              </outline>

              <outline text="US designates Mullah Nazir Group, subcommander as terrorist | The News Tribe">
                      <outline text="Link to Article" type="link" url="http://www.thenewstribe.com/2013/02/26/us-designates-mullah-nazir-group-subcommander-as-terrorist/" />      <outline text="Fri, 01 Mar 2013 16:51" />
                      <outline text="" />
                      <outline text="Washington: The United States (US) State Department has added the Mullah Nazir Group, a Taliban subgroup based in South Waziristan, and an important deputy commander to the list of foreign terrorist entities and individuals. " />
                      <outline text="It is pertinent to mention here that the former chief of the group, Mullah Nazir, who was killed in a US drone strike in early January, has long supported and sheltered al Qaeda and allied terror groups. In 2011, Nazir even self-identified as an al Qaeda commander." />
                      <outline text="&apos;&apos;Since 2006, [the Mullah Nazir Group] has run training camps, dispatched suicide bombers, provided safe haven for al Qaeda fighters, and conducted cross-border operations in Afghanistan against the United States and its allies,&apos;&apos; State&apos;s designation said." />
                      <outline text="&apos;&apos;In addition to its attacks against international forces in Afghanistan, [the Mullah Nazir Group] is also responsible for assassinations and intimidation operations against civilians in Afghanistan and Pakistan,&apos;&apos; State continued." />
                      <outline text="State also noted that the Mullah Nazir Group and Commander Malang, who was added to the US&apos;s list of Specially Designated Global Terrorists today, have conducted several attacks against the Pakistani military." />
                      <outline text="Malang was named a key subcommander of the Mullah Nazir Group on Jan. 4, just one day after Mullah Nazir was killed in a drone strike in South Waziristan. The group&apos;s shura named Salahuddin Ayubi, who is also known as Bahwal Khan, to replace Nazir. Other top leaders of the Mullah Nazir group include Haji Tehsil Khan, Haji Ainullah, Taj Muhammad, and Muhammad Shoaib." />
              </outline>

              <outline text="Federal Register | Designation of Commander Nazir Group, Also Known as Mullah Nazir Group, as a Specially Designated Global Terrorist Pursuant to Section 1(b) of Executive Order 13224, as Amended">
                      <outline text="Link to Article" type="link" url="https://www.federalregister.gov/articles/2013/03/01/2013-04814/designation-of-commander-nazir-group-also-known-as-mullah-nazir-group-as-a-specially-designated" />      <outline text="Fri, 01 Mar 2013 16:30" />
                      <outline text="" />
                      <outline text=" " />
                      <outline text="Acting under the authority of and in accordance with section 1(b) of Executive Order 13224 of September 23, 2001, as amended by Executive Order 13268 of July 2, 2002, and Executive Order 13284 of January 23, 2003, I hereby determine that the entity known as Commander Nazir Group, also known as Mullah Nazir Group, committed, or poses a significant risk of committing, acts of terrorism that threaten the security of U.S. nationals or the national security, foreign policy, or economy of the United States." />
                      <outline text="Consistent with the determination in section 10 of Executive Order 13224 that &apos;&apos;prior notice to persons determined to be subject to the Order who might have a constitutional presence in the United States would render ineffectual the blocking and other measures authorized in the Order because of the ability to transfer funds instantaneously,&apos;&apos; I determine that no prior notice needs to be provided to any person subject to this determination who might have a constitutional presence in the United States, because to do so would render ineffectual the measures authorized in the Order." />
                      <outline text="This notice shall be published in the Federal Register." />
                      <outline text="Dated: February 20, 2013." />
                      <outline text="John F. Kerry," />
                      <outline text="Secretary of State." />
                      <outline text="[FR Doc. 2013-04814 Filed 2-28-13; 8:45 am]" />
                      <outline text="BILLING CODE 4710-10-P" />
              </outline>

              <outline text="Following Death Of Greatest Military Sniper In American History &apos;&apos; Obama Says NOTHING">
                      <outline text="Link to Article" type="link" url="http://theulstermanreport.com/2013/03/01/following-death-of-greatest-military-sniper-in-american-history-obama-says-nothing/" />        <outline text="Source: The Ulsterman Report" type="link" url="http://theulstermanreport.com/feed/" />
      <outline text="Fri, 01 Mar 2013 16:44" />
                      <outline text="" />
                      <outline text="]v6-w@[J&amp;dn|l&#203;&#142;&#199;&apos;3&apos;&#096;7m6I&#243;&#182;&apos;9k&gt;Hed&#205;&#190;qi&quot;&#094;B(T}N&#127;xg8&#217;&#139;:&#092;}&#202;&#184;n&#199;&quot;|s}cX&#221;&#174;oZM&#094;y&#221;&#182;&#210;&#131;nA {rTo &amp;1&apos;.NiFiy&#126;%g,$Ss&#094; &#094;M(K M U0S)4fYLb0&quot;,5 CJE09p|E&amp;2;/u&#215;&#149;Xq&quot;_&#206;&#185;swh/&#209;&#142;t?A&#126;qm;)]uDZ/&#203;&#154;aY&#217;&apos;urz;4#R&#096;&apos;UIIUd&#096;DQBw1 Y &#096;EHed&#205;&#190;qi&quot;&#094;B(T}N&#127;xg8&#217;&#139;:&#092;}&#202;&#184;n&#199;&quot;|s}cX&#221;&#174;oZM&#094;y&#221;&#182;&#210;&#131;nA {rTo &amp;1&apos;.NiFiy&#126;%g,$Ss&#094; &#094;M(K M U0S)4fYLb0&quot;,5 CJE09p|E&amp;2;/u&#215;&#149;Xq&quot;_&#206;&#185;swh/&#209;&#142;t?A&#126;qm;)]uDZ/&#203;&#154;aY&#217;&apos;urz;4#R&#096;&apos;UIIUd&#096;DQBw1 Y &#096;E" />
              </outline>

              <outline text="170-Million Jobs!?">
                      <outline text="Link to Article" type="link" url="http://www.mrctv.org/videos/170-million-jobs" />        <outline text="Source: MRCTV - News &amp;amp; Politics" type="link" url="http://www.mrctv.org/taxonomy/term/1/0/feed" />
      <outline text="Fri, 01 Mar 2013 16:40" />
                      <outline text="" />
                      <outline text="MRC TV is an online platform for people to share and view videos, articles and opinions on topics that are important to them -- from news to political issues and rip-roaring humor." />
                      <outline text="MRC TV is brought to you by the Media Research Center, a 501(c) 3 nonprofit research and education organization. The MRC is located at: 325 South Patrick Street, Alexandria, VA  22314. For information about the MRC, please visit www.MRC.org." />
                      <outline text="Copyright (C) 2013, Media Research Center. All Rights Reserved." />
              </outline>

              <outline text="The Bradley Manning Story: The Way The New York Times Sees It">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=nEi44CD9N-Y&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Fri, 01 Mar 2013 16:40" />
                      <outline text="" />
              </outline>

              <outline text="Joan Rivers &quot;Last Time A German Looked This Hot Was When They Were Pushing Jews Into The Ovens&quot;">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=1i17zM1q-Pc&amp;feature=youtube_gdata" />        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;amp;v=2&amp;amp;orderby=published&amp;amp;client=ytapi-youtube-profile" />
      <outline text="Fri, 01 Mar 2013 16:38" />
                      <outline text="" />
              </outline>

              <outline text="VIDEO-Oprah Confesses She Ate 30 Lbs. of Mac &amp; Cheese - YouTube">
                      <outline text="Link to Article" type="link" url="https://www.youtube.com/watch?feature=player_embedded&amp;v=v5D8pXnvWiY#!" />      <outline text="Fri, 01 Mar 2013 16:31" />
                      <outline text="" />
              </outline>

              <outline text="Eurozone unemployment rises to record levels - Europe">
                      <outline text="Link to Article" type="link" url="http://www.aljazeera.com/news/europe/2013/03/20133111371495915.html" />        <outline text="Source: BadChad's ThoughtPile" type="link" url="http://cartusers.curry.com/chad.christiandgk2/badchad" />
      <outline text="Fri, 01 Mar 2013 16:28" />
                      <outline text="" />
                      <outline text="Unemployment in the eurozone rose to an all-time high in January, with an estimated 19 million people in the bloc out of work, the EU&apos;s statistics office said." />
                      <outline text="January&apos;s unemployment rate rose to 11.9 percent in the 17 countries sharing the euro, up from 11.8 percent in December, with another 201,000 people out of work, Eurostat said on Friday." />
                      <outline text="The data shows that &quot;an end to the labour market downturn is not yet in sight,&quot; said Martin van Vliet, an economist at ING Bank." />
                      <outline text="&quot;Even if the eurozone economy exits from recession in due course, the labour market is likely to remain in recession for most if not all of this year.&quot;" />
                      <outline text="But overall joblessness masks a large divide, with only five percent unemployment in Austria compared with 27 percent in Greece, although Eurostat&apos;s data from Athens was from November, the latest available." />
                      <outline text="&quot;The economic division between the southern periphery and the core will not change in 2013,&quot; said Commerzbank economist Christoph Weil." />
                      <outline text="&quot;While the economy in the core countries ... should grow again in the first quarter, it will probably still contract in most periphery countries through to the second half of the year,&quot; he said." />
                      <outline text="On the eurozone inflation front, Eurostat said the rate of price increases fell to 1.8 percent in February, putting it well below the European Central Bank&apos;s target rate for the first time in more than two years." />
                      <outline text="In January, the inflation rate was 2.0 percent. The last time inflation was below this level was in November 2010 when it hit 1.9 percent." />
                      <outline text="The ECB, whose first responsibility is price stability, has a long-term inflation target of close to but below 2.0 percent." />
                      <outline text="Low inflation would normally be seen as a positive, meaning price pressures are contained, but it also reflects the state of consumer demand which inevitably suffers at times of high unemployment when people worry about job security and prefer to save their money rather than spend it." />
                      <outline text="The eurozone slipped into its second recession since 2008 last year and economists see the downturn continuing during 2013." />
                      <outline text="342" />
              </outline>

              <outline text="GEORG GANSWEIN">
                      <outline text="Link to Article" type="link" url="http://aangirfan.blogspot.com/2013/03/georg-ganswein.html" />        <outline text="Source: aangirfan" type="link" url="http://aangirfan.blogspot.com/feeds/posts/default?alt=rss" />
      <outline text="Fri, 01 Mar 2013 16:22" />
                      <outline text="" />
                      <outline text="Georg is the son of a blacksmith who became the owner of an agricultural machinery business in the Black Forest in Bavaria.As a teenager in the 1970s, &quot;Georg&apos;s favorite musical artists were Pink Floyd, Cat Stevens and the Beatles. &quot;He also let his curly hair grow &apos;pretty long&apos; back then...&quot;THE NEW ADVENT" />
                      <outline text="Georg G&#164;nswein (born 1956) is now a German archbishop and Benedict XVI&apos;s personal secretary.At one time Georg Ganswein was a lecturer at a papal university funded by Opus Dei.&quot;So Benedict&apos;s handsome male companion will continue to live with him, while working for the other Pope during the day. Are we supposed to think that&apos;s, well, a normal arrangement?&quot;businessinsider" />
              </outline>

              <outline text="Levin Ad: &apos;Stop Censoring The News&apos;">
                      <outline text="Link to Article" type="link" url="http://www.mrctv.org/videos/levin-ad-stop-censoring-news" />        <outline text="Source: MRCTV - News &amp;amp; Politics" type="link" url="http://www.mrctv.org/taxonomy/term/1/0/feed" />
      <outline text="Fri, 01 Mar 2013 16:21" />
                      <outline text="" />
                      <outline text="MRC TV is an online platform for people to share and view videos, articles and opinions on topics that are important to them -- from news to political issues and rip-roaring humor." />
                      <outline text="MRC TV is brought to you by the Media Research Center, a 501(c) 3 nonprofit research and education organization. The MRC is located at: 325 South Patrick Street, Alexandria, VA  22314. For information about the MRC, please visit www.MRC.org." />
                      <outline text="Copyright (C) 2013, Media Research Center. All Rights Reserved." />
              </outline>

              <outline text="Supreme Court: Citizens cannot challenge government surveillance laws">
                      <outline text="Link to Article" type="link" url="http://www.naturalnews.com/039307_Supreme_Court_surveillance_government.html" />      <outline text="Fri, 01 Mar 2013 16:19" />
                      <outline text="" />
                      <outline text="(NaturalNews) A &quot;sharply divided&quot; U.S. Supreme Court erected yet another barrier between the people and their government on Feb. 26 by ruling that ordinary citizens don&apos;t have standing to question government surveillance laws.In a five to four ruling, a majority of justices threw out a bid by a group of lawyers, journalists and other organizations to challenge a 2008 expansion of the Foreign Intelligence Surveillance Act, or FISA, ostensibly because they could not prove the government would monitor their conversations in addition to those of potential intelligence targets and terrorist operatives." />
                      <outline text="In writing for the court&apos;s majority, Justice Samuel Alito said his colleagues &quot;have been reluctant to endorse standing theories that require guesswork.&quot;" />
                      <outline text="Your concerns are not founded, slave" />
                      <outline text="The act first became law in 1978. It gives the government authority to monitor conversations of foreign spies, terrorist subjects and others abroad for the purpose of collecting intelligence." />
                      <outline text="In 2008, new FISA amendments &quot;allow the government to obtain from a secret court broad, yearlong intercept orders, raising the prospect that phone calls and emails between those foreign targets and innocent Americans in this country would be swept under the umbrella of surveillance,&quot; The Associated Press reported." />
                      <outline text="However, without actual proof that the law would directly affect American citizens, Alito said in the court&apos;s ruling that citizens would not be able to sue." />
                      <outline text="Regardless of their documented concerns, along with the expense of activities some Americans have taken to make sure they aren&apos;t swept up in officially sanctioned government monitoring, they &quot;have set forth no specific facts demonstrating that the communications of their foreign contacts will be targeted,&quot; Alito added." />
                      <outline text="He also said the expansion of FISA only authorized, but does not direct or mandate, the government surveillance. And because of that provision, &quot;respondents&apos; allegations are necessarily conjectural.&quot;" />
                      <outline text="&quot;Simply put, respondents can only speculate as to how the attorney general and the Director of National Intelligence will exercise their discretion in determining which communications to target,&quot; Alito wrote." />
                      <outline text="He was joined in his decision by Chief Justice John Roberts, the man who invented the constitutionality of Obamacare out of thin air, along with Justices Anthony Kennedy, Antonin Scalia and Clarence Thomas." />
                      <outline text="The minority gets one right" />
                      <outline text="Writing in dissent, Justice Stephen Breyer said he would have permitted the lawsuit to move ahead because he thinks &quot;the government has a strong motive to listen to conversations of the kind described.&quot;" />
                      <outline text="&quot;We need only assume that the government is doing its job (to find out about, and combat terrorism) in order to conclude that there is a high probability that the government will intercept at least some electronic communication to which at least some of the plaintiffs are party,&quot; Breyer said." />
                      <outline text="The majority of justices are incorrect when they describe the harm threatened plaintiffs as &quot;speculative,&quot; Breyer added." />
                      <outline text="He was joined in his dissent by Justices Ruth Bader Ginsberg, Sonia Sotomayor and Elena Kagan." />
                      <outline text="Originally, a federal judge threw out the lawsuit, saying plaintiffs lacked standing to sue. However, the 2nd Circuit Court of Appeals reinstated the suit. The high court was not considering the constitutionality of the law&apos;s expansion, but rather whether lawyers could file a lawsuit to challenge it in federal court." />
                      <outline text="High court&apos;s solution: Wait until you&apos;ve been violated" />
                      <outline text="Jonathan Hafetz, a former ACLU attorney and an expert on national security and privacy issues who also teaches at Seton Hall University&apos;s law school, told AP, &quot;The decision effectively insulates the government&apos;s increasingly broad surveillance powers from meaningful court review, threatening constitutional liberties in the name of secrecy and security.&quot;" />
                      <outline text="The ACLU represented the plaintiffs before the Supreme Court." />
                      <outline text="In writing his opinion, Alito emphasized the court&apos;s role, saying the ruling did not prevent the expansion of FISA from judicial scrutiny or review, even going so far as to suggest a couple of ways in which a challenge to the law could be brought to court." />
                      <outline text="&quot;It is possible that the monitoring of the target&apos;s conversations with his or her attorney would provide grounds for a claim of standing on the part of the attorney,&quot; Alito said. &quot;Such an attorney would certainly have a stronger evidentiary basis for establishing standing than do respondents in the present case.&quot;" />
                      <outline text="In late December, President Obama quietly reauthorized FISA, which was set to expire at the end of 2012. (http://www.naturalnews.com)" />
                      <outline text="Sources:" />
                      <outline text="http://hosted.ap.org" />
                      <outline text="http://www.naturalnews.com" />
                      <outline text="http://www.salon.com" />
                      <outline text="Popular on Natural News" />
                      <outline text="Have comments on this article? Post them here:  people have commented on this article." />
              </outline>

              <outline text="Pay-Per-Mile Tax Will Make Every Road a Toll Road">
                      <outline text="Link to Article" type="link" url="http://moneymorning.com/2013/01/18/pay-per-mile-tax-will-make-every-road-a-toll-road/" />      <outline text="Fri, 01 Mar 2013 15:39" />
                      <outline text="" />
                      <outline text="If you thought all the talk about taxing the rich meant the government would not be reaching deeper into the pockets of most Americans, then you haven&apos;t heard about the pay-per-mile tax." />
                      <outline text="It hasn&apos;t happened yet. But Congress is considering a new way of taxing American drivers that would charge them per mile instead of the current 18.4 cent-per-gallon gasoline tax they pay now." />
                      <outline text="A new study by the U.S. Government Accountability Office (GAO) says that such a pay-per-mile tax, also known as a vehicle-miles-traveled tax (VMT tax) or ObamaMiles, would cost the average American motorist at least $100 more per year than the current gasoline tax." />
                      <outline text="The problem the federal government faces is that the annual gasoline tax revenue of $34 billion has fallen far below the $78 billion required to maintain the country&apos;s highway system." />
                      <outline text="For a pay-per-mile tax to generate that kind of revenue, drivers would need to pay an average of 2.2 cents per mile. According to the GAO, that would represent a 153% increase over what motorists pay now." />
                      <outline text="The increase for each motorist would vary widely, depending on whether you drive a gas guzzler or a hybrid, and how many miles you drive each day. Hybrid owners with long commutes would get hit the hardest." />
                      <outline text="Meanwhile, commercial trucks would face a 120% increase in driving-based taxes, the GAO said. That would likely push up the prices of all goods transported by truck - virtually everything you buy at a store." />
                      <outline text="Why the Government Wants a Pay-Per Mile TaxPart of the problem is that the gasoline tax was never indexed for inflation." />
                      <outline text="But more recently, the popularity of more fuel-efficient vehicles, particularly hybrids, has succeeded in helping to reduce gasoline consumption, resulting in fewer gallons purchased and less tax going to Uncle Sam." />
                      <outline text="That&apos;s why instead of simply raising the federal gasoline tax, Washington is looking into replacing it with a pay-per-mile tax. It gives the government a way to extract tax from folks who own electric vehicles (who buy little or no gasoline) and substantially more tax from hybrid owners." />
                      <outline text="What&apos;s more, several states, such as Nevada and Oregon, are seriously considering pay-per-mile taxes of their own. And Washington state will impose a $100 annual fee on drivers of electric cars starting next month." />
                      <outline text="Money Morning Chief Investing Strategist Keith Fitz-Gerald, a resident of Oregon, thinks a VMT tax is an ill-conceived government money grab." />
                      <outline text="&quot;I personally don&apos;t like it, considering I drive two fuel-efficient cars in the family - a turbo diesel and a Prius - and I think that [government officials] want their pound of flesh no matter which way they&apos;re going to get it to compensate for decades of bad fiscal policy,&quot; Fitz-Gerald said on FOX Business Network&apos;s &quot;Varney &amp; Co.&quot;" />
                      <outline text="Oregon may be the furthest along in its quest for a pay-per-mile tax. Its Department of Transportation is testing several ways to implement a VMT, which could go into effect as early as 2015." />
                      <outline text="With Oregon and Nevada leading the way, Fitz-Gerald expects other revenue-hungry states to follow suit in the years ahead. And pay-per-mile taxes cooked up at the state level most likely will sit on top of any federal VMT tax - just as with per-gallon gasoline taxes now." />
                      <outline text="Is a VMT Tax an Invasion of Privacy?How a pay-per-mile tax would be collected is a dicey issue in itself, beyond the added out-of-pocket costs." />
                      <outline text="Perhaps the most objectionable idea would put a GPS inside each car to track how many miles it travels. The data would be sent to a central government office, which would then mail out a bill." />
                      <outline text="That means the government would know the whereabouts of every vehicle in the United States at any given moment. Talk about Big Brother." />
                      <outline text="&quot;Once the government gets its hands on [this kind of] data, it&apos;s not going to back off. In fact, it&apos;s only going to get worse,&quot; Fitz-Gerald warned." />
                      <outline text="Other ideas include a pay-at-the-pump system in which a transmitter in the car would send odometer data to a receiver at the gas station so the VMT tax can be added to the cost of the fuel." />
                      <outline text="While the second idea would not be as invasive, the infrastructure required to carry it out would be very expensive, ultimately defeating its purpose. The GPS idea is both invasive and costly." />
                      <outline text="&quot;The administrative costs of this program, like many government initiatives, are expected to outstrip additional revenues for years,&quot; Fitz-Gerald said." />
                      <outline text="While no pay-per-mile tax is yet a reality at either the state or federal levels, the need for more highway maintenance revenue means higher taxes are coming one way or another - even if it ends up as a big increase in the current per-gallon tax." />
                      <outline text="&quot;We are not spending enough to keep up with the maintenance and repairs of roads and bridges,&quot; Joshua Schank, president and CEO of the ENO Center for Transportation in Washington, DC, told CNBC. &quot;People don&apos;t understand paving roads, adding roads, etc. costs money. That money has to come from somewhere.&quot;" />
                      <outline text="Related Articles and News:" />
              </outline>

              <outline text="BIEBER; BRAINWASHING; BUTTERFLIES; SANDY HOOK">
                      <outline text="Link to Article" type="link" url="http://aangirfan.blogspot.com/2013/03/bieber-brainwashing-butterflies-sandy.html" />        <outline text="Source: aangirfan" type="link" url="http://aangirfan.blogspot.com/feeds/posts/default?alt=rss" />
      <outline text="Fri, 01 Mar 2013 15:38" />
                      <outline text="" />
                      <outline text="&quot;Duke University researchers linked the brains of a rat in the US with one in Brazil - and found the rodents could communicate.&quot;All seeing eye. The CIA&apos;s Monarch brainwashing programme produces sex slaves for the elite.Ronan Parke has performed to an estimated audience of 700m people on a 2012 New Year&apos;s Eve show in China.&quot;The courage of our forces&quot;SkullsButterflies all havin&apos; fun you know what I meanSleep in peace when day is done- Lyrics sung by Ronan.Andy Williams&quot;A doctor named Ross MacLean administered LSD and another hallucinogenic drug, mescaline, to me in different doses and supervised my trips.&quot; - Moon River &amp; Me, by Andy WilliamsPurple (Asclepias) flowers used as Identifiers and TriggersMonarch Butterflies are considered King of Butterflies and The Most Beautiful" />
                      <outline text="MK " />
                      <outline text="Bob Hope and Andy Williams.&quot;Merrill Osmond&apos;s boys were &apos;discovered&apos; at Disneyland ... They sang for Andy Williams...&quot;The Osmond Brothers" />
                      <outline text="Butterfly mask on Jackson&apos;s daughter. Website for this image...http://favim.com/image/533306/ ..." />
                      <outline text="Gene Rosen worked at the Fairfield Hills mental hospital.&quot;Gene Rosen, a resident of Sandy Hook, CT for the past twenty years, is a retired psychologist who worked for several years in Newtown at Fairfield Hills State Hospital.&quot;http://web.archive.org/web/2012061607411...about.html" />
                      <outline text="Gene Rosen had four little girls and two little boys staying in his home for a few hours. Sandy-Hook-shooting-The-moment-neighbor-surviving-gradersWas he using mind control?Fairfield HillsNewtown is home to the &quot;Fairfield Hills&quot; Hospital, used as the set of the Wilkinson Home for Boys in the film Sleepers in 1995." />
                      <outline text="In the Wilkinson Home for Boys, children are systematically beaten, abused, and raped." />
                      <outline text="State mental hospitals have been used by the CIA in the Monarch brainwashing programme." />
                      <outline text="Fairfield UniversityAccording to Yoichi Shimatsu:Brewster Jennings became closely associated with the CIA.Fairfield University reportedly recruited people for the CIA." />
                      <outline text="J D Salinger, of Russian Jewish descent, worked for US intelligence and was involved in bringing Nazi scientists into the USA." />
                      <outline text="Salinger lived near Fairfield University in Connecticut." />
                      <outline text="Gottlieb" />
                      <outline text="Dr. Sidney Gottlieb (the pseudonym of Joseph Schieder) ran the main mind-control (MK ULTRA) lab at Jesuit-run Georgetown University in Washington, D.C." />
                      <outline text="In Connecticut, Salinger wrote The Catcher in the Rye, &quot;which contains the command code-words for MK-ULTRA assassins.&quot;" />
                      <outline text="Bulger" />
                      <outline text="The CIA recruited a convict nicknamed &apos;Whitey&apos; Bulger to supply young runaways for the mind-control experiments, being set up at 44 universities across the United States." />
                      <outline text="The CIA and FBI put Bulger in charge of organising crime in Connecticut and the rest of new England." />
                      <outline text="&quot;Finally, all of New England was safe for CIA smuggling, support for terrorism, money-laundering and mind-control operations.&quot;" />
                      <outline text="Newtown is part of the Diocese of Bridgeport." />
                      <outline text="Bridgeport supplies child prostitutes for VIP clients in New York and Washington." />
                      <outline text="The pedophile rings get children from Catholic priests, social-services managers and money-hungry willing parents." />
                      <outline text="In Bridgeport, in 2001, the Diocese petitioned the US Supreme Court to quash the thousands of documents detailing sex crimes." />
                      <outline text="In 2009 Opus Dei&apos;s Justice Antonin Scalia determined that the court records should not be made public." />
                      <outline text="&quot;The MK-ULTRA program that reached into campuses across Connecticut quickly created... wrecked minds and twisted souls.&quot;" />
                      <outline text="&quot;Sexual violation is the key to creating intelligence agents and assassins .... Plus a supply of children is needed in Congress and the White House to entertain the satraps and moguls from Colombian drug lords to Israeli weapons dealers and French money launderers, not to mention America&apos;s own homegrown pervs.&quot;" />
                      <outline text="Dylan Hockley, victim of CIA brainwashing?Dylan Hockley lived in a house opposite that of Adam Lanza.Nicole Hockley says: &apos;Dylan and all the other children and teachers who lost their lives are butterflies now.&apos;" />
                      <outline text="Sandy-Hook-victims-Proud-parent" />
                      <outline text="Ian Hockley at the funeral of Dylan. Butterfly on lapel.In the CIA&apos;s brainwashing programme, use is made of butterflies, the song &apos;Somewhere over the Rainbow&apos; and the colour purple.MKULTRA {Monarch} - La CavernaAt Dylan&apos;s funeral, the mourners were able to watch a clip of Dylan popping out of a jack-in-the-box, as the organist played Somewhere Over The Rainbow." />
                      <outline text="Sandy-Hook-victims-Proud-parents" />
                      <outline text="Nicole Hockley recalled asking Dylan at one time why he flapped his arms...&apos;&apos;Because I am a beautiful butterfly,&apos;&apos; he told her.Some mourners dressed in purpleAt Dylan&apos;s funeral, many people wore purple, and there were purple balloons.In the CIA&apos;s brainwashing programme, use is made of butterflies, the song &apos;Somewhere over the Rainbow&apos; and the colour purple." />
                      <outline text="MKULTRA {Monarch} - La CavernaFuneral of Dylan Hockley -December 2012" />
                      <outline text="At the funeral, a singer reworked Dylan&apos;s favorite song from Shrek, &apos;&apos;Hallelujah,&apos;&apos; to pay tribute to Dylan and the other victims." />
                      <outline text="Shrek links to butterflies." />
                      <outline text="Butterflies in Shrek.&quot;Because I am a beautiful butterfly&quot; - spoken by a 6 year old whose favourite movies are said to have included Shrek and whose favourite colour is &quot;said&quot; to have been purple, ditto for fellow victims, Oliver Engel and Josephine Gay." />
                      <outline text="Grace Audrey McDonnell" />
              </outline>

              <outline text="To amend the Public Health Service Act to provide for the participation of optometrists in the National Health Service Corps scholarship and loan repayment programs, and for other purposes. (H.R. 920)">
                      <outline text="Link to Article" type="link" url="http://www.govtrack.us/congress/bills/113/hr920?" />      <outline text="Fri, 01 Mar 2013 15:27" />
                      <outline text="" />
                      <outline text="GovTrack&apos;s Bill SummaryWe don&apos;t have a summary available yet." />
                      <outline text="Library of Congress SummaryThe summary below was written by the Congressional Research Service, which is a nonpartisan division of the Library of Congress." />
                      <outline text="No summary available." />
                      <outline text="House Republican Conference SummaryThe summary below was written by the House Republican Conference, which is the caucus of Republicans in the House of Representatives." />
                      <outline text="No summary available." />
                      <outline text="House Democratic Caucus SummaryThe House Democratic Caucus does not provide summaries of bills." />
                      <outline text="So, yes, we display the House Republican Conference&apos;s summaries when available even if we do not have a Democratic summary available. That&apos;s because we feel it is better to give you as much information as possible, even if we cannot provide every viewpoint." />
                      <outline text="We&apos;ll be looking for a source of summaries from the other side in the meanwhile." />
              </outline>

              <outline text="Gold and Silver Approved as Legal Tender by Arizona Senate">
                      <outline text="Link to Article" type="link" url="http://www.thedailysheeple.com/gold-and-silver-approved-as-legal-tender-by-arizona-senate_032013" />      <outline text="Fri, 01 Mar 2013 15:25" />
                      <outline text="" />
                      <outline text="Activist PostActivist PostMarch 1st, 2013Reader Views: 161" />
                      <outline text="Arizona may become the second state, after Utah, to recognize gold and silver as legal tender authorized for payments of debts and taxes." />
                      <outline text="The Arizona Senate voted Thursday to approve SB 1439 which allows businesses and the state government to accept payments in gold or silver." />
                      <outline text="The Legal Tender bill specifies that legal tender in Arizona consists of all of the following:" />
                      <outline text="1. Legal Tender authorized by Congress." />
                      <outline text="2. Specie (containing gold or silver) coin issued at any time by the U.S. government." />
                      <outline text="3. Any other specie that a court of competent jurisdiction rules by a final, unappealable order to be within the scope of state authority to make legal tender." />
                      <outline text="Currently all debts and taxes in Arizona and the rest of the United States are either paid with Federal Reserve Notes (dollars) which were authorized as legal tender by Congress, or with coins issued by the U.S. Treasury &apos;-- very few of which have gold or silver in them." />
                      <outline text="Although Article 1, Section 10 of the United States Constitution states that no state shall coin money; the same section stipulates that no state shall make anything but gold and silver coin a tender in payment of debts. In that regard the sponsors of bill feel that it will simply respect the use of gold and silver as per the Constitution without &apos;&apos;coining&apos;&apos; its own money.The law also exempts taxing the exchange of gold and silver into any other currency, and states that gold and silver as legal tender would not be &apos;&apos;subject to tax or regulation as property other than money.&apos;&apos;" />
                      <outline text="S.B. 1439 is legislation modeled after Utah&apos;s which was the first to pass and be signed into law. Several other states have introduced similar measures motivated by the dollar instability caused by the Federal Reserve&apos;s recent monetary policies." />
                      <outline text="Gold and silver have historically held their value compared to unstable dollars. The value of the U.S. dollar has plummeted 98% against gold in the last 100 years since the Federal Reserve took over as the U.S. central bank in 1913." />
                      <outline text="As the Federal Reserve continues debase the currency through persistent quantitative easing, many more states may be looking to cushion themselves against further declines by legalizing competing currencies like gold and silver in the near future." />
                      <outline text="Arizona&apos;s S.B. 1439 must still pass in the State House and be signed by Governor Jan Brewer before becoming law." />
                      <outline text="Delivered by The Daily Sheeple" />
                      <outline text="Contributed by Activist Post of Activist Post." />
                      <outline text="Leave A Comment...The Daily Sheeple Home Page" />
              </outline>

              <outline text="America Has ALWAYS Been SOCIALIST: Libtalker">
                      <outline text="Link to Article" type="link" url="http://www.mrctv.org/videos/america-has-always-been-socialist-libtalker" />        <outline text="Source: MRCTV - News &amp;amp; Politics" type="link" url="http://www.mrctv.org/taxonomy/term/1/0/feed" />
      <outline text="Fri, 01 Mar 2013 15:23" />
                      <outline text="" />
                      <outline text="THOM HARTMANN (26 Feb 2013): I believe in a regulated capitalist economy and a democratic socialist government, which is pretty much what we had from the 1940s until the 1980s." />
                      <outline text=" " />
                      <outline text="[...]" />
                      <outline text="THOM HARTMANN (46:01) (after a caller says this country wasn&apos;t intended to be democratic-socialist): Sure it was. We have a military, we have a post office, we have, we have educational systems. George Washington signed the first law that provided for housing, food, and clothing for poor people in Washington, D.C. We&apos;ve been a socialist government from the founding of the republic." />
              </outline>

              <outline text="Full Text of S. 47: Violence Against Women Reauthorization Act of 2013">
                      <outline text="Link to Article" type="link" url="http://www.govtrack.us/congress/bills/113/s47/text" />      <outline text="Fri, 01 Mar 2013 15:20" />
                      <outline text="" />
                      <outline text="S.47" />
                      <outline text="One Hundred Thirteenth Congress" />
                      <outline text="Begun and held at the City of Washington on Thursday," />
                      <outline text="the third day of January, two thousand and thirteen" />
                      <outline text="An Act" />
                      <outline text="To reauthorize the Violence Against Women Act of 1994." />
                      <outline text="Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled," />
                      <outline text="SECTION 1. SHORT TITLE." />
                      <outline text="This Act may be cited as the &apos;Violence Against Women Reauthorization Act of 2013&apos;." />
                      <outline text="SEC. 2. TABLE OF CONTENTS." />
                      <outline text="The table of contents for this Act is as follows:" />
                      <outline text="Sec. 1. Short title." />
                      <outline text="Sec. 2. Table of contents." />
                      <outline text="Sec. 3. Universal definitions and grant conditions." />
                      <outline text="Sec. 4. Effective date." />
                      <outline text="TITLE I--ENHANCING JUDICIAL AND LAW ENFORCEMENT TOOLS TO COMBAT VIOLENCE AGAINST WOMENSec. 101. Stop grants." />
                      <outline text="Sec. 102. Grants to encourage arrest policies and enforcement of protection orders." />
                      <outline text="Sec. 103. Legal assistance for victims." />
                      <outline text="Sec. 104. Consolidation of grants to support families in the justice system." />
                      <outline text="Sec. 105. Sex offender management." />
                      <outline text="Sec. 106. Court-appointed special advocate program." />
                      <outline text="Sec. 107. Criminal provision relating to stalking, including cyberstalking." />
                      <outline text="Sec. 108. Outreach and services to underserved populations grant." />
                      <outline text="Sec. 109. Culturally specific services grant." />
                      <outline text="TITLE II--IMPROVING SERVICES FOR VICTIMS OF DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, AND STALKINGSec. 201. Sexual assault services program." />
                      <outline text="Sec. 202. Rural domestic violence, dating violence, sexual assault, stalking, and child abuse enforcement assistance." />
                      <outline text="Sec. 203. Training and services to end violence against women with disabilities grants." />
                      <outline text="Sec. 204. Enhanced training and services to end abuse in later life." />
                      <outline text="TITLE III--SERVICES, PROTECTION, AND JUSTICE FOR YOUNG VICTIMS OF VIOLENCESec. 301. Rape prevention and education grant." />
                      <outline text="Sec. 302. Creating hope through outreach, options, services, and education for children and youth." />
                      <outline text="Sec. 303. Grants to combat violent crimes on campuses." />
                      <outline text="Sec. 304. Campus sexual violence, domestic violence, dating violence, and stalking education and prevention." />
                      <outline text="TITLE IV--VIOLENCE REDUCTION PRACTICESSec. 401. Study conducted by the centers for disease control and prevention." />
                      <outline text="Sec. 402. Saving money and reducing tragedies through prevention grants." />
                      <outline text="TITLE V--STRENGTHENING THE HEALTHCARE SYSTEM&apos;S RESPONSE TO DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, AND STALKINGSec. 501. Consolidation of grants to strengthen the healthcare system&apos;s response to domestic violence, dating violence, sexual assault, and stalking." />
                      <outline text="TITLE VI--SAFE HOMES FOR VICTIMS OF DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, AND STALKINGSec. 601. Housing protections for victims of domestic violence, dating violence, sexual assault, and stalking." />
                      <outline text="Sec. 602. Transitional housing assistance grants for victims of domestic violence, dating violence, sexual assault, and stalking." />
                      <outline text="Sec. 603. Addressing the housing needs of victims of domestic violence, dating violence, sexual assault, and stalking." />
                      <outline text="TITLE VII--ECONOMIC SECURITY FOR VICTIMS OF VIOLENCESec. 701. National Resource Center on Workplace Responses to assist victims of domestic and sexual violence." />
                      <outline text="TITLE VIII--PROTECTION OF BATTERED IMMIGRANTSSec. 801. U nonimmigrant definition." />
                      <outline text="Sec. 802. Annual report on immigration applications made by victims of abuse." />
                      <outline text="Sec. 803. Protection for children of VAWA self-petitioners." />
                      <outline text="Sec. 804. Public charge." />
                      <outline text="Sec. 805. Requirements applicable to U visas." />
                      <outline text="Sec. 806. Hardship waivers." />
                      <outline text="Sec. 807. Protections for a fiancee or fiance of a citizen." />
                      <outline text="Sec. 808. Regulation of international marriage brokers." />
                      <outline text="Sec. 809. Eligibility of crime and trafficking victims in the Commonwealth of the Northern Mariana Islands to adjust status." />
                      <outline text="Sec. 810. Disclosure of information for national security purposes." />
                      <outline text="TITLE IX--SAFETY FOR INDIAN WOMENSec. 901. Grants to Indian tribal governments." />
                      <outline text="Sec. 902. Grants to Indian tribal coalitions." />
                      <outline text="Sec. 903. Consultation." />
                      <outline text="Sec. 904. Tribal jurisdiction over crimes of domestic violence." />
                      <outline text="Sec. 905. Tribal protection orders." />
                      <outline text="Sec. 906. Amendments to the Federal assault statute." />
                      <outline text="Sec. 907. Analysis and research on violence against Indian women." />
                      <outline text="Sec. 908. Effective dates; pilot project." />
                      <outline text="Sec. 909. Indian law and order commission; Report on the Alaska Rural Justice and Law Enforcement Commission." />
                      <outline text="Sec. 910. Special rule for the State of Alaska." />
                      <outline text="TITLE X--SAFER ACTSec. 1001. Short title." />
                      <outline text="Sec. 1002. Debbie Smith grants for auditing sexual assault evidence backlogs." />
                      <outline text="Sec. 1003. Reports to Congress." />
                      <outline text="Sec. 1004. Reducing the rape kit backlog." />
                      <outline text="Sec. 1005. Oversight and accountability." />
                      <outline text="Sec. 1006. Sunset." />
                      <outline text="TITLE XI--OTHER MATTERSSec. 1101. Sexual abuse in custodial settings." />
                      <outline text="Sec. 1102. Anonymous online harassment." />
                      <outline text="Sec. 1103. Stalker database." />
                      <outline text="Sec. 1104. Federal victim assistants reauthorization." />
                      <outline text="Sec. 1105. Child abuse training programs for judicial personnel and practitioners reauthorization." />
                      <outline text="TITLE XII--TRAFFICKING VICTIMS PROTECTIONSubtitle A--Combating International Trafficking in PersonsSec. 1201. Regional strategies for combating trafficking in persons." />
                      <outline text="Sec. 1202. Partnerships against significant trafficking in persons." />
                      <outline text="Sec. 1203. Protection and assistance for victims of trafficking." />
                      <outline text="Sec. 1204. Minimum standards for the elimination of trafficking." />
                      <outline text="Sec. 1205. Best practices in trafficking in persons eradication." />
                      <outline text="Sec. 1206. Protections for domestic workers and other nonimmigrants." />
                      <outline text="Sec. 1207. Prevention of child marriage." />
                      <outline text="Sec. 1208. Child soldiers." />
                      <outline text="Subtitle B--Combating Trafficking in Persons in the United StatesPART I--Penalties Against Traffickers and Other CrimesSec. 1211. Criminal trafficking offenses." />
                      <outline text="Sec. 1212. Civil remedies; clarifying definition." />
                      <outline text="PART II--Ensuring Availability of Possible Witnesses and InformantsSec. 1221. Protections for trafficking victims who cooperate with law enforcement." />
                      <outline text="Sec. 1222. Protection against fraud in foreign labor contracting." />
                      <outline text="PART III--Ensuring Interagency Coordination and Expanded ReportingSec. 1231. Reporting requirements for the Attorney General." />
                      <outline text="Sec. 1232. Reporting requirements for the Secretary of Labor." />
                      <outline text="Sec. 1233. Information sharing to combat child labor and slave labor." />
                      <outline text="Sec. 1234. Government training efforts to include the Department of Labor." />
                      <outline text="Sec. 1235. GAO report on the use of foreign labor contractors." />
                      <outline text="Sec. 1236. Accountability." />
                      <outline text="PART IV--Enhancing State and Local Efforts to Combat Trafficking in PersonsSec. 1241. Assistance for domestic minor sex trafficking victims." />
                      <outline text="Sec. 1242. Expanding local law enforcement grants for investigations and prosecutions of trafficking." />
                      <outline text="Sec. 1243. Model State criminal law protection for child trafficking victims and survivors." />
                      <outline text="Subtitle C--Authorization of AppropriationsSec. 1251. Adjustment of authorization levels for the Trafficking Victims Protection Act of 2000." />
                      <outline text="Sec. 1252. Adjustment of authorization levels for the Trafficking Victims Protection Reauthorization Act of 2005." />
                      <outline text="Subtitle D--Unaccompanied Alien ChildrenSec. 1261. Appropriate custodial settings for unaccompanied minors who reach the age of majority while in Federal custody." />
                      <outline text="Sec. 1262. Appointment of child advocates for unaccompanied minors." />
                      <outline text="Sec. 1263. Access to Federal foster care and unaccompanied refugee minor protections for certain U Visa recipients." />
                      <outline text="Sec. 1264. GAO study of the effectiveness of border screenings." />
                      <outline text="SEC. 3. UNIVERSAL DEFINITIONS AND GRANT CONDITIONS." />
                      <outline text="(a) Definitions- Subsection (a) of section 40002 of the Violence Against Women Act of 1994 (42 U.S.C. 13925(a)) is amended--" />
                      <outline text="(1) by striking paragraphs (5), (17), (18), (23), (29), (33), (36), and (37);" />
                      <outline text="(2) by redesignating--" />
                      <outline text="(A) paragraphs (34) and (35) as paragraphs (41) and (42), respectively;" />
                      <outline text="(B) paragraphs (30), (31), and (32) as paragraphs (36), (37), and (38), respectively;" />
                      <outline text="(C) paragraphs (24) through (28) as paragraphs (30) through (34), respectively;" />
                      <outline text="(D) paragraphs (21) and (22) as paragraphs (26) and (27), respectively;" />
                      <outline text="(E) paragraphs (19) and (20) as paragraphs (23) and (24), respectively;" />
                      <outline text="(F) paragraphs (10) through (16) as paragraphs (13) through (19), respectively;" />
                      <outline text="(G) paragraphs (6), (7), (8), and (9) as paragraphs (8), (9), (10), and (11), respectively; and" />
                      <outline text="(H) paragraphs (1), (2), (3), and (4) as paragraphs (2), (3), (4), and (5), respectively;" />
                      <outline text="(3) by inserting before paragraph (2), as redesignated, the following:" />
                      <outline text="&apos;(1) ALASKA NATIVE VILLAGE- The term &apos;Alaska Native village&apos; has the same meaning given such term in the Alaska Native Claims Settlement Act (43 U.S.C. 1601 et seq.).&apos;;" />
                      <outline text="(4) in paragraph (3), as redesignated, by striking &apos;serious harm.&apos; and inserting &apos;serious harm to an unemancipated minor.&apos;;" />
                      <outline text="(5) in paragraph (4), as redesignated, by striking &apos;The term&apos; through &apos;that--&apos; and inserting &apos;The term &apos;community-based organization&apos; means a nonprofit, nongovernmental, or tribal organization that serves a specific geographic community that--&apos;;" />
                      <outline text="(6) by inserting after paragraph (5), as redesignated, the following:" />
                      <outline text="&apos;(6) CULTURALLY SPECIFIC- The term &apos;culturally specific&apos; means primarily directed toward racial and ethnic minority groups (as defined in section 1707(g) of the Public Health Service Act (42 U.S.C. 300u-6(g))." />
                      <outline text="&apos;(7) CULTURALLY SPECIFIC SERVICES- The term &apos;culturally specific services&apos; means community-based services that include culturally relevant and linguistically specific services and resources to culturally specific communities.&apos;;" />
                      <outline text="(7) in paragraph (8), as redesignated, by inserting &apos;or intimate partner&apos; after &apos;former spouse&apos; and &apos;as a spouse&apos;;" />
                      <outline text="(8) by inserting after paragraph (11), as redesignated, the following:" />
                      <outline text="&apos;(12) HOMELESS- The term &apos;homeless&apos; has the meaning provided in section 41403(6).&apos;;" />
                      <outline text="(9) in paragraph (18), as redesignated, by inserting &apos;or Village Public Safety Officers&apos; after &apos;governmental victim services programs&apos;;" />
                      <outline text="(10) in paragraph (19), as redesignated, by inserting at the end the following:" />
                      <outline text="&apos;Intake or referral, by itself, does not constitute legal assistance.&apos;;" />
                      <outline text="(11) by inserting after paragraph (19), as redesignated, the following:" />
                      <outline text="&apos;(20) PERSONALLY IDENTIFYING INFORMATION OR PERSONAL INFORMATION- The term &apos;personally identifying information&apos; or &apos;personal information&apos; means individually identifying information for or about an individual including information likely to disclose the location of a victim of domestic violence, dating violence, sexual assault, or stalking, regardless of whether the information is encoded, encrypted, hashed, or otherwise protected, including--" />
                      <outline text="&apos;(A) a first and last name;" />
                      <outline text="&apos;(B) a home or other physical address;" />
                      <outline text="&apos;(C) contact information (including a postal, e-mail or Internet protocol address, or telephone or facsimile number);" />
                      <outline text="&apos;(D) a social security number, driver license number, passport number, or student identification number; and" />
                      <outline text="&apos;(E) any other information, including date of birth, racial or ethnic background, or religious affiliation, that would serve to identify any individual." />
                      <outline text="&apos;(21) POPULATION SPECIFIC ORGANIZATION- The term &apos;population specific organization&apos; means a nonprofit, nongovernmental organization that primarily serves members of a specific underserved population and has demonstrated experience and expertise providing targeted services to members of that specific underserved population." />
                      <outline text="&apos;(22) POPULATION SPECIFIC SERVICES- The term &apos;population specific services&apos; means victim-centered services that address the safety, health, economic, legal, housing, workplace, immigration, confidentiality, or other needs of victims of domestic violence, dating violence, sexual assault, or stalking, and that are designed primarily for and are targeted to a specific underserved population.&apos;;" />
                      <outline text="(12) in paragraph (23), as redesignated, by striking &apos;services&apos; and inserting &apos;assistance&apos;;" />
                      <outline text="(13) by inserting after paragraph (24), as redesignated, the following:" />
                      <outline text="&apos;(25) RAPE CRISIS CENTER- The term &apos;rape crisis center&apos; means a nonprofit, nongovernmental, or tribal organization, or governmental entity in a State other than a Territory that provides intervention and related assistance, as specified in section 41601(b)(2)(C), to victims of sexual assault without regard to their age. In the case of a governmental entity, the entity may not be part of the criminal justice system (such as a law enforcement agency) and must be able to offer a comparable level of confidentiality as a nonprofit entity that provides similar victim services.&apos;;" />
                      <outline text="(14) in paragraph (26), as redesignated--" />
                      <outline text="(A) in subparagraph (A), by striking &apos;or&apos; after the semicolon;" />
                      <outline text="(B) in subparagraph (B), by striking the period and inserting &apos;; or&apos;; and" />
                      <outline text="(C) by inserting at the end the following:" />
                      <outline text="&apos;(C) any federally recognized Indian tribe.&apos;;" />
                      <outline text="(15) in paragraph (27), as redesignated--" />
                      <outline text="(A) by striking &apos;52&apos; and inserting &apos;57&apos;; and" />
                      <outline text="(B) by striking &apos;150,000&apos; and inserting &apos;250,000&apos;;" />
                      <outline text="(16) by inserting after paragraph (27), as redesignated, the following:" />
                      <outline text="&apos;(28) SEX TRAFFICKING- The term &apos;sex trafficking&apos; means any conduct proscribed by section 1591 of title 18, United States Code, whether or not the conduct occurs in interstate or foreign commerce or within the special maritime and territorial jurisdiction of the United States." />
                      <outline text="&apos;(29) SEXUAL ASSAULT- The term &apos;sexual assault&apos; means any nonconsensual sexual act proscribed by Federal, tribal, or State law, including when the victim lacks capacity to consent.&apos;;" />
                      <outline text="(17) by inserting after paragraph (34), as redesignated, the following:" />
                      <outline text="&apos;(35) TRIBAL COALITION- The term &apos;tribal coalition&apos; means an established nonprofit, nongovernmental Indian organization, Alaska Native organization, or a Native Hawaiian organization that--" />
                      <outline text="&apos;(A) provides education, support, and technical assistance to member Indian service providers in a manner that enables those member providers to establish and maintain culturally appropriate services, including shelter and rape crisis services, designed to assist Indian women and the dependents of those women who are victims of domestic violence, dating violence, sexual assault, and stalking; and" />
                      <outline text="&apos;(B) is comprised of board and general members that are representative of--" />
                      <outline text="&apos;(i) the member service providers described in subparagraph (A); and" />
                      <outline text="&apos;(ii) the tribal communities in which the services are being provided.&apos;;" />
                      <outline text="(18) by inserting after paragraph (38), as redesignated, the following:" />
                      <outline text="&apos;(39) UNDERSERVED POPULATIONS- The term &apos;underserved populations&apos; means populations who face barriers in accessing and using victim services, and includes populations underserved because of geographic location, religion, sexual orientation, gender identity, underserved racial and ethnic populations, populations underserved because of special needs (such as language barriers, disabilities, alienage status, or age), and any other population determined to be underserved by the Attorney General or by the Secretary of Health and Human Services, as appropriate." />
                      <outline text="&apos;(40) UNIT OF LOCAL GOVERNMENT- The term &apos;unit of local government&apos; means any city, county, township, town, borough, parish, village, or other general purpose political subdivision of a State.&apos;; and" />
                      <outline text="(19) by inserting after paragraph (42), as redesignated, the following:" />
                      <outline text="&apos;(43) VICTIM SERVICE PROVIDER- The term &apos;victim service provider&apos; means a nonprofit, nongovernmental or tribal organization or rape crisis center, including a State or tribal coalition, that assists or advocates for domestic violence, dating violence, sexual assault, or stalking victims, including domestic violence shelters, faith-based organizations, and other organizations, with a documented history of effective work concerning domestic violence, dating violence, sexual assault, or stalking." />
                      <outline text="&apos;(44) VICTIM SERVICES OR SERVICES- The terms &apos;victim services&apos; and &apos;services&apos; mean services provided to victims of domestic violence, dating violence, sexual assault, or stalking, including telephonic or web-based hotlines, legal advocacy, economic advocacy, emergency and transitional shelter, accompaniment and advocacy through medical, civil or criminal justice, immigration, and social support systems, crisis intervention, short-term individual and group support services, information and referrals, culturally specific services, population specific services, and other related supportive services." />
                      <outline text="&apos;(45) YOUTH- The term &apos;youth&apos; means a person who is 11 to 24 years old.&apos;." />
                      <outline text="(b) Grants Conditions- Subsection (b) of section 40002 of the Violence Against Women Act of 1994 (42 U.S.C. 13925(b)) is amended--" />
                      <outline text="(1) in paragraph (2)--" />
                      <outline text="(A) in subparagraph (B), by striking clauses (i) and (ii) and inserting the following:" />
                      <outline text="&apos;(i) disclose, reveal, or release any personally identifying information or individual information collected in connection with services requested, utilized, or denied through grantees&apos; and subgrantees&apos; programs, regardless of whether the information has been encoded, encrypted, hashed, or otherwise protected; or" />
                      <outline text="&apos;(ii) disclose, reveal, or release individual client information without the informed, written, reasonably time-limited consent of the person (or in the case of an unemancipated minor, the minor and the parent or guardian or in the case of legal incapacity, a court-appointed guardian) about whom information is sought, whether for this program or any other Federal, State, tribal, or territorial grant program, except that consent for release may not be given by the abuser of the minor, incapacitated person, or the abuser of the other parent of the minor." />
                      <outline text="If a minor or a person with a legally appointed guardian is permitted by law to receive services without the parent&apos;s or guardian&apos;s consent, the minor or person with a guardian may release information without additional consent.&apos;;" />
                      <outline text="(B) by amending subparagraph (D), to read as follows:" />
                      <outline text="&apos;(D) INFORMATION SHARING-" />
                      <outline text="&apos;(i) Grantees and subgrantees may share--" />
                      <outline text="&apos;(I) nonpersonally identifying data in the aggregate regarding services to their clients and nonpersonally identifying demographic information in order to comply with Federal, State, tribal, or territorial reporting, evaluation, or data collection requirements;" />
                      <outline text="&apos;(II) court-generated information and law enforcement-generated information contained in secure, governmental registries for protection order enforcement purposes; and" />
                      <outline text="&apos;(III) law enforcement-generated and prosecution-generated information necessary for law enforcement and prosecution purposes." />
                      <outline text="&apos;(ii) In no circumstances may--" />
                      <outline text="&apos;(I) an adult, youth, or child victim of domestic violence, dating violence, sexual assault, or stalking be required to provide a consent to release his or her personally identifying information as a condition of eligibility for the services provided by the grantee or subgrantee;" />
                      <outline text="&apos;(II) any personally identifying information be shared in order to comply with Federal, tribal, or State reporting, evaluation, or data collection requirements, whether for this program or any other Federal, tribal, or State grant program.&apos;;" />
                      <outline text="(C) by redesignating subparagraph (E) as subparagraph (F);" />
                      <outline text="(D) by inserting after subparagraph (D) the following:" />
                      <outline text="&apos;(E) STATUTORILY MANDATED REPORTS OF ABUSE OR NEGLECT- Nothing in this section prohibits a grantee or subgrantee from reporting suspected abuse or neglect, as those terms are defined and specifically mandated by the State or tribe involved.&apos;; and" />
                      <outline text="(E) by inserting after subparagraph (F), as redesignated, the following:" />
                      <outline text="&apos;(G) CONFIDENTIALITY ASSESSMENT AND ASSURANCES- Grantees and subgrantees must document their compliance with the confidentiality and privacy provisions required under this section.&apos;;" />
                      <outline text="(2) by striking paragraph (3) and inserting the following:" />
                      <outline text="&apos;(3) APPROVED ACTIVITIES- In carrying out the activities under this title, grantees and subgrantees may collaborate with or provide information to Federal, State, local, tribal, and territorial public officials and agencies to develop and implement policies and develop and promote State, local, or tribal legislation or model codes designed to reduce or eliminate domestic violence, dating violence, sexual assault, and stalking.&apos;;" />
                      <outline text="(3) in paragraph (7), by inserting at the end the following:" />
                      <outline text="&apos;Final reports of such evaluations shall be made available to the public via the agency&apos;s website.&apos;; and" />
                      <outline text="(4) by inserting after paragraph (11) the following:" />
                      <outline text="&apos;(12) DELIVERY OF LEGAL ASSISTANCE- Any grantee or subgrantee providing legal assistance with funds awarded under this title shall comply with the eligibility requirements in section 1201(d) of the Violence Against Women Act of 2000 (42 U.S.C. 3796gg-6(d))." />
                      <outline text="&apos;(13) CIVIL RIGHTS-" />
                      <outline text="&apos;(A) NONDISCRIMINATION- No person in the United States shall, on the basis of actual or perceived race, color, religion, national origin, sex, gender identity (as defined in paragraph 249(c)(4) of title 18, United States Code), sexual orientation, or disability, be excluded from participation in, be denied the benefits of, or be subjected to discrimination under any program or activity funded in whole or in part with funds made available under the Violence Against Women Act of 1994 (title IV of Public Law 103-322; 108 Stat. 1902), the Violence Against Women Act of 2000 (division B of Public Law 106-386; 114 Stat. 1491), the Violence Against Women and Department of Justice Reauthorization Act of 2005 (title IX of Public Law 109-162; 119 Stat. 3080), the Violence Against Women Reauthorization Act of 2013, and any other program or activity funded in whole or in part with funds appropriated for grants, cooperative agreements, and other assistance administered by the Office on Violence Against Women." />
                      <outline text="&apos;(B) EXCEPTION- If sex segregation or sex-specific programming is necessary to the essential operation of a program, nothing in this paragraph shall prevent any such program or activity from consideration of an individual&apos;s sex. In such circumstances, grantees may meet the requirements of this paragraph by providing comparable services to individuals who cannot be provided with the sex-segregated or sex-specific programming." />
                      <outline text="&apos;(C) DISCRIMINATION- The authority of the Attorney General and the Office of Justice Programs to enforce this paragraph shall be the same as it is under section 3789d of title 42, United States Code." />
                      <outline text="&apos;(D) CONSTRUCTION- Nothing contained in this paragraph shall be construed, interpreted, or applied to supplant, displace, preempt, or otherwise diminish the responsibilities and liabilities under other State or Federal civil rights law, whether statutory or common." />
                      <outline text="&apos;(14) CLARIFICATION OF VICTIM SERVICES AND LEGAL ASSISTANCE- Victim services and legal assistance under this title also include services and assistance to victims of domestic violence, dating violence, sexual assault, or stalking who are also victims of severe forms of trafficking in persons as defined by section 103 of the Trafficking Victims Protection Act of 2000 (22 U.S.C. 7102)." />
                      <outline text="&apos;(15) CONFERRAL-" />
                      <outline text="&apos;(A) IN GENERAL- The Office on Violence Against Women shall establish a biennial conferral process with State and tribal coalitions and technical assistance providers who receive funding through grants administered by the Office on Violence Against Women and authorized by this Act, and other key stakeholders." />
                      <outline text="&apos;(B) AREAS COVERED- The areas of conferral under this paragraph shall include--" />
                      <outline text="&apos;(i) the administration of grants;" />
                      <outline text="&apos;(ii) unmet needs;" />
                      <outline text="&apos;(iii) promising practices in the field; and" />
                      <outline text="&apos;(iv) emerging trends." />
                      <outline text="&apos;(C) INITIAL CONFERRAL- The first conferral shall be initiated not later than 6 months after the date of enactment of the Violence Against Women Reauthorization Act of 2013." />
                      <outline text="&apos;(D) REPORT- Not later than 90 days after the conclusion of each conferral period, the Office on Violence Against Women shall publish a comprehensive report that--" />
                      <outline text="&apos;(i) summarizes the issues presented during conferral and what, if any, policies it intends to implement to address those issues;" />
                      <outline text="&apos;(ii) is made available to the public on the Office on Violence Against Women&apos;s website and submitted to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives." />
                      <outline text="&apos;(16) ACCOUNTABILITY- All grants awarded by the Attorney General under this Act shall be subject to the following accountability provisions:" />
                      <outline text="&apos;(A) AUDIT REQUIREMENT-" />
                      <outline text="&apos;(i) IN GENERAL- Beginning in the first fiscal year beginning after the date of the enactment of this Act, and in each fiscal year thereafter, the Inspector General of the Department of Justice shall conduct audits of recipients of grants under this Act to prevent waste, fraud, and abuse of funds by grantees. The Inspector General shall determine the appropriate number of grantees to be audited each year." />
                      <outline text="&apos;(ii) DEFINITION- In this paragraph, the term &apos;unresolved audit finding&apos; means a finding in the final audit report of the Inspector General of the Department of Justice that the audited grantee has utilized grant funds for an unauthorized expenditure or otherwise unallowable cost that is not closed or resolved within 12 months from the date when the final audit report is issued." />
                      <outline text="&apos;(iii) MANDATORY EXCLUSION- A recipient of grant funds under this Act that is found to have an unresolved audit finding shall not be eligible to receive grant funds under this Act during the following 2 fiscal years." />
                      <outline text="&apos;(iv) PRIORITY- In awarding grants under this Act, the Attorney General shall give priority to eligible entities that did not have an unresolved audit finding during the 3 fiscal years prior to submitting an application for a grant under this Act." />
                      <outline text="&apos;(v) REIMBURSEMENT- If an entity is awarded grant funds under this Act during the 2-fiscal-year period in which the entity is barred from receiving grants under paragraph (2), the Attorney General shall--" />
                      <outline text="&apos;(I) deposit an amount equal to the grant funds that were improperly awarded to the grantee into the General Fund of the Treasury; and" />
                      <outline text="&apos;(II) seek to recoup the costs of the repayment to the fund from the grant recipient that was erroneously awarded grant funds." />
                      <outline text="&apos;(B) NONPROFIT ORGANIZATION REQUIREMENTS-" />
                      <outline text="&apos;(i) DEFINITION- For purposes of this paragraph and the grant programs described in this Act, the term &apos;nonprofit organization&apos; means an organization that is described in section 501(c)(3) of the Internal Revenue Code of 1986 and is exempt from taxation under section 501(a) of such Code." />
                      <outline text="&apos;(ii) PROHIBITION- The Attorney General may not award a grant under any grant program described in this Act to a nonprofit organization that holds money in offshore accounts for the purpose of avoiding paying the tax described in section 511(a) of the Internal Revenue Code of 1986." />
                      <outline text="&apos;(iii) DISCLOSURE- Each nonprofit organization that is awarded a grant under a grant program described in this Act and uses the procedures prescribed in regulations to create a rebuttable presumption of reasonableness for the compensation of its officers, directors, trustees and key employees, shall disclose to the Attorney General, in the application for the grant, the process for determining such compensation, including the independent persons involved in reviewing and approving such compensation, the comparability data used, and contemporaneous substantiation of the deliberation and decision. Upon request, the Attorney General shall make the information disclosed under this subsection available for public inspection." />
                      <outline text="&apos;(C) CONFERENCE EXPENDITURES-" />
                      <outline text="&apos;(i) LIMITATION- No amounts authorized to be appropriated to the Department of Justice under this Act may be used by the Attorney General, or by any individual or organization awarded discretionary funds through a cooperative agreement under this Act, to host or support any expenditure for conferences that uses more than $20,000 in Department funds, unless the Deputy Attorney General or such Assistant Attorney Generals, Directors, or principal deputies as the Deputy Attorney General may designate, provides prior written authorization that the funds may be expended to host a conference." />
                      <outline text="&apos;(ii) WRITTEN APPROVAL- Written approval under clause (i) shall include a written estimate of all costs associated with the conference, including the cost of all food and beverages, audiovisual equipment, honoraria for speakers, and any entertainment." />
                      <outline text="&apos;(iii) REPORT- The Deputy Attorney General shall submit an annual report to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives on all approved conference expenditures referenced in this paragraph." />
                      <outline text="&apos;(D) ANNUAL CERTIFICATION- Beginning in the first fiscal year beginning after the date of the enactment of this Act, the Attorney General shall submit, to the Committee on the Judiciary and the Committee on Appropriations of the Senate and the Committee on the Judiciary and the Committee on Appropriations of the House of Representatives, an annual certification that--" />
                      <outline text="&apos;(i) all audits issued by the Office of the Inspector General under paragraph (1) have been completed and reviewed by the appropriate Assistant Attorney General or Director;" />
                      <outline text="&apos;(ii) all mandatory exclusions required under subparagraph (A)(iii) have been issued;" />
                      <outline text="&apos;(iii) all reimbursements required under subparagraph (A)(v) have been made; and" />
                      <outline text="&apos;(iv) includes a list of any grant recipients excluded under subparagraph (A) from the previous year.&apos;." />
                      <outline text="Except as otherwise specifically provided in this Act, the provisions of titles I, II, III, IV, VII, and sections 3, 602, 901, and 902 of this Act shall not take effect until the beginning of the fiscal year following the date of enactment of this Act." />
                      <outline text="TITLE I--ENHANCING JUDICIAL AND LAW ENFORCEMENT TOOLS TO COMBAT VIOLENCE AGAINST WOMEN" />
                      <outline text="Title I of the Omnibus Crime Control and Safe Streets Act of 1968 (42 U.S.C. 3711 et seq.) is amended--" />
                      <outline text="(1) in section 1001(a)(18) (42 U.S.C. 3793(a)(18)), by striking &apos;$225,000,000 for each of fiscal years 2007 through 2011&apos; and inserting &apos;$222,000,000 for each of fiscal years 2014 through 2018&apos;;" />
                      <outline text="(2) in section 2001(b) (42 U.S.C. 3796gg(b))--" />
                      <outline text="(A) in the matter preceding paragraph (1)--" />
                      <outline text="(i) by striking &apos;equipment&apos; and inserting &apos;resources&apos;; and" />
                      <outline text="(ii) by inserting &apos;for the protection and safety of victims,&apos; after &apos;women,&apos;;" />
                      <outline text="(B) in paragraph (1), by striking &apos;sexual assault&apos; and all that follows through &apos;dating violence&apos; and inserting &apos;domestic violence, dating violence, sexual assault, and stalking, including the appropriate use of nonimmigrant status under subparagraphs (T) and (U) of section 101(a)(15) of the Immigration and Nationality Act (8 U.S.C. 1101(a))&apos;;" />
                      <outline text="(C) in paragraph (2), by striking &apos;sexual assault and domestic violence&apos; and inserting &apos;domestic violence, dating violence, sexual assault, and stalking&apos;;" />
                      <outline text="(D) in paragraph (3), by striking &apos;sexual assault and domestic violence&apos; and inserting &apos;domestic violence, dating violence, sexual assault, and stalking, as well as the appropriate treatment of victims&apos;;" />
                      <outline text="(E) in paragraph (4)--" />
                      <outline text="(i) by striking &apos;sexual assault and domestic violence&apos; and inserting &apos;domestic violence, dating violence, sexual assault, and stalking&apos;; and" />
                      <outline text="(ii) by inserting &apos;, classifying,&apos; after &apos;identifying&apos;;" />
                      <outline text="(F) in paragraph (5)--" />
                      <outline text="(i) by inserting &apos;and legal assistance&apos; after &apos;victim services&apos;;" />
                      <outline text="(ii) by striking &apos;domestic violence and dating violence&apos; and inserting &apos;domestic violence, dating violence, and stalking&apos;; and" />
                      <outline text="(iii) by striking &apos;sexual assault and domestic violence&apos; and inserting &apos;domestic violence, dating violence, sexual assault, and stalking&apos;;" />
                      <outline text="(G) by striking paragraph (6) and redesignating paragraphs (7) through (14) as paragraphs (6) through (13), respectively;" />
                      <outline text="(H) in paragraph (6), as redesignated by subparagraph (G), by striking &apos;sexual assault and domestic violence&apos; and inserting &apos;domestic violence, dating violence, sexual assault, and stalking&apos;;" />
                      <outline text="(I) in paragraph (7), as redesignated by subparagraph (G), by striking &apos;and dating violence&apos; and inserting &apos;dating violence, and stalking&apos;;" />
                      <outline text="(J) in paragraph (9), as redesignated by subparagraph (G), by striking &apos;domestic violence or sexual assault&apos; and inserting &apos; domestic violence, dating violence, sexual assault, or stalking&apos;;" />
                      <outline text="(K) in paragraph (12), as redesignated by subparagraph (G)--" />
                      <outline text="(i) in subparagraph (A), by striking &apos;triage protocols to ensure that dangerous or potentially lethal cases are identified and prioritized&apos; and inserting &apos;the use of evidence-based indicators to assess the risk of domestic and dating violence homicide and prioritize dangerous or potentially lethal cases&apos;; and" />
                      <outline text="(ii) by striking &apos;and&apos; at the end;" />
                      <outline text="(L) in paragraph (13), as redesignated by subparagraph (G)--" />
                      <outline text="(i) by striking &apos;to provide&apos; and inserting &apos;providing&apos;;" />
                      <outline text="(ii) by striking &apos;nonprofit nongovernmental&apos;;" />
                      <outline text="(iii) by striking the comma after &apos;local governments&apos;;" />
                      <outline text="(iv) in the matter following subparagraph (C), by striking &apos;paragraph (14)&apos; and inserting &apos;paragraph (13)&apos;; and" />
                      <outline text="(v) by striking the period at the end and inserting a semicolon; and" />
                      <outline text="(M) by inserting after paragraph (13), as redesignated by subparagraph (G), the following:" />
                      <outline text="&apos;(14) developing and promoting State, local, or tribal legislation and policies that enhance best practices for responding to domestic violence, dating violence, sexual assault, and stalking;" />
                      <outline text="&apos;(15) developing, implementing, or enhancing Sexual Assault Response Teams, or other similar coordinated community responses to sexual assault;" />
                      <outline text="&apos;(16) developing and strengthening policies, protocols, best practices, and training for law enforcement agencies and prosecutors relating to the investigation and prosecution of sexual assault cases and the appropriate treatment of victims;" />
                      <outline text="&apos;(17) developing, enlarging, or strengthening programs addressing sexual assault against men, women, and youth in correctional and detention settings;" />
                      <outline text="&apos;(18) identifying and conducting inventories of backlogs of sexual assault evidence collection kits and developing protocols and policies for responding to and addressing such backlogs, including protocols and policies for notifying and involving victims;" />
                      <outline text="&apos;(19) developing, enlarging, or strengthening programs and projects to provide services and responses targeting male and female victims of domestic violence, dating violence, sexual assault, or stalking, whose ability to access traditional services and responses is affected by their sexual orientation or gender identity, as defined in section 249(c) of title 18, United States Code; and" />
                      <outline text="&apos;(20) developing, enhancing, or strengthening prevention and educational programming to address domestic violence, dating violence, sexual assault, or stalking, with not more than 5 percent of the amount allocated to a State to be used for this purpose.&apos;;" />
                      <outline text="(3) in section 2007 (42 U.S.C. 3796gg-1)--" />
                      <outline text="(A) in subsection (a), by striking &apos;nonprofit nongovernmental victim service programs&apos; and inserting &apos;victim service providers&apos;;" />
                      <outline text="(B) in subsection (b)(6), by striking &apos;(not including populations of Indian tribes)&apos;;" />
                      <outline text="(C) in subsection (c)--" />
                      <outline text="(i) by striking paragraph (2) and inserting the following:" />
                      <outline text="&apos;(2) grantees and subgrantees shall develop a plan for implementation and shall consult and coordinate with--" />
                      <outline text="&apos;(A) the State sexual assault coalition;" />
                      <outline text="&apos;(B) the State domestic violence coalition;" />
                      <outline text="&apos;(C) the law enforcement entities within the State;" />
                      <outline text="&apos;(D) prosecution offices;" />
                      <outline text="&apos;(E) State and local courts;" />
                      <outline text="&apos;(F) Tribal governments in those States with State or federally recognized Indian tribes;" />
                      <outline text="&apos;(G) representatives from underserved populations, including culturally specific populations;" />
                      <outline text="&apos;(H) victim service providers;" />
                      <outline text="&apos;(I) population specific organizations; and" />
                      <outline text="&apos;(J) other entities that the State or the Attorney General identifies as needed for the planning process;&apos;;" />
                      <outline text="(ii) by redesignating paragraph (3) as paragraph (4);" />
                      <outline text="(iii) by inserting after paragraph (2), as amended by clause (i), the following:" />
                      <outline text="&apos;(3) grantees shall coordinate the State implementation plan described in paragraph (2) with the State plans described in section 307 of the Family Violence Prevention and Services Act (42 U.S.C. 10407) and the programs described in section 1404 of the Victims of Crime Act of 1984 (42 U.S.C. 10603) and section 393A of the Public Health Service Act (42 U.S.C. 280b-1b).&apos;;" />
                      <outline text="(iv) in paragraph (4), as redesignated by clause (ii)--" />
                      <outline text="(I) in subparagraph (A), by striking &apos;and not less than 25 percent shall be allocated for prosecutors&apos;;" />
                      <outline text="(II) by redesignating subparagraphs (B) and (C) as subparagraphs (C) and (D);" />
                      <outline text="(III) by inserting after subparagraph (A), the following:" />
                      <outline text="&apos;(B) not less than 25 percent shall be allocated for prosecutors;&apos;; and" />
                      <outline text="(IV) in subparagraph (D) as redesignated by subclause (II) by striking &apos;for&apos; and inserting &apos;to&apos;; and" />
                      <outline text="(v) by adding at the end the following:" />
                      <outline text="&apos;(5) not later than 2 years after the date of enactment of this Act, and every year thereafter, not less than 20 percent of the total amount granted to a State under this subchapter shall be allocated for programs or projects in 2 or more allocations listed in paragraph (4) that meaningfully address sexual assault, including stranger rape, acquaintance rape, alcohol or drug-facilitated rape, and rape within the context of an intimate partner relationship.&apos;;" />
                      <outline text="(D) by striking subsection (d) and inserting the following:" />
                      <outline text="&apos;(d) Application Requirements- An application for a grant under this section shall include--" />
                      <outline text="&apos;(1) the certifications of qualification required under subsection (c);" />
                      <outline text="&apos;(2) proof of compliance with the requirements for the payment of forensic medical exams and judicial notification, described in section 2010;" />
                      <outline text="&apos;(3) proof of compliance with the requirements for paying fees and costs relating to domestic violence and protection order cases, described in section 2011 of this title;" />
                      <outline text="&apos;(4) proof of compliance with the requirements prohibiting polygraph examinations of victims of sexual assault, described in section 2013 of this title;" />
                      <outline text="&apos;(5) an implementation plan required under subsection (i); and" />
                      <outline text="&apos;(6) any other documentation that the Attorney General may require.&apos;;" />
                      <outline text="(E) in subsection (e)--" />
                      <outline text="(i) in paragraph (2)--" />
                      <outline text="(I) in subparagraph (A), by striking &apos;domestic violence and sexual assault&apos; and inserting &apos;domestic violence, dating violence, sexual assault, and stalking&apos;; and" />
                      <outline text="(II) in subparagraph (D), by striking &apos;linguistically and&apos;; and" />
                      <outline text="(ii) by adding at the end the following:" />
                      <outline text="&apos;(3) CONDITIONS- In disbursing grants under this part, the Attorney General may impose reasonable conditions on grant awards to ensure that the States meet statutory, regulatory, and other program requirements.&apos;;" />
                      <outline text="(F) in subsection (f), by striking the period at the end and inserting &apos;, except that, for purposes of this subsection, the costs of the projects for victim services or tribes for which there is an exemption under section 40002(b)(1) of the Violence Against Women Act of 1994 (42 U.S.C. 13925(b)(1)) shall not count toward the total costs of the projects.&apos;; and" />
                      <outline text="(G) by adding at the end the following:" />
                      <outline text="&apos;(i) Implementation Plans- A State applying for a grant under this part shall--" />
                      <outline text="&apos;(1) develop an implementation plan in consultation with the entities listed in subsection (c)(2), that identifies how the State will use the funds awarded under this part, including how the State will meet the requirements of subsection (c)(5); and" />
                      <outline text="&apos;(2) submit to the Attorney General--" />
                      <outline text="&apos;(A) the implementation plan developed under paragraph (1);" />
                      <outline text="&apos;(B) documentation from each member of the planning committee as to their participation in the planning process;" />
                      <outline text="&apos;(C) documentation from the prosecution, law enforcement, court, and victim services programs to be assisted, describing--" />
                      <outline text="&apos;(i) the need for the grant funds;" />
                      <outline text="&apos;(ii) the intended use of the grant funds;" />
                      <outline text="&apos;(iii) the expected result of the grant funds; and" />
                      <outline text="&apos;(iv) the demographic characteristics of the populations to be served, including age, disability, race, ethnicity, and language background;" />
                      <outline text="&apos;(D) a description of how the State will ensure that any subgrantees will consult with victim service providers during the course of developing their grant applications in order to ensure that the proposed activities are designed to promote the safety, confidentiality, and economic independence of victims;" />
                      <outline text="&apos;(E) demographic data on the distribution of underserved populations within the State and a description of how the State will meet the needs of underserved populations, including the minimum allocation for population specific services required under subsection (c)(4)(C);" />
                      <outline text="&apos;(F) a description of how the State plans to meet the regulations issued pursuant to subsection (e)(2);" />
                      <outline text="&apos;(G) goals and objectives for reducing domestic violence-related homicides within the State; and" />
                      <outline text="&apos;(H) any other information requested by the Attorney General." />
                      <outline text="&apos;(j) Reallocation of Funds- A State may use any returned or remaining funds for any authorized purpose under this part if--" />
                      <outline text="&apos;(1) funds from a subgrant awarded under this part are returned to the State; or" />
                      <outline text="&apos;(2) the State does not receive sufficient eligible applications to award the full funding within the allocations in subsection (c)(4)&apos;;" />
                      <outline text="(4) in section 2010 (42 U.S.C. 3796gg-4)--" />
                      <outline text="(A) in subsection (a), by striking paragraph (1) and inserting the following:" />
                      <outline text="&apos;(1) IN GENERAL- A State, Indian tribal government, or unit of local government shall not be entitled to funds under this subchapter unless the State, Indian tribal government, unit of local government, or another governmental entity--" />
                      <outline text="&apos;(A) incurs the full out-of-pocket cost of forensic medical exams described in subsection (b) for victims of sexual assault; and" />
                      <outline text="&apos;(B) coordinates with health care providers in the region to notify victims of sexual assault of the availability of rape exams at no cost to the victims.&apos;;" />
                      <outline text="(B) in subsection (b)--" />
                      <outline text="(i) in paragraph (1), by inserting &apos;or&apos; after the semicolon;" />
                      <outline text="(ii) in paragraph (2), by striking &apos;; or&apos; and inserting a period; and" />
                      <outline text="(iii) by striking paragraph (3); and" />
                      <outline text="(C) by amending subsection (d) to read as follows:" />
                      <outline text="&apos;(d) Noncooperation-" />
                      <outline text="&apos;(1) IN GENERAL- To be in compliance with this section, a State, Indian tribal government, or unit of local government shall comply with subsection (b) without regard to whether the victim participates in the criminal justice system or cooperates with law enforcement." />
                      <outline text="&apos;(2) COMPLIANCE PERIOD- States, territories, and Indian tribal governments shall have 3 years from the date of enactment of this Act to come into compliance with this section.&apos;; and" />
                      <outline text="(5) in section 2011(a)(1) (42 U.S.C. 3796gg-5(a)(1))--" />
                      <outline text="(A) by inserting &apos;modification, enforcement, dismissal, withdrawal&apos; after &apos;registration,&apos; each place it appears;" />
                      <outline text="(B) by inserting &apos;, dating violence, sexual assault, or stalking&apos; after &apos;felony domestic violence&apos;; and" />
                      <outline text="(C) by striking &apos;victim of domestic violence&apos; and all that follows through &apos;sexual assault&apos; and inserting &apos;victim of domestic violence, dating violence, sexual assault, or stalking&apos;." />
                      <outline text="SEC. 102. GRANTS TO ENCOURAGE ARREST POLICIES AND ENFORCEMENT OF PROTECTION ORDERS." />
                      <outline text="(a) In General- Part U of title I of the Omnibus Crime Control and Safe Streets Act of 1968 (42 U.S.C. 3796hh et seq.) is amended--" />
                      <outline text="(1) in section 2101 (42 U.S.C. 3796hh)--" />
                      <outline text="(A) in subsection (b)--" />
                      <outline text="(i) in the matter preceding paragraph (1), by striking &apos;States,&apos; and all that follows through &apos;units of local government&apos; and inserting &apos;grantees&apos;;" />
                      <outline text="(ii) in paragraph (1), by inserting &apos;and enforcement of protection orders across State and tribal lines&apos; before the period;" />
                      <outline text="(iii) in paragraph (2), by striking &apos;and training in police departments to improve tracking of cases&apos; and inserting &apos;data collection systems, and training in police departments to improve tracking of cases and classification of complaints&apos;;" />
                      <outline text="(iv) in paragraph (4), by inserting &apos;and provide the appropriate training and education about domestic violence, dating violence, sexual assault, and stalking&apos; after &apos;computer tracking systems&apos;;" />
                      <outline text="(v) in paragraph (5), by inserting &apos;and other victim services&apos; after &apos;legal advocacy service programs&apos;;" />
                      <outline text="(vi) in paragraph (6), by striking &apos;judges&apos; and inserting &apos;Federal, State, tribal, territorial, and local judges, courts, and court-based and court-related personnel&apos;;" />
                      <outline text="(vii) in paragraph (8), by striking &apos;and sexual assault&apos; and inserting &apos;dating violence, sexual assault, and stalking&apos;;" />
                      <outline text="(viii) in paragraph (10), by striking &apos;non-profit, non-governmental victim services organizations,&apos; and inserting &apos;victim service providers, staff from population specific organizations,&apos;; and" />
                      <outline text="(ix) by adding at the end the following:" />
                      <outline text="&apos;(14) To develop and implement training programs for prosecutors and other prosecution-related personnel regarding best practices to ensure offender accountability, victim safety, and victim consultation in cases involving domestic violence, dating violence, sexual assault, and stalking." />
                      <outline text="&apos;(15) To develop or strengthen policies, protocols, and training for law enforcement, prosecutors, and the judiciary in recognizing, investigating, and prosecuting instances of domestic violence, dating violence, sexual assault, and stalking against immigrant victims, including the appropriate use of applications for nonimmigrant status under subparagraphs (T) and (U) of section 101(a)(15) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(15))." />
                      <outline text="&apos;(16) To develop and promote State, local, or tribal legislation and policies that enhance best practices for responding to the crimes of domestic violence, dating violence, sexual assault, and stalking, including the appropriate treatment of victims." />
                      <outline text="&apos;(17) To develop, implement, or enhance sexual assault nurse examiner programs or sexual assault forensic examiner programs, including the hiring and training of such examiners." />
                      <outline text="&apos;(18) To develop, implement, or enhance Sexual Assault Response Teams or similar coordinated community responses to sexual assault." />
                      <outline text="&apos;(19) To develop and strengthen policies, protocols, and training for law enforcement officers and prosecutors regarding the investigation and prosecution of sexual assault cases and the appropriate treatment of victims." />
                      <outline text="&apos;(20) To provide human immunodeficiency virus testing programs, counseling, and prophylaxis for victims of sexual assault." />
                      <outline text="&apos;(21) To identify and inventory backlogs of sexual assault evidence collection kits and to develop protocols for responding to and addressing such backlogs, including policies and protocols for notifying and involving victims." />
                      <outline text="&apos;(22) To develop multidisciplinary high-risk teams focusing on reducing domestic violence and dating violence homicides by--" />
                      <outline text="&apos;(A) using evidence-based indicators to assess the risk of homicide and link high-risk victims to immediate crisis intervention services;" />
                      <outline text="&apos;(B) identifying and managing high-risk offenders; and" />
                      <outline text="&apos;(C) providing ongoing victim advocacy and referrals to comprehensive services including legal, housing, health care, and economic assistance.&apos;;" />
                      <outline text="(B) in subsection (c)--" />
                      <outline text="(i) in paragraph (1)--" />
                      <outline text="(I) in the matter preceding subparagraph (A), by inserting &apos;except for a court,&apos; before &apos;certify&apos;; and" />
                      <outline text="(II) by redesignating subparagraphs (A) and (B) as clauses (i) and (ii), and adjusting the margin accordingly;" />
                      <outline text="(ii) in paragraph (2), by inserting &apos;except for a court,&apos; before &apos;demonstrate&apos;;" />
                      <outline text="(iii) in paragraph (3)--" />
                      <outline text="(I) by striking &apos;spouses&apos; each place it appears and inserting &apos;parties&apos;; and" />
                      <outline text="(II) by striking &apos;spouse&apos; and inserting &apos;party&apos;;" />
                      <outline text="(iv) in paragraph (4)--" />
                      <outline text="(I) by inserting &apos;, dating violence, sexual assault, or stalking&apos; after &apos;felony domestic violence&apos;;" />
                      <outline text="(II) by inserting &apos;modification, enforcement, dismissal,&apos; after &apos;registration,&apos; each place it appears;" />
                      <outline text="(III) by inserting &apos;dating violence,&apos; after &apos;victim of domestic violence,&apos;; and" />
                      <outline text="(IV) by striking &apos;and&apos; at the end;" />
                      <outline text="(v) in paragraph (5)--" />
                      <outline text="(I) in the matter preceding subparagraph (A), by striking &apos;, not later than 3 years after January 5, 2006&apos;;" />
                      <outline text="(II) by inserting &apos;, trial of, or sentencing for&apos; after &apos;investigation of&apos; each place it appears;" />
                      <outline text="(III) by redesignating subparagraphs (A) and (B) as clauses (i) and (ii), and adjusting the margin accordingly;" />
                      <outline text="(IV) in clause (ii), as redesignated by subclause (III) of this clause, by striking &apos;subparagraph (A)&apos; and inserting &apos;clause (i)&apos;; and" />
                      <outline text="(V) by striking the period at the end and inserting &apos;; and&apos;;" />
                      <outline text="(vi) by redesignating paragraphs (1) through (5), as amended by this subparagraph, as subparagraphs (A) through (E), respectively;" />
                      <outline text="(vii) in the matter preceding subparagraph (A), as redesignated by clause (v) of this subparagraph--" />
                      <outline text="(I) by striking the comma that immediately follows another comma; and" />
                      <outline text="(II) by striking &apos;grantees are States&apos; and inserting the following: &apos;grantees are--" />
                      <outline text="&apos;(1) States&apos;; and" />
                      <outline text="(viii) by adding at the end the following:" />
                      <outline text="&apos;(2) a State, tribal, or territorial domestic violence or sexual assault coalition or a victim service provider that partners with a State, Indian tribal government, or unit of local government that certifies that the State, Indian tribal government, or unit of local government meets the requirements under paragraph (1).&apos;;" />
                      <outline text="(C) in subsection (d)--" />
                      <outline text="(i) in paragraph (1)--" />
                      <outline text="(I) in the matter preceding subparagraph (A), by inserting &apos;, policy,&apos; after &apos;law&apos;; and" />
                      <outline text="(II) in subparagraph (A), by inserting &apos;and the defendant is in custody or has been served with the information or indictment&apos; before the semicolon; and" />
                      <outline text="(ii) in paragraph (2), by striking &apos;it&apos; and inserting &apos;its&apos;; and" />
                      <outline text="(D) by adding at the end the following:" />
                      <outline text="&apos;(f) Allocation for Tribal Coalitions- Of the amounts appropriated for purposes of this part for each fiscal year, not less than 5 percent shall be available for grants under section 2001 of title I of the Omnibus Crime Control and Safe Streets Act of 1968 (42 U.S.C. 3796gg)." />
                      <outline text="&apos;(g) Allocation for Sexual Assault- Of the amounts appropriated for purposes of this part for each fiscal year, not less than 25 percent shall be available for projects that address sexual assault, including stranger rape, acquaintance rape, alcohol or drug-facilitated rape, and rape within the context of an intimate partner relationship.&apos;; and" />
                      <outline text="(2) in section 2102(a) (42 U.S.C. 3796hh-1(a))--" />
                      <outline text="(A) in paragraph (1), by inserting &apos;court,&apos; after &apos;tribal government,&apos;; and" />
                      <outline text="(B) in paragraph (4), by striking &apos;nonprofit, private sexual assault and domestic violence programs&apos; and inserting &apos;victim service providers and, as appropriate, population specific organizations&apos;." />
                      <outline text="(b) Authorization of Appropriations- Section 1001(a)(19) of title I of the Omnibus Crime Control and Safe Streets Act of 1968 (42 U.S.C. 3793(a)(19)) is amended--" />
                      <outline text="(1) by striking &apos;$75,000,000&apos; and all that follows through &apos;2011.&apos; and inserting &apos;$73,000,000 for each of fiscal years 2014 through 2018.&apos;; and" />
                      <outline text="(2) by striking the period that immediately follows another period." />
                      <outline text="SEC. 103. LEGAL ASSISTANCE FOR VICTIMS." />
                      <outline text="Section 1201 of the Violence Against Women Act of 2000 (42 U.S.C. 3796gg-6) is amended--" />
                      <outline text="(1) in subsection (a)--" />
                      <outline text="(A) in the first sentence, by striking &apos;arising as a consequence of&apos; and inserting &apos;relating to or arising out of&apos;; and" />
                      <outline text="(B) in the second sentence, by inserting &apos;or arising out of&apos; after &apos;relating to&apos;;" />
                      <outline text="(2) in subsection (b)--" />
                      <outline text="(A) in the heading, by inserting &apos;and Grant Conditions&apos; after &apos;Definitions&apos;; and" />
                      <outline text="(B) by inserting &apos;and grant conditions&apos; after &apos;definitions&apos;;" />
                      <outline text="(3) in subsection (c)--" />
                      <outline text="(A) in paragraph (1), by striking &apos;victims services organizations&apos; and inserting &apos;victim service providers&apos;; and" />
                      <outline text="(B) by striking paragraph (3) and inserting the following:" />
                      <outline text="&apos;(3) to implement, expand, and establish efforts and projects to provide competent, supervised pro bono legal assistance for victims of domestic violence, dating violence, sexual assault, or stalking, except that not more than 10 percent of the funds awarded under this section may be used for the purpose described in this paragraph.&apos;;" />
                      <outline text="(4) in subsection (d)--" />
                      <outline text="(A) in paragraph (1), by striking &apos;this section has completed&apos; and all that follows and inserting the following: &apos;this section--&apos;" />
                      <outline text="&apos;(A) has demonstrated expertise in providing legal assistance to victims of domestic violence, dating violence, sexual assault, or stalking in the targeted population; or" />
                      <outline text="&apos;(B)(i) is partnered with an entity or person that has demonstrated expertise described in subparagraph (A); and" />
                      <outline text="&apos;(ii) has completed, or will complete, training in connection with domestic violence, dating violence, stalking, or sexual assault and related legal issues, including training on evidence-based risk factors for domestic and dating violence homicide;&apos;; and" />
                      <outline text="(B) in paragraph (2), by striking &apos;stalking organization&apos; and inserting &apos;stalking victim service provider&apos;; and" />
                      <outline text="(5) in subsection (f) in paragraph (1), by striking &apos;this section&apos; and all that follows and inserting the following: &apos;this section $57,000,000 for each of fiscal years 2014 through 2018.&apos;." />
                      <outline text="SEC. 104. CONSOLIDATION OF GRANTS TO SUPPORT FAMILIES IN THE JUSTICE SYSTEM." />
                      <outline text="(a) In General- Title III of division B of the Victims of Trafficking and Violence Protection Act of 2000 (Public Law 106-386; 114 Stat. 1509) is amended by striking the section preceding section 1302 (42 U.S.C. 10420), as amended by section 306 of the Violence Against Women and Department of Justice Reauthorization Act of 2005 (Public Law 109-162; 119 Stat. 316), and inserting the following:" />
                      <outline text="&apos;SEC. 1301. GRANTS TO SUPPORT FAMILIES IN THE JUSTICE SYSTEM." />
                      <outline text="&apos;(a) In General- The Attorney General may make grants to States, units of local government, courts (including juvenile courts), Indian tribal governments, nonprofit organizations, legal services providers, and victim services providers to improve the response of all aspects of the civil and criminal justice system to families with a history of domestic violence, dating violence, sexual assault, or stalking, or in cases involving allegations of child sexual abuse." />
                      <outline text="&apos;(b) Use of Funds- A grant under this section may be used to--" />
                      <outline text="&apos;(1) provide supervised visitation and safe visitation exchange of children and youth by and between parents in situations involving domestic violence, dating violence, child sexual abuse, sexual assault, or stalking;" />
                      <outline text="&apos;(2) develop and promote State, local, and tribal legislation, policies, and best practices for improving civil and criminal court functions, responses, practices, and procedures in cases involving a history of domestic violence or sexual assault, or in cases involving allegations of child sexual abuse, including cases in which the victim proceeds pro se;" />
                      <outline text="&apos;(3) educate court-based and court-related personnel and court-appointed personnel (including custody evaluators and guardians ad litem) and child protective services workers on the dynamics of domestic violence, dating violence, sexual assault, and stalking, including information on perpetrator behavior, evidence-based risk factors for domestic and dating violence homicide, and on issues relating to the needs of victims, including safety, security, privacy, and confidentiality, including cases in which the victim proceeds pro se;" />
                      <outline text="&apos;(4) provide appropriate resources in juvenile court matters to respond to dating violence, domestic violence, sexual assault (including child sexual abuse), and stalking and ensure necessary services dealing with the health and mental health of victims are available;" />
                      <outline text="&apos;(5) enable courts or court-based or court-related programs to develop or enhance--" />
                      <outline text="&apos;(A) court infrastructure (such as specialized courts, consolidated courts, dockets, intake centers, or interpreter services);" />
                      <outline text="&apos;(B) community-based initiatives within the court system (such as court watch programs, victim assistants, pro se victim assistance programs, or community-based supplementary services);" />
                      <outline text="&apos;(C) offender management, monitoring, and accountability programs;" />
                      <outline text="&apos;(D) safe and confidential information-storage and information-sharing databases within and between court systems;" />
                      <outline text="&apos;(E) education and outreach programs to improve community access, including enhanced access for underserved populations; and" />
                      <outline text="&apos;(F) other projects likely to improve court responses to domestic violence, dating violence, sexual assault, and stalking;" />
                      <outline text="&apos;(6) provide civil legal assistance and advocacy services, including legal information and resources in cases in which the victim proceeds pro se, to--" />
                      <outline text="&apos;(A) victims of domestic violence; and" />
                      <outline text="&apos;(B) nonoffending parents in matters--" />
                      <outline text="&apos;(i) that involve allegations of child sexual abuse;" />
                      <outline text="&apos;(ii) that relate to family matters, including civil protection orders, custody, and divorce; and" />
                      <outline text="&apos;(iii) in which the other parent is represented by counsel;" />
                      <outline text="&apos;(7) collect data and provide training and technical assistance, including developing State, local, and tribal model codes and policies, to improve the capacity of grantees and communities to address the civil justice needs of victims of domestic violence, dating violence, sexual assault, and stalking who have legal representation, who are proceeding pro se, or who are proceeding with the assistance of a legal advocate; and" />
                      <outline text="&apos;(8) to improve training and education to assist judges, judicial personnel, attorneys, child welfare personnel, and legal advocates in the civil justice system." />
                      <outline text="&apos;(c) Considerations-" />
                      <outline text="&apos;(1) IN GENERAL- In making grants for purposes described in paragraphs (1) through (7) of subsection (b), the Attorney General shall consider--" />
                      <outline text="&apos;(A) the number of families to be served by the proposed programs and services;" />
                      <outline text="&apos;(B) the extent to which the proposed programs and services serve underserved populations;" />
                      <outline text="&apos;(C) the extent to which the applicant demonstrates cooperation and collaboration with nonprofit, nongovernmental entities in the local community with demonstrated histories of effective work on domestic violence, dating violence, sexual assault, or stalking, including State or tribal domestic violence coalitions, State or tribal sexual assault coalitions, local shelters, and programs for domestic violence and sexual assault victims; and" />
                      <outline text="&apos;(D) the extent to which the applicant demonstrates coordination and collaboration with State, tribal, and local court systems, including mechanisms for communication and referral." />
                      <outline text="&apos;(2) OTHER GRANTS- In making grants under subsection (b)(8) the Attorney General shall take into account the extent to which the grantee has expertise addressing the judicial system&apos;s handling of family violence, child custody, child abuse and neglect, adoption, foster care, supervised visitation, divorce, and parentage." />
                      <outline text="&apos;(d) Applicant Requirements- The Attorney General may make a grant under this section to an applicant that--" />
                      <outline text="&apos;(1) demonstrates expertise in the areas of domestic violence, dating violence, sexual assault, stalking, or child sexual abuse, as appropriate;" />
                      <outline text="&apos;(2) ensures that any fees charged to individuals for use of supervised visitation programs and services are based on the income of those individuals, unless otherwise provided by court order;" />
                      <outline text="&apos;(3) for a court-based program, certifies that victims of domestic violence, dating violence, sexual assault, or stalking are not charged fees or any other costs related to the filing, petitioning, modifying, issuance, registration, enforcement, withdrawal, or dismissal of matters relating to the domestic violence, dating violence, sexual assault, or stalking;" />
                      <outline text="&apos;(4) demonstrates that adequate security measures, including adequate facilities, procedures, and personnel capable of preventing violence, and adequate standards are, or will be, in place (including the development of protocols or policies to ensure that confidential information is not shared with courts, law enforcement agencies, or child welfare agencies unless necessary to ensure the safety of any child or adult using the services of a program funded under this section), if the applicant proposes to operate supervised visitation programs and services or safe visitation exchange;" />
                      <outline text="&apos;(5) certifies that the organizational policies of the applicant do not require mediation or counseling involving offenders and victims being physically present in the same place, in cases where domestic violence, dating violence, sexual assault, or stalking is alleged;" />
                      <outline text="&apos;(6) certifies that any person providing legal assistance through a program funded under this section has completed or will complete training on domestic violence, dating violence, sexual assault, and stalking, including child sexual abuse, and related legal issues; and" />
                      <outline text="&apos;(7) certifies that any person providing custody evaluation or guardian ad litem services through a program funded under this section has completed or will complete training developed with input from and in collaboration with a tribal, State, territorial, or local domestic violence, dating violence, sexual assault, or stalking victim service provider or coalition on the dynamics of domestic violence and sexual assault, including child sexual abuse, that includes training on how to review evidence of past abuse and the use of evidenced-based theories to make recommendations on custody and visitation." />
                      <outline text="&apos;(e) Authorization of Appropriations- There is authorized to be appropriated to carry out this section, $22,000,000 for each of fiscal years 2014 through 2018. Amounts appropriated pursuant to this subsection shall remain available until expended." />
                      <outline text="&apos;(f) Allotment for Indian Tribes-" />
                      <outline text="&apos;(1) IN GENERAL- Not less than 10 percent of the total amount available under this section for each fiscal year shall be available for grants under the program authorized by section 3796gg-10 of this title." />
                      <outline text="&apos;(2) APPLICABILITY OF PART- The requirements of this section shall not apply to funds allocated for the program described in paragraph (1).&apos;." />
                      <outline text="(b) Technical and Conforming Amendment- Subtitle J of the Violence Against Women Act of 1994 (42 U.S.C. 14043 et seq.) is repealed." />
                      <outline text="SEC. 105. SEX OFFENDER MANAGEMENT." />
                      <outline text="Section 40152(c) of the Violence Against Women Act of 1994 (42 U.S.C. 13941) is amended by striking &apos;$5,000,000&apos; and all that follows and inserting &apos;$5,000,000 for each of fiscal years 2014 through 2018.&apos;." />
                      <outline text="SEC. 106. COURT-APPOINTED SPECIAL ADVOCATE PROGRAM." />
                      <outline text="Subtitle B of title II of the Crime Control Act of 1990 (42 U.S.C. 13011 et seq.) is amended--" />
                      <outline text="(1) in section 216 (42 U.S.C. 13012), by striking &apos;January 1, 2010&apos; and inserting &apos;January 1, 2015&apos;;" />
                      <outline text="(2) in section 217 (42 U.S.C. 13013)--" />
                      <outline text="(A) by striking &apos;Code of Ethics&apos; in section (c)(2) and inserting &apos;Standards for Programs&apos;; and" />
                      <outline text="(B) by adding at the end the following:" />
                      <outline text="&apos;(e) Reporting- An organization that receives a grant under this section for a fiscal year shall submit to the Administrator a report regarding the use of the grant for the fiscal year, including a discussion of outcome performance measures (which shall be established by the Administrator) to determine the effectiveness of the programs of the organization in meeting the needs of children in the child welfare system.&apos;; and" />
                      <outline text="(3) in section 219(a) (42 U.S.C. 13014(a)), by striking &apos;fiscal years 2007 through 2011&apos; and inserting &apos;fiscal years 2014 through 2018&apos;." />
                      <outline text="SEC. 107. CRIMINAL PROVISION RELATING TO STALKING, INCLUDING CYBERSTALKING." />
                      <outline text="(a) Interstate Domestic Violence- Section 2261(a)(1) of title 18, United States Code, is amended--" />
                      <outline text="(1) by inserting &apos;is present&apos; after &apos;Indian Country or&apos;; and" />
                      <outline text="(2) by inserting &apos;or presence&apos; after &apos;as a result of such travel&apos;;" />
                      <outline text="(b) Stalking- Section 2261A of title 18, United States Code, is amended to read as follows:" />
                      <outline text="&apos;Sec. 2261A. Stalking" />
                      <outline text="&apos;Whoever--" />
                      <outline text="&apos;(1) travels in interstate or foreign commerce or is present within the special maritime and territorial jurisdiction of the United States, or enters or leaves Indian country, with the intent to kill, injure, harass, intimidate, or place under surveillance with intent to kill, injure, harass, or intimidate another person, and in the course of, or as a result of, such travel or presence engages in conduct that--" />
                      <outline text="&apos;(A) places that person in reasonable fear of the death of, or serious bodily injury to--" />
                      <outline text="&apos;(i) that person;" />
                      <outline text="&apos;(ii) an immediate family member (as defined in section 115) of that person; or" />
                      <outline text="&apos;(iii) a spouse or intimate partner of that person; or" />
                      <outline text="&apos;(B) causes, attempts to cause, or would be reasonably expected to cause substantial emotional distress to a person described in clause (i), (ii), or (iii) of subparagraph (A); or" />
                      <outline text="&apos;(2) with the intent to kill, injure, harass, intimidate, or place under surveillance with intent to kill, injure, harass, or intimidate another person, uses the mail, any interactive computer service or electronic communication service or electronic communication system of interstate commerce, or any other facility of interstate or foreign commerce to engage in a course of conduct that--" />
                      <outline text="&apos;(A) places that person in reasonable fear of the death of or serious bodily injury to a person described in clause (i), (ii), or (iii) of paragraph (1)(A); or" />
                      <outline text="&apos;(B) causes, attempts to cause, or would be reasonably expected to cause substantial emotional distress to a person described in clause (i), (ii), or (iii) of paragraph (1)(A)," />
                      <outline text="shall be punished as provided in section 2261(b) of this title.&apos;." />
                      <outline text="(c) Interstate Violation of Protection Order- Section 2262(a)(2) of title 18, United States Code, is amended by inserting &apos;is present&apos; after &apos;Indian Country or&apos;." />
                      <outline text="SEC. 108. OUTREACH AND SERVICES TO UNDERSERVED POPULATIONS GRANT." />
                      <outline text="Section 120 of the Violence Against Women and Department of Justice Reauthorization Act of 2005 (42 U.S.C. 14045) is amended to read as follows:" />
                      <outline text="&apos;SEC. 120. GRANTS FOR OUTREACH AND SERVICES TO UNDERSERVED POPULATIONS." />
                      <outline text="&apos;(a) Grants Authorized-" />
                      <outline text="&apos;(1) IN GENERAL- Of the amounts appropriated under the grant programs identified in paragraph (2), the Attorney General shall take 2 percent of such appropriated amounts and combine them to award grants to eligible entities described in subsection (b) of this section to develop and implement outreach strategies targeted at adult or youth victims of domestic violence, dating violence, sexual assault, or stalking in underserved populations and to provide victim services to meet the needs of adult and youth victims of domestic violence, dating violence, sexual assault, and stalking in underserved populations. The requirements of the grant programs identified in paragraph (2) shall not apply to this grant program." />
                      <outline text="&apos;(2) PROGRAMS COVERED- The programs covered by paragraph (1) are the programs carried out under the following provisions:" />
                      <outline text="&apos;(A) Section 2001 of the Omnibus Crime Control and Safe Streets Act of 1968 (Grants to Combat Violent Crimes Against Women)." />
                      <outline text="&apos;(B) Section 2101 of the Omnibus Crime Control and Safe Streets Act of 1968 (Grants to Encourage Arrest Policies and Enforcement of Protection Orders Program)." />
                      <outline text="&apos;(b) Eligible Entities- Eligible entities under this section are--" />
                      <outline text="&apos;(1) population specific organizations that have demonstrated experience and expertise in providing population specific services in the relevant underserved communities, or population specific organizations working in partnership with a victim service provider or domestic violence or sexual assault coalition;" />
                      <outline text="&apos;(2) victim service providers offering population specific services for a specific underserved population; or" />
                      <outline text="&apos;(3) victim service providers working in partnership with a national, State, tribal, or local organization that has demonstrated experience and expertise in providing population specific services in the relevant underserved population." />
                      <outline text="&apos;(c) Planning Grants- The Attorney General may use up to 25 percent of funds available under this section to make one-time planning grants to eligible entities to support the planning and development of specially designed and targeted programs for adult and youth victims in one or more underserved populations, including--" />
                      <outline text="&apos;(1) identifying, building and strengthening partnerships with potential collaborators within underserved populations, Federal, State, tribal, territorial or local government entities, and public and private organizations;" />
                      <outline text="&apos;(2) conducting a needs assessment of the community and the targeted underserved population or populations to determine what the barriers are to service access and what factors contribute to those barriers, using input from the targeted underserved population or populations;" />
                      <outline text="&apos;(3) identifying promising prevention, outreach and intervention strategies for victims from a targeted underserved population or populations; and" />
                      <outline text="&apos;(4) developing a plan, with the input of the targeted underserved population or populations, for implementing prevention, outreach and intervention strategies to address the barriers to accessing services, promoting community engagement in the prevention of domestic violence, dating violence, sexual assault, and stalking within the targeted underserved populations, and evaluating the program." />
                      <outline text="&apos;(d) Implementation Grants- The Attorney General shall make grants to eligible entities for the purpose of providing or enhancing population specific outreach and services to adult and youth victims in one or more underserved populations, including--" />
                      <outline text="&apos;(1) working with Federal, State, tribal, territorial and local governments, agencies, and organizations to develop or enhance population specific services;" />
                      <outline text="&apos;(2) strengthening the capacity of underserved populations to provide population specific services;" />
                      <outline text="&apos;(3) strengthening the capacity of traditional victim service providers to provide population specific services;" />
                      <outline text="&apos;(4) strengthening the effectiveness of criminal and civil justice interventions by providing training for law enforcement, prosecutors, judges and other court personnel on domestic violence, dating violence, sexual assault, or stalking in underserved populations; or" />
                      <outline text="&apos;(5) working in cooperation with an underserved population to develop and implement outreach, education, prevention, and intervention strategies that highlight available resources and the specific issues faced by victims of domestic violence, dating violence, sexual assault, or stalking from underserved populations." />
                      <outline text="&apos;(e) Application- An eligible entity desiring a grant under this section shall submit an application to the Director of the Office on Violence Against Women at such time, in such form, and in such manner as the Director may prescribe." />
                      <outline text="&apos;(f) Reports- Each eligible entity receiving a grant under this section shall submit to the Director of the Office on Violence Against Women a report that describes the activities carried out with grant funds." />
                      <outline text="&apos;(g) Authorization of Appropriations- In addition to the funds identified in subsection (a)(1), there are authorized to be appropriated to carry out this section $2,000,000 for each of fiscal years 2014 through 2018." />
                      <outline text="&apos;(h) Definitions and Grant Conditions- In this section the definitions and grant conditions in section 40002 of the Violence Against Women Act of 1994 (42 U.S.C. 13925) shall apply.&apos;." />
                      <outline text="SEC. 109. CULTURALLY SPECIFIC SERVICES GRANT." />
                      <outline text="Section 121 of the Violence Against Women and Department of Justice Reauthorization Act of 2005 (42 U.S.C. 14045a) is amended--" />
                      <outline text="(1) in the section heading, by striking &apos;and linguistically&apos;;" />
                      <outline text="(2) by striking &apos;and linguistically&apos; each place it appears;" />
                      <outline text="(3) by striking &apos;and linguistic&apos; each place it appears;" />
                      <outline text="(4) by striking subsection (a)(2) and inserting:" />
                      <outline text="&apos;(2) PROGRAMS COVERED- The programs covered by paragraph (1) are the programs carried out under the following provisions:" />
                      <outline text="&apos;(A) Section 2101 of the Omnibus Crime Control and Safe Streets Act of 1968 (Grants to Encourage Arrest Policies and Enforcement of Protection Orders)." />
                      <outline text="&apos;(B) Section 14201 of division B of the Victims of Trafficking and Violence Protection Act of 2000 (42 U.S.C. 3796gg-6) (Legal Assistance for Victims)." />
                      <outline text="&apos;(C) Section 40295 of the Violence Against Women Act of 1994 (42 U.S.C. 13971) (Rural Domestic Violence, Dating Violence, Sexual Assault, Stalking, and Child Abuse Enforcement Assistance)." />
                      <outline text="&apos;(D) Section 40802 of the Violence Against Women Act of 1994 (42 U.S.C. 14041a) (Enhanced Training and Services to End Violence Against Women Later in Life)." />
                      <outline text="&apos;(E) Section 1402 of division B of the Victims of Trafficking and Violence Protection Act of 2000 (42 U.S.C. 3796gg-7) (Education, Training, and Enhanced Services to End Violence Against and Abuse of Women with Disabilities).&apos;; and" />
                      <outline text="(5) in subsection (g), by striking &apos;linguistic and&apos;." />
                      <outline text="TITLE II--IMPROVING SERVICES FOR VICTIMS OF DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, AND STALKING" />
                      <outline text="SEC. 201. SEXUAL ASSAULT SERVICES PROGRAM." />
                      <outline text="(a) Grants to States and Territories- Section 41601(b) of the Violence Against Women Act of 1994 (42 U.S.C. 14043g(b)) is amended--" />
                      <outline text="(1) in paragraph (1), by striking &apos;other programs&apos; and all that follows and inserting &apos;other nongovernmental or tribal programs and projects to assist individuals who have been victimized by sexual assault, without regard to the age of the individual.&apos;;" />
                      <outline text="(2) in paragraph (2)--" />
                      <outline text="(A) in subparagraph (B), by inserting &apos;or tribal programs and activities&apos; after &apos;nongovernmental organizations&apos;; and" />
                      <outline text="(B) in subparagraph (C)(v), by striking &apos;linguistically and&apos;; and" />
                      <outline text="(3) in paragraph (4)--" />
                      <outline text="(A) by inserting &apos;(including the District of Columbia and Puerto Rico)&apos; after &apos;The Attorney General shall allocate to each State&apos;;" />
                      <outline text="(B) by striking &apos;the District of Columbia, Puerto Rico,&apos; after &apos;Guam&apos;;" />
                      <outline text="(C) by striking &apos;0.125 percent&apos; and inserting &apos;0.25 percent&apos;; and" />
                      <outline text="(D) by striking &apos;The District of Columbia shall be treated as a territory for purposes of calculating its allocation under the preceding formula.&apos;." />
                      <outline text="(b) Authorization of Appropriations- Section 41601(f)(1) of the Violence Against Women Act of 1994 (42 U.S.C. 14043g(f)(1)) is amended by striking &apos;$50,000,000 to remain available until expended for each of the fiscal years 2007 through 2011&apos; and inserting &apos;$40,000,000 to remain available until expended for each of fiscal years 2014 through 2018&apos;." />
                      <outline text="SEC. 202. RURAL DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, STALKING, AND CHILD ABUSE ENFORCEMENT ASSISTANCE." />
                      <outline text="Section 40295 of the Violence Against Women Act of 1994 (42 U.S.C. 13971) is amended--" />
                      <outline text="(1) in subsection (a)(1)(H), by inserting &apos;, including sexual assault forensic examiners&apos; before the semicolon;" />
                      <outline text="(2) in subsection (b)--" />
                      <outline text="(A) in paragraph (1)--" />
                      <outline text="(i) by striking &apos;victim advocacy groups&apos; and inserting &apos;victim service providers&apos;; and" />
                      <outline text="(ii) by inserting &apos;, including developing multidisciplinary teams focusing on high risk cases with the goal of preventing domestic and dating violence homicides&apos; before the semicolon;" />
                      <outline text="(B) in paragraph (2)--" />
                      <outline text="(i) by striking &apos;and other long- and short-term assistance&apos; and inserting &apos;legal assistance, and other long-term and short-term victim and population specific services&apos;; and" />
                      <outline text="(ii) by striking &apos;and&apos; at the end;" />
                      <outline text="(C) in paragraph (3), by striking the period at the end and inserting &apos;; and&apos;; and" />
                      <outline text="(D) by adding at the end the following:" />
                      <outline text="&apos;(4) developing, enlarging, or strengthening programs addressing sexual assault, including sexual assault forensic examiner programs, Sexual Assault Response Teams, law enforcement training, and programs addressing rape kit backlogs." />
                      <outline text="&apos;(5) developing programs and strategies that focus on the specific needs of victims of domestic violence, dating violence, sexual assault, and stalking who reside in remote rural and geographically isolated areas, including addressing the challenges posed by the lack of access to shelters and victims services, and limited law enforcement resources and training, and providing training and resources to Community Health Aides involved in the delivery of Indian Health Service programs.&apos;; and" />
                      <outline text="(3) in subsection (e)(1), by striking &apos;$55,000,000 for each of the fiscal years 2007 through 2011&apos; and inserting &apos;$50,000,000 for each of fiscal years 2014 through 2018&apos;." />
                      <outline text="SEC. 203. TRAINING AND SERVICES TO END VIOLENCE AGAINST WOMEN WITH DISABILITIES GRANTS." />
                      <outline text="Section 1402 of division B of the Victims of Trafficking and Violence Protection Act of 2000 (42 U.S.C. 3796gg-7) is amended--" />
                      <outline text="(1) in subsection (b)--" />
                      <outline text="(A) in paragraph (1), by inserting &apos;(including using evidence-based indicators to assess the risk of domestic and dating violence homicide)&apos; after &apos;risk reduction&apos;;" />
                      <outline text="(B) in paragraph (4), by striking &apos;victim service organizations&apos; and inserting &apos;victim service providers&apos;; and" />
                      <outline text="(C) in paragraph (5), by striking &apos;victim services organizations&apos; and inserting &apos;victim service providers&apos;;" />
                      <outline text="(2) in subsection (c)(1)(D), by striking &apos;nonprofit and nongovernmental victim services organization, such as a State&apos; and inserting &apos;victim service provider, such as a State or tribal&apos;; and" />
                      <outline text="(3) in subsection (e), by striking &apos;$10,000,000 for each of the fiscal years 2007 through 2011&apos; and inserting &apos;$9,000,000 for each of fiscal years 2014 through 2018&apos;." />
                      <outline text="SEC. 204. ENHANCED TRAINING AND SERVICES TO END ABUSE IN LATER LIFE." />
                      <outline text="(a) In General- Subtitle H of the Violence Against Women Act of 1994 (42 U.S.C. 14041 et seq.) is amended to read as follows:" />
                      <outline text="&apos;Subtitle H--Enhanced Training and Services To End Abuse Later in Life" />
                      <outline text="&apos;SEC. 40801. ENHANCED TRAINING AND SERVICES TO END ABUSE IN LATER LIFE." />
                      <outline text="&apos;(a) Definitions- In this section--" />
                      <outline text="&apos;(1) the term &apos;exploitation&apos; has the meaning given the term in section 2011 of the Social Security Act (42 U.S.C. 1397j);" />
                      <outline text="&apos;(2) the term &apos;later life&apos;, relating to an individual, means the individual is 50 years of age or older; and" />
                      <outline text="&apos;(3) the term &apos;neglect&apos; means the failure of a caregiver or fiduciary to provide the goods or services that are necessary to maintain the health or safety of an individual in later life." />
                      <outline text="&apos;(b) Grant Program-" />
                      <outline text="&apos;(1) GRANTS AUTHORIZED- The Attorney General may make grants to eligible entities to carry out the activities described in paragraph (2)." />
                      <outline text="&apos;(2) MANDATORY AND PERMISSIBLE ACTIVITIES-" />
                      <outline text="&apos;(A) MANDATORY ACTIVITIES- An eligible entity receiving a grant under this section shall use the funds received under the grant to--" />
                      <outline text="&apos;(i) provide training programs to assist law enforcement agencies, prosecutors, agencies of States or units of local government, population specific organizations, victim service providers, victim advocates, and relevant officers in Federal, tribal, State, territorial, and local courts in recognizing and addressing instances of elder abuse;" />
                      <outline text="&apos;(ii) provide or enhance services for victims of abuse in later life, including domestic violence, dating violence, sexual assault, stalking, exploitation, and neglect;" />
                      <outline text="&apos;(iii) establish or support multidisciplinary collaborative community responses to victims of abuse in later life, including domestic violence, dating violence, sexual assault, stalking, exploitation, and neglect; and" />
                      <outline text="&apos;(iv) conduct cross-training for law enforcement agencies, prosecutors, agencies of States or units of local government, attorneys, health care providers, population specific organizations, faith-based advocates, victim service providers, and courts to better serve victims of abuse in later life, including domestic violence, dating violence, sexual assault, stalking, exploitation, and neglect." />
                      <outline text="&apos;(B) PERMISSIBLE ACTIVITIES- An eligible entity receiving a grant under this section may use the funds received under the grant to--" />
                      <outline text="&apos;(i) provide training programs to assist attorneys, health care providers, faith-based leaders, or other community-based organizations in recognizing and addressing instances of abuse in later life, including domestic violence, dating violence, sexual assault, stalking, exploitation, and neglect; or" />
                      <outline text="&apos;(ii) conduct outreach activities and awareness campaigns to ensure that victims of abuse in later life, including domestic violence, dating violence, sexual assault, stalking, exploitation, and neglect receive appropriate assistance." />
                      <outline text="&apos;(C) WAIVER- The Attorney General may waive 1 or more of the activities described in subparagraph (A) upon making a determination that the activity would duplicate services available in the community." />
                      <outline text="&apos;(D) LIMITATION- An eligible entity receiving a grant under this section may use not more than 10 percent of the total funds received under the grant for an activity described in subparagraph (B)(ii)." />
                      <outline text="&apos;(3) ELIGIBLE ENTITIES- An entity shall be eligible to receive a grant under this section if--" />
                      <outline text="&apos;(A) the entity is--" />
                      <outline text="&apos;(i) a State;" />
                      <outline text="&apos;(ii) a unit of local government;" />
                      <outline text="&apos;(iii) a tribal government or tribal organization;" />
                      <outline text="&apos;(iv) a population specific organization with demonstrated experience in assisting individuals over 50 years of age;" />
                      <outline text="&apos;(v) a victim service provider with demonstrated experience in addressing domestic violence, dating violence, sexual assault, and stalking; or" />
                      <outline text="&apos;(vi) a State, tribal, or territorial domestic violence or sexual assault coalition; and" />
                      <outline text="&apos;(B) the entity demonstrates that it is part of a multidisciplinary partnership that includes, at a minimum--" />
                      <outline text="&apos;(i) a law enforcement agency;" />
                      <outline text="&apos;(ii) a prosecutor&apos;s office;" />
                      <outline text="&apos;(iii) a victim service provider; and" />
                      <outline text="&apos;(iv) a nonprofit program or government agency with demonstrated experience in assisting individuals in later life;" />
                      <outline text="&apos;(4) UNDERSERVED POPULATIONS- In making grants under this section, the Attorney General shall give priority to proposals providing services to culturally specific and underserved populations." />
                      <outline text="&apos;(5) AUTHORIZATION OF APPROPRIATIONS- There is authorized to be appropriated to carry out this section $9,000,000 for each of fiscal years 2014 through 2018.&apos;." />
                      <outline text="TITLE III--SERVICES, PROTECTION, AND JUSTICE FOR YOUNG VICTIMS OF VIOLENCE" />
                      <outline text="SEC. 301. RAPE PREVENTION AND EDUCATION GRANT." />
                      <outline text="Section 393A of the Public Health Service Act (42 U.S.C. 280b-1b) is amended--" />
                      <outline text="(1) in subsection (a)--" />
                      <outline text="(A) in the matter preceding paragraph (1), by inserting &apos;, territorial or tribal&apos; after &apos;crisis centers, State&apos;; and" />
                      <outline text="(B) in paragraph (6), by inserting &apos;and alcohol&apos; after &apos;about drugs&apos;; and" />
                      <outline text="(2) in subsection (c)--" />
                      <outline text="(A) in paragraph (1), by striking &apos;$80,000,000 for each of fiscal years 2007 through 2011&apos; and inserting &apos;$50,000,000 for each of fiscal years 2014 through 2018&apos;; and" />
                      <outline text="(B) by adding at the end the following:" />
                      <outline text="&apos;(3) BASELINE FUNDING FOR STATES, THE DISTRICT OF COLUMBIA, AND PUERTO RICO- A minimum allocation of $150,000 shall be awarded in each fiscal year for each of the States, the District of Columbia, and Puerto Rico. A minimum allocation of $35,000 shall be awarded in each fiscal year for each Territory. Any unused or remaining funds shall be allotted to each State, the District of Columbia, and Puerto Rico on the basis of population.&apos;." />
                      <outline text="SEC. 302. CREATING HOPE THROUGH OUTREACH, OPTIONS, SERVICES, AND EDUCATION FOR CHILDREN AND YOUTH." />
                      <outline text="Subtitle L of the Violence Against Women Act of 1994 is amended by striking sections 41201 through 41204 (42 U.S.C. 14043c through 14043c-3) and inserting the following:" />
                      <outline text="&apos;SEC. 41201. CREATING HOPE THROUGH OUTREACH, OPTIONS, SERVICES, AND EDUCATION FOR CHILDREN AND YOUTH (&apos;CHOOSE CHILDREN &amp; YOUTH&apos;)." />
                      <outline text="&apos;(a) Grants Authorized- The Attorney General, working in collaboration with the Secretary of Health and Human Services and the Secretary of Education, shall award grants to enhance the safety of youth and children who are victims of, or exposed to, domestic violence, dating violence, sexual assault, stalking, or sex trafficking and prevent future violence." />
                      <outline text="&apos;(b) Program Purposes- Funds provided under this section may be used for the following program purpose areas:" />
                      <outline text="&apos;(1) SERVICES TO ADVOCATE FOR AND RESPOND TO YOUTH- To develop, expand, and strengthen victim-centered interventions and services that target youth who are victims of domestic violence, dating violence, sexual assault, stalking, and sex trafficking. Services may include victim services, counseling, advocacy, mentoring, educational support, transportation, legal assistance in civil, criminal and administrative matters, such as family law cases, housing cases, child welfare proceedings, campus administrative proceedings, and civil protection order proceedings, population-specific services, and other activities that support youth in finding safety, stability, and justice and in addressing the emotional, cognitive, and physical effects of trauma. Funds may be used to--" />
                      <outline text="&apos;(A) assess and analyze currently available services for youth victims of domestic violence, dating violence, sexual assault, stalking, and sex trafficking, determining relevant barriers to such services in a particular locality, and developing a community protocol to address such problems collaboratively;" />
                      <outline text="&apos;(B) develop and implement policies, practices, and procedures to effectively respond to domestic violence, dating violence, sexual assault, stalking, or sex trafficking against youth; or" />
                      <outline text="&apos;(C) provide technical assistance and training to enhance the ability of school personnel, victim service providers, child protective service workers, staff of law enforcement agencies, prosecutors, court personnel, individuals who work in after school programs, medical personnel, social workers, mental health personnel, and workers in other programs that serve children and youth to improve their ability to appropriately respond to the needs of children and youth who are victims of domestic violence, dating violence, sexual assault, stalking, and sex trafficking, and to properly refer such children, youth, and their families to appropriate services." />
                      <outline text="&apos;(2) SUPPORTING YOUTH THROUGH EDUCATION AND PROTECTION- To enable middle schools, high schools, and institutions of higher education to--" />
                      <outline text="&apos;(A) provide training to school personnel, including healthcare providers and security personnel, on the needs of students who are victims of domestic violence, dating violence, sexual assault, stalking, or sex trafficking;" />
                      <outline text="&apos;(B) develop and implement prevention and intervention policies in middle and high schools, including appropriate responses to, and identification and referral procedures for, students who are experiencing or perpetrating domestic violence, dating violence, sexual assault, stalking, or sex trafficking, and procedures for handling the requirements of court protective orders issued to or against students;" />
                      <outline text="&apos;(C) provide support services for student victims of domestic violence, dating violence, sexual assault, stalking, or sex trafficking, such as a resource person who is either on-site or on-call;" />
                      <outline text="&apos;(D) implement developmentally appropriate educational programming for students regarding domestic violence, dating violence, sexual assault, stalking, and sex trafficking and the impact of such violence on youth; or" />
                      <outline text="&apos;(E) develop strategies to increase identification, support, referrals, and prevention programming for youth who are at high risk of domestic violence, dating violence, sexual assault, stalking, or sex trafficking." />
                      <outline text="&apos;(c) Eligible Applicants-" />
                      <outline text="&apos;(1) IN GENERAL- To be eligible to receive a grant under this section, an entity shall be--" />
                      <outline text="&apos;(A) a victim service provider, tribal nonprofit, or population-specific or community-based organization with a demonstrated history of effective work addressing the needs of youth who are, including runaway or homeless youth affected by, victims of domestic violence, dating violence, sexual assault, stalking, or sex trafficking;" />
                      <outline text="&apos;(B) a victim service provider that is partnered with an entity that has a demonstrated history of effective work addressing the needs of youth; or" />
                      <outline text="&apos;(C) a public, charter, tribal, or nationally accredited private middle or high school, a school administered by the Department of Defense under section 2164 of title 10, United States Code or section 1402 of the Defense Dependents&apos; Education Act of 1978, a group of schools, a school district, or an institution of higher education." />
                      <outline text="&apos;(2) PARTNERSHIPS-" />
                      <outline text="&apos;(A) EDUCATION- To be eligible to receive a grant for the purposes described in subsection (b)(2), an entity described in paragraph (1) shall be partnered with a public, charter, tribal, or nationally accredited private middle or high school, a school administered by the Department of Defense under section 2164 of title 10, United States Code or section 1402 of the Defense Dependents&apos; Education Act of 1978, a group of schools, a school district, or an institution of higher education." />
                      <outline text="&apos;(B) OTHER PARTNERSHIPS- All applicants under this section are encouraged to work in partnership with organizations and agencies that work with the relevant population. Such entities may include--" />
                      <outline text="&apos;(i) a State, tribe, unit of local government, or territory;" />
                      <outline text="&apos;(ii) a population specific or community-based organization;" />
                      <outline text="&apos;(iii) batterer intervention programs or sex offender treatment programs with specialized knowledge and experience working with youth offenders; or" />
                      <outline text="&apos;(iv) any other agencies or nonprofit, nongovernmental organizations with the capacity to provide effective assistance to the adult, youth, and child victims served by the partnership." />
                      <outline text="&apos;(d) Grantee Requirements- Applicants for grants under this section shall establish and implement policies, practices, and procedures that--" />
                      <outline text="&apos;(1) require and include appropriate referral systems for child and youth victims;" />
                      <outline text="&apos;(2) protect the confidentiality and privacy of child and youth victim information, particularly in the context of parental or third party involvement and consent, mandatory reporting duties, and working with other service providers all with priority on victim safety and autonomy; and" />
                      <outline text="&apos;(3) ensure that all individuals providing intervention or prevention programming to children or youth through a program funded under this section have completed, or will complete, sufficient training in connection with domestic violence, dating violence, sexual assault, stalking, and sex trafficking." />
                      <outline text="&apos;(e) Definitions and Grant Conditions- In this section, the definitions and grant conditions provided for in section 40002 shall apply." />
                      <outline text="&apos;(f) Authorization of Appropriations- There is authorized to be appropriated to carry out this section, $15,000,000 for each of fiscal years 2014 through 2018." />
                      <outline text="&apos;(g) Allotment-" />
                      <outline text="&apos;(1) IN GENERAL- Not less than 50 percent of the total amount appropriated under this section for each fiscal year shall be used for the purposes described in subsection (b)(1)." />
                      <outline text="&apos;(2) INDIAN TRIBES- Not less than 10 percent of the total amount appropriated under this section for each fiscal year shall be made available for grants under the program authorized by section 2015 of the Omnibus Crime Control and Safe Streets Act of 1968. The requirements of this section shall not apply to funds allocated under this paragraph." />
                      <outline text="&apos;(h) Priority- The Attorney General shall prioritize grant applications under this section that coordinate with prevention programs in the community.&apos;." />
                      <outline text="SEC. 303. GRANTS TO COMBAT VIOLENT CRIMES ON CAMPUSES." />
                      <outline text="Section 304 of the Violence Against Women and Department of Justice Reauthorization Act of 2005 (42 U.S.C. 14045b) is amended--" />
                      <outline text="(1) in subsection (a)--" />
                      <outline text="(A) in paragraph (1)--" />
                      <outline text="(i) by striking &apos;stalking on campuses, and&apos; and inserting &apos;stalking on campuses,&apos;;" />
                      <outline text="(ii) by striking &apos;crimes against women on&apos; and inserting &apos;crimes on&apos;; and" />
                      <outline text="(iii) by inserting &apos;, and to develop and strengthen prevention education and awareness programs&apos; before the period; and" />
                      <outline text="(B) in paragraph (2), by striking &apos;$500,000&apos; and inserting &apos;$300,000&apos;;" />
                      <outline text="(2) in subsection (b)--" />
                      <outline text="(A) in paragraph (2)--" />
                      <outline text="(i) by inserting &apos;, strengthen,&apos; after &apos;To develop&apos;; and" />
                      <outline text="(ii) by inserting &apos;including the use of technology to commit these crimes,&apos; after &apos;sexual assault and stalking,&apos;;" />
                      <outline text="(B) in paragraph (4)--" />
                      <outline text="(i) by inserting &apos;and population specific services&apos; after &apos;strengthen victim services programs&apos;;" />
                      <outline text="(ii) by striking &apos;entities carrying out&apos; and all that follows through &apos;stalking victim services programs&apos; and inserting &apos;victim service providers&apos;; and" />
                      <outline text="(iii) by inserting &apos;, regardless of whether the services are provided by the institution or in coordination with community victim service providers&apos; before the period at the end; and" />
                      <outline text="(C) by adding at the end the following:" />
                      <outline text="&apos;(9) To develop or adapt and provide developmental, culturally appropriate, and linguistically accessible print or electronic materials to address both prevention and intervention in domestic violence, dating violence, sexual violence, and stalking." />
                      <outline text="&apos;(10) To develop or adapt population specific strategies and projects for victims of domestic violence, dating violence, sexual assault, and stalking from underserved populations on campus.&apos;;" />
                      <outline text="(3) in subsection (c)--" />
                      <outline text="(A) in paragraph (2)--" />
                      <outline text="(i) in subparagraph (B), by striking &apos;any non-profit&apos; and all that follows through &apos;victim services programs&apos; and inserting &apos;victim service providers&apos;;" />
                      <outline text="(ii) by redesignating subparagraphs (D) through (F) as subparagraphs (E) through (G), respectively; and" />
                      <outline text="(iii) by inserting after subparagraph (C), the following:" />
                      <outline text="&apos;(D) describe how underserved populations in the campus community will be adequately served, including the provision of relevant population specific services;&apos;; and" />
                      <outline text="(B) in paragraph (3), by striking &apos;2007 through 2011&apos; and inserting &apos;2014 through 2018&apos;;" />
                      <outline text="(4) in subsection (d)--" />
                      <outline text="(A) by redesignating paragraph (3) as paragraph (4); and" />
                      <outline text="(B) by inserting after paragraph (2), the following:" />
                      <outline text="&apos;(3) GRANTEE MINIMUM REQUIREMENTS- Each grantee shall comply with the following minimum requirements during the grant period:" />
                      <outline text="&apos;(A) The grantee shall create a coordinated community response including both organizations external to the institution and relevant divisions of the institution." />
                      <outline text="&apos;(B) The grantee shall establish a mandatory prevention and education program on domestic violence, dating violence, sexual assault, and stalking for all incoming students." />
                      <outline text="&apos;(C) The grantee shall train all campus law enforcement to respond effectively to domestic violence, dating violence, sexual assault, and stalking." />
                      <outline text="&apos;(D) The grantee shall train all members of campus disciplinary boards to respond effectively to situations involving domestic violence, dating violence, sexual assault, or stalking.&apos;; and" />
                      <outline text="(5) in subsection (e), by striking &apos;there are&apos; and all that follows through the period and inserting &apos;there is authorized to be appropriated $12,000,000 for each of fiscal years 2014 through 2018.&apos;." />
                      <outline text="SEC. 304. CAMPUS SEXUAL VIOLENCE, DOMESTIC VIOLENCE, DATING VIOLENCE, AND STALKING EDUCATION AND PREVENTION." />
                      <outline text="(a) In General- Section 485(f) of the Higher Education Act of 1965 (20 U.S.C. 1092(f)) is amended--" />
                      <outline text="(1) in paragraph (1)--" />
                      <outline text="(A) in subparagraph (C)(iii), by striking the period at the end and inserting &apos;, when the victim of such crime elects or is unable to make such a report.&apos;; and" />
                      <outline text="(B) in subparagraph (F)--" />
                      <outline text="(i) in clause (i)(VIII), by striking &apos;and&apos; after the semicolon;" />
                      <outline text="(ii) in clause (ii)--" />
                      <outline text="(I) by striking &apos;sexual orientation&apos; and inserting &apos; national origin, sexual orientation, gender identity,&apos;; and" />
                      <outline text="(II) by striking the period and inserting &apos;; and&apos;; and" />
                      <outline text="(iii) by adding at the end the following:" />
                      <outline text="&apos;(iii) of domestic violence, dating violence, and stalking incidents that were reported to campus security authorities or local police agencies.&apos;;" />
                      <outline text="(2) in paragraph (3), by inserting &apos;, that withholds the names of victims as confidential,&apos; after &apos;that is timely&apos;;" />
                      <outline text="(3) in paragraph (6)(A)--" />
                      <outline text="(A) by redesignating clauses (i), (ii), and (iii) as clauses (ii), (iii), and (iv), respectively;" />
                      <outline text="(B) by inserting before clause (ii), as redesignated by subparagraph (A), the following:" />
                      <outline text="&apos;(i) The terms &apos;dating violence&apos;, &apos;domestic violence&apos;, and &apos;stalking&apos; have the meaning given such terms in section 40002(a) of the Violence Against Women Act of 1994 (42 U.S.C. 13925(a)).&apos;; and" />
                      <outline text="(C) by inserting after clause (iv), as redesignated by subparagraph (A), the following:" />
                      <outline text="&apos;(v) The term &apos;sexual assault&apos; means an offense classified as a forcible or nonforcible sex offense under the uniform crime reporting system of the Federal Bureau of Investigation.&apos;;" />
                      <outline text="(4) in paragraph (7)--" />
                      <outline text="(A) by striking &apos;paragraph (1)(F)&apos; and inserting &apos;clauses (i) and (ii) of paragraph (1)(F)&apos;; and" />
                      <outline text="(B) by inserting after &apos;Hate Crime Statistics Act.&apos; the following: &apos;For the offenses of domestic violence, dating violence, and stalking, such statistics shall be compiled in accordance with the definitions used in section 40002(a) of the Violence Against Women Act of 1994 (42 U.S.C. 13925(a)).&apos;;" />
                      <outline text="(5) by striking paragraph (8) and inserting the following:" />
                      <outline text="&apos;(8)(A) Each institution of higher education participating in any program under this title and title IV of the Economic Opportunity Act of 1964, other than a foreign institution of higher education, shall develop and distribute as part of the report described in paragraph (1) a statement of policy regarding--" />
                      <outline text="&apos;(i) such institution&apos;s programs to prevent domestic violence, dating violence, sexual assault, and stalking; and" />
                      <outline text="&apos;(ii) the procedures that such institution will follow once an incident of domestic violence, dating violence, sexual assault, or stalking has been reported, including a statement of the standard of evidence that will be used during any institutional conduct proceeding arising from such a report." />
                      <outline text="&apos;(B) The policy described in subparagraph (A) shall address the following areas:" />
                      <outline text="&apos;(i) Education programs to promote the awareness of rape, acquaintance rape, domestic violence, dating violence, sexual assault, and stalking, which shall include--" />
                      <outline text="&apos;(I) primary prevention and awareness programs for all incoming students and new employees, which shall include--" />
                      <outline text="&apos;(aa) a statement that the institution of higher education prohibits the offenses of domestic violence, dating violence, sexual assault, and stalking;" />
                      <outline text="&apos;(bb) the definition of domestic violence, dating violence, sexual assault, and stalking in the applicable jurisdiction;" />
                      <outline text="&apos;(cc) the definition of consent, in reference to sexual activity, in the applicable jurisdiction;" />
                      <outline text="&apos;(dd) safe and positive options for bystander intervention that may be carried out by an individual to prevent harm or intervene when there is a risk of domestic violence, dating violence, sexual assault, or stalking against a person other than such individual;" />
                      <outline text="&apos;(ee) information on risk reduction to recognize warning signs of abusive behavior and how to avoid potential attacks; and" />
                      <outline text="&apos;(ff) the information described in clauses (ii) through (vii); and" />
                      <outline text="&apos;(II) ongoing prevention and awareness campaigns for students and faculty, including information described in items (aa) through (ff) of subclause (I)." />
                      <outline text="&apos;(ii) Possible sanctions or protective measures that such institution may impose following a final determination of an institutional disciplinary procedure regarding rape, acquaintance rape, domestic violence, dating violence, sexual assault, or stalking." />
                      <outline text="&apos;(iii) Procedures victims should follow if a sex offense, domestic violence, dating violence, sexual assault, or stalking has occurred, including information in writing about--" />
                      <outline text="&apos;(I) the importance of preserving evidence as may be necessary to the proof of criminal domestic violence, dating violence, sexual assault, or stalking, or in obtaining a protection order;" />
                      <outline text="&apos;(II) to whom the alleged offense should be reported;" />
                      <outline text="&apos;(III) options regarding law enforcement and campus authorities, including notification of the victim&apos;s option to--" />
                      <outline text="&apos;(aa) notify proper law enforcement authorities, including on-campus and local police;" />
                      <outline text="&apos;(bb) be assisted by campus authorities in notifying law enforcement authorities if the victim so chooses; and" />
                      <outline text="&apos;(cc) decline to notify such authorities; and" />
                      <outline text="&apos;(IV) where applicable, the rights of victims and the institution&apos;s responsibilities regarding orders of protection, no contact orders, restraining orders, or similar lawful orders issued by a criminal, civil, or tribal court." />
                      <outline text="&apos;(iv) Procedures for institutional disciplinary action in cases of alleged domestic violence, dating violence, sexual assault, or stalking, which shall include a clear statement that--" />
                      <outline text="&apos;(I) such proceedings shall--" />
                      <outline text="&apos;(aa) provide a prompt, fair, and impartial investigation and resolution; and" />
                      <outline text="&apos;(bb) be conducted by officials who receive annual training on the issues related to domestic violence, dating violence, sexual assault, and stalking and how to conduct an investigation and hearing process that protects the safety of victims and promotes accountability;" />
                      <outline text="&apos;(II) the accuser and the accused are entitled to the same opportunities to have others present during an institutional disciplinary proceeding, including the opportunity to be accompanied to any related meeting or proceeding by an advisor of their choice; and" />
                      <outline text="&apos;(III) both the accuser and the accused shall be simultaneously informed, in writing, of--" />
                      <outline text="&apos;(aa) the outcome of any institutional disciplinary proceeding that arises from an allegation of domestic violence, dating violence, sexual assault, or stalking;" />
                      <outline text="&apos;(bb) the institution&apos;s procedures for the accused and the victim to appeal the results of the institutional disciplinary proceeding;" />
                      <outline text="&apos;(cc) of any change to the results that occurs prior to the time that such results become final; and" />
                      <outline text="&apos;(dd) when such results become final." />
                      <outline text="&apos;(v) Information about how the institution will protect the confidentiality of victims, including how publicly-available recordkeeping will be accomplished without the inclusion of identifying information about the victim, to the extent permissible by law." />
                      <outline text="&apos;(vi) Written notification of students and employees about existing counseling, health, mental health, victim advocacy, legal assistance, and other services available for victims both on-campus and in the community." />
                      <outline text="&apos;(vii) Written notification of victims about options for, and available assistance in, changing academic, living, transportation, and working situations, if so requested by the victim and if such accommodations are reasonably available, regardless of whether the victim chooses to report the crime to campus police or local law enforcement." />
                      <outline text="&apos;(C) A student or employee who reports to an institution of higher education that the student or employee has been a victim of domestic violence, dating violence, sexual assault, or stalking, whether the offense occurred on or off campus, shall be provided with a written explanation of the student or employee&apos;s rights and options, as described in clauses (ii) through (vii) of subparagraph (B).&apos;;" />
                      <outline text="(6) in paragraph (9), by striking &apos;The Secretary&apos; and inserting &apos;The Secretary, in consultation with the Attorney General of the United States,&apos;;" />
                      <outline text="(7) by striking paragraph (16) and inserting the following:" />
                      <outline text="&apos;(16)(A) The Secretary shall seek the advice and counsel of the Attorney General of the United States concerning the development, and dissemination to institutions of higher education, of best practices information about campus safety and emergencies." />
                      <outline text="&apos;(B) The Secretary shall seek the advice and counsel of the Attorney General of the United States and the Secretary of Health and Human Services concerning the development, and dissemination to institutions of higher education, of best practices information about preventing and responding to incidents of domestic violence, dating violence, sexual assault, and stalking, including elements of institutional policies that have proven successful based on evidence-based outcome measurements.&apos;; and" />
                      <outline text="(8) by striking paragraph (17) and inserting the following:" />
                      <outline text="&apos;(17) No officer, employee, or agent of an institution participating in any program under this title shall retaliate, intimidate, threaten, coerce, or otherwise discriminate against any individual for exercising their rights or responsibilities under any provision of this subsection.&apos;." />
                      <outline text="(b) Effective Date- The amendments made by this section shall take effect with respect to the annual security report under section 485(f)(1) of the Higher Education Act of 1965 (20 U.S.C. 1092(f)(1)) prepared by an institution of higher education 1 calendar year after the date of enactment of this Act, and each subsequent calendar year." />
                      <outline text="TITLE IV--VIOLENCE REDUCTION PRACTICES" />
                      <outline text="SEC. 401. STUDY CONDUCTED BY THE CENTERS FOR DISEASE CONTROL AND PREVENTION." />
                      <outline text="Section 402(c) of the Violence Against Women and Department of Justice Reauthorization Act of 2005 (42 U.S.C. 280b-4(c)) is amended by striking &apos;$2,000,000 for each of the fiscal years 2007 through 2011&apos; and inserting &apos;$1,000,000 for each of the fiscal years 2014 through 2018&apos;." />
                      <outline text="SEC. 402. SAVING MONEY AND REDUCING TRAGEDIES THROUGH PREVENTION GRANTS." />
                      <outline text="(a) SMART Prevention- Section 41303 of the Violence Against Women Act of 1994 (42 U.S.C. 14043d-2) is amended to read as follows:" />
                      <outline text="&apos;SEC. 41303. SAVING MONEY AND REDUCING TRAGEDIES THROUGH PREVENTION (SMART PREVENTION)." />
                      <outline text="&apos;(a) Grants Authorized- The Attorney General, in consultation with the Secretary of Health and Human Services and the Secretary of Education, is authorized to award grants for the purpose of preventing domestic violence, dating violence, sexual assault, and stalking by taking a comprehensive approach that focuses on youth, children exposed to violence, and men as leaders and influencers of social norms." />
                      <outline text="&apos;(b) Use of Funds- Funds provided under this section may be used for the following purposes:" />
                      <outline text="&apos;(1) TEEN DATING VIOLENCE AWARENESS AND PREVENTION- To develop, maintain, or enhance programs that change attitudes and behaviors around the acceptability of domestic violence, dating violence, sexual assault, and stalking and provide education and skills training to young individuals and individuals who influence young individuals. The prevention program may use evidence-based, evidence-informed, or innovative strategies and practices focused on youth. Such a program should include--" />
                      <outline text="&apos;(A) age and developmentally-appropriate education on domestic violence, dating violence, sexual assault, stalking, and sexual coercion, as well as healthy relationship skills, in school, in the community, or in health care settings;" />
                      <outline text="&apos;(B) community-based collaboration and training for those with influence on youth, such as parents, teachers, coaches, healthcare providers, faith-leaders, older teens, and mentors;" />
                      <outline text="&apos;(C) education and outreach to change environmental factors contributing to domestic violence, dating violence, sexual assault, and stalking; and" />
                      <outline text="&apos;(D) policy development targeted to prevention, including school-based policies and protocols." />
                      <outline text="&apos;(2) CHILDREN EXPOSED TO VIOLENCE AND ABUSE- To develop, maintain or enhance programs designed to prevent future incidents of domestic violence, dating violence, sexual assault, and stalking by preventing, reducing and responding to children&apos;s exposure to violence in the home. Such programs may include--" />
                      <outline text="&apos;(A) providing services for children exposed to domestic violence, dating violence, sexual assault or stalking, including direct counseling or advocacy, and support for the non-abusing parent; and" />
                      <outline text="&apos;(B) training and coordination for educational, after-school, and childcare programs on how to safely and confidentially identify children and families experiencing domestic violence, dating violence, sexual assault, or stalking and properly refer children exposed and their families to services and violence prevention programs." />
                      <outline text="&apos;(3) ENGAGING MEN AS LEADERS AND ROLE MODELS- To develop, maintain or enhance programs that work with men to prevent domestic violence, dating violence, sexual assault, and stalking by helping men to serve as role models and social influencers of other men and youth at the individual, school, community or statewide levels." />
                      <outline text="&apos;(c) Eligible Entities- To be eligible to receive a grant under this section, an entity shall be--" />
                      <outline text="&apos;(1) a victim service provider, community-based organization, tribe or tribal organization, or other non-profit, nongovernmental organization that has a history of effective work preventing domestic violence, dating violence, sexual assault, or stalking and expertise in the specific area for which they are applying for funds; or" />
                      <outline text="&apos;(2) a partnership between a victim service provider, community-based organization, tribe or tribal organization, or other non-profit, nongovernmental organization that has a history of effective work preventing domestic violence, dating violence, sexual assault, or stalking and at least one of the following that has expertise in serving children exposed to domestic violence, dating violence, sexual assault, or stalking, youth domestic violence, dating violence, sexual assault, or stalking prevention, or engaging men to prevent domestic violence, dating violence, sexual assault, or stalking:" />
                      <outline text="&apos;(A) A public, charter, tribal, or nationally accredited private middle or high school, a school administered by the Department of Defense under section 2164 of title 10, United States Code or section 1402 of the Defense Dependents&apos; Education Act of 1978, a group of schools, or a school district." />
                      <outline text="&apos;(B) A local community-based organization, population-specific organization, or faith-based organization that has established expertise in providing services to youth." />
                      <outline text="&apos;(C) A community-based organization, population-specific organization, university or health care clinic, faith-based organization, or other non-profit, nongovernmental organization with a demonstrated history of effective work addressing the needs of children exposed to domestic violence, dating violence, sexual assault, or stalking." />
                      <outline text="&apos;(D) A nonprofit, nongovernmental entity providing services for runaway or homeless youth affected by domestic violence, dating violence, sexual assault, or stalking." />
                      <outline text="&apos;(E) Healthcare entities eligible for reimbursement under title XVIII of the Social Security Act, including providers that target the special needs of children and youth." />
                      <outline text="&apos;(F) Any other agencies, population-specific organizations, or nonprofit, nongovernmental organizations with the capacity to provide necessary expertise to meet the goals of the program; or" />
                      <outline text="&apos;(3) a public, charter, tribal, or nationally accredited private middle or high school, a school administered by the Department of Defense under section 2164 of title 10, United States Code or section 1402 of the Defense Dependents&apos; Education Act of 1978, a group of schools, a school district, or an institution of higher education." />
                      <outline text="&apos;(d) Grantee Requirements-" />
                      <outline text="&apos;(1) IN GENERAL- Applicants for grants under this section shall prepare and submit to the Director an application at such time, in such manner, and containing such information as the Director may require that demonstrates the capacity of the applicant and partnering organizations to undertake the project." />
                      <outline text="&apos;(2) POLICIES AND PROCEDURES- Applicants under this section shall establish and implement policies, practices, and procedures that--" />
                      <outline text="&apos;(A) include appropriate referral systems to direct any victim identified during program activities to highly qualified follow-up care;" />
                      <outline text="&apos;(B) protect the confidentiality and privacy of adult and youth victim information, particularly in the context of parental or third party involvement and consent, mandatory reporting duties, and working with other service providers;" />
                      <outline text="&apos;(C) ensure that all individuals providing prevention programming through a program funded under this section have completed or will complete sufficient training in connection with domestic violence, dating violence, sexual assault or stalking; and" />
                      <outline text="&apos;(D) document how prevention programs are coordinated with service programs in the community." />
                      <outline text="&apos;(3) PREFERENCE- In selecting grant recipients under this section, the Attorney General shall give preference to applicants that--" />
                      <outline text="&apos;(A) include outcome-based evaluation; and" />
                      <outline text="&apos;(B) identify any other community, school, or State-based efforts that are working on domestic violence, dating violence, sexual assault, or stalking prevention and explain how the grantee or partnership will add value, coordinate with other programs, and not duplicate existing efforts." />
                      <outline text="&apos;(e) Definitions and Grant Conditions- In this section, the definitions and grant conditions provided for in section 40002 shall apply." />
                      <outline text="&apos;(f) Authorization of Appropriations- There is authorized to be appropriated to carry out this section, $15,000,000 for each of fiscal years 2014 through 2018. Amounts appropriated under this section may only be used for programs and activities described under this section." />
                      <outline text="&apos;(g) Allotment-" />
                      <outline text="&apos;(1) IN GENERAL- Not less than 25 percent of the total amounts appropriated under this section in each fiscal year shall be used for each set of purposes described in paragraphs (1), (2), and (3) of subsection (b)." />
                      <outline text="&apos;(2) INDIAN TRIBES- Not less than 10 percent of the total amounts appropriated under this section in each fiscal year shall be made available for grants to Indian tribes or tribal organizations. If an insufficient number of applications are received from Indian tribes or tribal organizations, such funds shall be allotted to other population-specific programs.&apos;." />
                      <outline text="(b) Repeals- The following provisions are repealed:" />
                      <outline text="(1) Sections 41304 and 41305 of the Violence Against Women Act of 1994 (42 U.S.C. 14043d-3 and 14043d-4)." />
                      <outline text="(2) Section 403 of the Violence Against Women and Department of Justice Reauthorization Act of 2005 (42 U.S.C. 14045c)." />
                      <outline text="TITLE V--STRENGTHENING THE HEALTHCARE SYSTEM&apos;S RESPONSE TO DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, AND STALKING" />
                      <outline text="SEC. 501. CONSOLIDATION OF GRANTS TO STRENGTHEN THE HEALTHCARE SYSTEM&apos;S RESPONSE TO DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, AND STALKING." />
                      <outline text="(a) Grants- Section 399P of the Public Health Service Act (42 U.S.C. 280g-4) is amended to read as follows:" />
                      <outline text="&apos;SEC. 399P. GRANTS TO STRENGTHEN THE HEALTHCARE SYSTEM&apos;S RESPONSE TO DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, AND STALKING." />
                      <outline text="&apos;(a) In General- The Secretary shall award grants for--" />
                      <outline text="&apos;(1) the development or enhancement and implementation of interdisciplinary training for health professionals, public health staff, and allied health professionals;" />
                      <outline text="&apos;(2) the development or enhancement and implementation of education programs for medical, nursing, dental, and other health profession students and residents to prevent and respond to domestic violence, dating violence, sexual assault, and stalking; and" />
                      <outline text="&apos;(3) the development or enhancement and implementation of comprehensive statewide strategies to improve the response of clinics, public health facilities, hospitals, and other health settings (including behavioral and mental health programs) to domestic violence, dating violence, sexual assault, and stalking." />
                      <outline text="&apos;(b) Use of Funds-" />
                      <outline text="&apos;(1) REQUIRED USES- Amounts provided under a grant under this section shall be used to--" />
                      <outline text="&apos;(A) fund interdisciplinary training and education programs under paragraphs (1) and (2) of subsection (a) that--" />
                      <outline text="&apos;(i) are designed to train medical, psychology, dental, social work, nursing, and other health profession students, interns, residents, fellows, or current health care providers to identify and provide health care services (including mental or behavioral health care services and referrals to appropriate community services) to individuals who are or who have been victims of domestic violence, dating violence, sexual assault, or stalking; and" />
                      <outline text="&apos;(ii) plan and develop culturally competent clinical training components for integration into approved internship, residency, and fellowship training or continuing medical or other health education training that address physical, mental, and behavioral health issues, including protective factors, related to domestic violence, dating violence, sexual assault, stalking, and other forms of violence and abuse, focus on reducing health disparities and preventing violence and abuse, and include the primacy of victim safety and confidentiality;" />
                      <outline text="&apos;(B) design and implement comprehensive strategies to improve the response of the health care system to domestic or sexual violence in clinical and public health settings, hospitals, clinics, and other health settings (including behavioral and mental health), under subsection (a)(3) through--" />
                      <outline text="&apos;(i) the implementation, dissemination, and evaluation of policies and procedures to guide health professionals and public health staff in identifying and responding to domestic violence, dating violence, sexual assault, and stalking, including strategies to ensure that health information is maintained in a manner that protects the patient&apos;s privacy and safety, and safely uses health information technology to improve documentation, identification, assessment, treatment, and follow-up care;" />
                      <outline text="&apos;(ii) the development of on-site access to services to address the safety, medical, and mental health needs of patients by increasing the capacity of existing health care professionals and public health staff to address domestic violence, dating violence, sexual assault, and stalking, or by contracting with or hiring domestic or sexual assault advocates to provide such services or to model other services appropriate to the geographic and cultural needs of a site;" />
                      <outline text="&apos;(iii) the development of measures and methods for the evaluation of the practice of identification, intervention, and documentation regarding victims of domestic violence, dating violence, sexual assault, and stalking, including the development and testing of quality improvement measurements, in accordance with the multi-stakeholder and quality measurement processes established under paragraphs (7) and (8) of section 1890(b) and section 1890A of the Social Security Act (42 U.S.C. 1395aaa(b)(7) and (8); 42 U.S.C. 1890A); and" />
                      <outline text="&apos;(iv) the provision of training and follow-up technical assistance to health care professionals, and public health staff, and allied health professionals to identify, assess, treat, and refer clients who are victims of domestic violence, dating violence, sexual assault, or stalking, including using tools and training materials already developed." />
                      <outline text="&apos;(2) PERMISSIBLE USES-" />
                      <outline text="&apos;(A) CHILD AND ELDER ABUSE- To the extent consistent with the purpose of this section, a grantee may use amounts received under this section to address, as part of a comprehensive programmatic approach implemented under the grant, issues relating to child or elder abuse." />
                      <outline text="&apos;(B) RURAL AREAS- Grants funded under paragraphs (1) and (2) of subsection (a) may be used to offer to rural areas community-based training opportunities, which may include the use of distance learning networks and other available technologies needed to reach isolated rural areas, for medical, nursing, and other health profession students and residents on domestic violence, dating violence, sexual assault, stalking, and, as appropriate, other forms of violence and abuse." />
                      <outline text="&apos;(C) OTHER USES- Grants funded under subsection (a)(3) may be used for--" />
                      <outline text="&apos;(i) the development of training modules and policies that address the overlap of child abuse, domestic violence, dating violence, sexual assault, and stalking and elder abuse, as well as childhood exposure to domestic and sexual violence;" />
                      <outline text="&apos;(ii) the development, expansion, and implementation of sexual assault forensic medical examination or sexual assault nurse examiner programs;" />
                      <outline text="&apos;(iii) the inclusion of the health effects of lifetime exposure to violence and abuse as well as related protective factors and behavioral risk factors in health professional training schools including medical, dental, nursing, social work, and mental and behavioral health curricula, and allied health service training courses; or" />
                      <outline text="&apos;(iv) the integration of knowledge of domestic violence, dating violence, sexual assault, and stalking into health care accreditation and professional licensing examinations, such as medical, dental, social work, and nursing boards, and where appropriate, other allied health exams." />
                      <outline text="&apos;(c) Requirements for Grantees-" />
                      <outline text="&apos;(1) CONFIDENTIALITY AND SAFETY-" />
                      <outline text="&apos;(A) IN GENERAL- Grantees under this section shall ensure that all programs developed with grant funds address issues of confidentiality and patient safety and comply with applicable confidentiality and nondisclosure requirements under section 40002(b)(2) of the Violence Against Women Act of 1994 and the Family Violence Prevention and Services Act, and that faculty and staff associated with delivering educational components are fully trained in procedures that will protect the immediate and ongoing security and confidentiality of the patients, patient records, and staff. Such grantees shall consult entities with demonstrated expertise in the confidentiality and safety needs of victims of domestic violence, dating violence, sexual assault, and stalking on the development and adequacy of confidentially and security procedures, and provide documentation of such consultation." />
                      <outline text="&apos;(B) ADVANCE NOTICE OF INFORMATION DISCLOSURE- Grantees under this section shall provide to patients advance notice about any circumstances under which information may be disclosed, such as mandatory reporting laws, and shall give patients the option to receive information and referrals without affirmatively disclosing abuse." />
                      <outline text="&apos;(2) LIMITATION ON ADMINISTRATIVE EXPENSES- A grantee shall use not more than 10 percent of the amounts received under a grant under this section for administrative expenses." />
                      <outline text="&apos;(3) APPLICATION-" />
                      <outline text="&apos;(A) PREFERENCE- In selecting grant recipients under this section, the Secretary shall give preference to applicants based on the strength of their evaluation strategies, with priority given to outcome based evaluations." />
                      <outline text="&apos;(B) SUBSECTION (A)(1) AND (2) GRANTEES- Applications for grants under paragraphs (1) and (2) of subsection (a) shall include--" />
                      <outline text="&apos;(i) documentation that the applicant represents a team of entities working collaboratively to strengthen the response of the health care system to domestic violence, dating violence, sexual assault, or stalking, and which includes at least one of each of--" />
                      <outline text="&apos;(I) an accredited school of allopathic or osteopathic medicine, psychology, nursing, dentistry, social work, or other health field;" />
                      <outline text="&apos;(II) a health care facility or system; or" />
                      <outline text="&apos;(III) a government or nonprofit entity with a history of effective work in the fields of domestic violence, dating violence, sexual assault, or stalking; and" />
                      <outline text="&apos;(ii) strategies for the dissemination and sharing of curricula and other educational materials developed under the grant, if any, with other interested health professions schools and national resource repositories for materials on domestic violence, dating violence, sexual assault, and stalking." />
                      <outline text="&apos;(C) SUBSECTION (A)(3) GRANTEES- An entity desiring a grant under subsection (a)(3) shall submit an application to the Secretary at such time, in such a manner, and containing such information and assurances as the Secretary may require, including--" />
                      <outline text="&apos;(i) documentation that all training, education, screening, assessment, services, treatment, and any other approach to patient care will be informed by an understanding of violence and abuse victimization and trauma-specific approaches that will be integrated into prevention, intervention, and treatment activities;" />
                      <outline text="&apos;(ii) strategies for the development and implementation of policies to prevent and address domestic violence, dating violence, sexual assault, and stalking over the lifespan in health care settings;" />
                      <outline text="&apos;(iii) a plan for consulting with State and tribal domestic violence or sexual assault coalitions, national nonprofit victim advocacy organizations, State or tribal law enforcement task forces (where appropriate), and population specific organizations with demonstrated expertise in domestic violence, dating violence, sexual assault, or stalking;" />
                      <outline text="&apos;(iv) with respect to an application for a grant under which the grantee will have contact with patients, a plan, developed in collaboration with local victim service providers, to respond appropriately to and make correct referrals for individuals who disclose that they are victims of domestic violence, dating violence, sexual assault, stalking, or other types of violence, and documentation provided by the grantee of an ongoing collaborative relationship with a local victim service provider; and" />
                      <outline text="&apos;(v) with respect to an application for a grant proposing to fund a program described in subsection (b)(2)(C)(ii), a certification that any sexual assault forensic medical examination and sexual assault nurse examiner programs supported with such grant funds will adhere to the guidelines set forth by the Attorney General." />
                      <outline text="&apos;(d) Eligible Entities-" />
                      <outline text="&apos;(1) IN GENERAL- To be eligible to receive funding under paragraph (1) or (2) of subsection (a), an entity shall be--" />
                      <outline text="&apos;(A) a nonprofit organization with a history of effective work in the field of training health professionals with an understanding of, and clinical skills pertinent to, domestic violence, dating violence, sexual assault, or stalking, and lifetime exposure to violence and abuse;" />
                      <outline text="&apos;(B) an accredited school of allopathic or osteopathic medicine, psychology, nursing, dentistry, social work, or allied health;" />
                      <outline text="&apos;(C) a health care provider membership or professional organization, or a health care system; or" />
                      <outline text="&apos;(D) a State, tribal, territorial, or local entity." />
                      <outline text="&apos;(2) SUBSECTION (A)(3) GRANTEES- To be eligible to receive funding under subsection (a)(3), an entity shall be--" />
                      <outline text="&apos;(A) a State department (or other division) of health, a State, tribal, or territorial domestic violence or sexual assault coalition or victim service provider, or any other nonprofit, nongovernmental organization with a history of effective work in the fields of domestic violence, dating violence, sexual assault, or stalking, and health care, including physical or mental health care; or" />
                      <outline text="&apos;(B) a local victim service provider, a local department (or other division) of health, a local health clinic, hospital, or health system, or any other community-based organization with a history of effective work in the field of domestic violence, dating violence, sexual assault, or stalking and health care, including physical or mental health care." />
                      <outline text="&apos;(e) Technical Assistance-" />
                      <outline text="&apos;(1) IN GENERAL- Of the funds made available to carry out this section for any fiscal year, the Secretary may make grants or enter into contracts to provide technical assistance with respect to the planning, development, and operation of any program, activity or service carried out pursuant to this section. Not more than 8 percent of the funds appropriated under this section in each fiscal year may be used to fund technical assistance under this subsection." />
                      <outline text="&apos;(2) AVAILABILITY OF MATERIALS- The Secretary shall make publicly available materials developed by grantees under this section, including materials on training, best practices, and research and evaluation." />
                      <outline text="&apos;(3) REPORTING- The Secretary shall publish a biennial report on--" />
                      <outline text="&apos;(A) the distribution of funds under this section; and" />
                      <outline text="&apos;(B) the programs and activities supported by such funds." />
                      <outline text="&apos;(f) Research and Evaluation-" />
                      <outline text="&apos;(1) IN GENERAL- Of the funds made available to carry out this section for any fiscal year, the Secretary may use not more than 20 percent to make a grant or enter into a contract for research and evaluation of--" />
                      <outline text="&apos;(A) grants awarded under this section; and" />
                      <outline text="&apos;(B) other training for health professionals and effective interventions in the health care setting that prevent domestic violence, dating violence, and sexual assault across the lifespan, prevent the health effects of such violence, and improve the safety and health of individuals who are currently being victimized." />
                      <outline text="&apos;(2) RESEARCH- Research authorized in paragraph (1) may include--" />
                      <outline text="&apos;(A) research on the effects of domestic violence, dating violence, sexual assault, and childhood exposure to domestic, dating or sexual violence on health behaviors, health conditions, and health status of individuals, families, and populations, including underserved populations;" />
                      <outline text="&apos;(B) research to determine effective health care interventions to respond to and prevent domestic violence, dating violence, sexual assault, and stalking;" />
                      <outline text="&apos;(C) research on the impact of domestic, dating and sexual violence, childhood exposure to such violence, and stalking on the health care system, health care utilization, health care costs, and health status; and" />
                      <outline text="&apos;(D) research on the impact of adverse childhood experiences on adult experience with domestic violence, dating violence, sexual assault, stalking, and adult health outcomes, including how to reduce or prevent the impact of adverse childhood experiences through the health care setting." />
                      <outline text="&apos;(g) Authorization of Appropriations- There is authorized to be appropriated to carry out this section, $10,000,000 for each of fiscal years 2014 through 2018." />
                      <outline text="&apos;(h) Definitions- Except as otherwise provided herein, the definitions provided for in section 40002 of the Violence Against Women Act of 1994 shall apply to this section.&apos;." />
                      <outline text="(b) Repeals- The following provisions are repealed:" />
                      <outline text="(1) Section 40297 of the Violence Against Women Act of 1994 (42 U.S.C. 13973)." />
                      <outline text="(2) Section 758 of the Public Health Service Act (42 U.S.C. 294h)." />
                      <outline text="TITLE VI--SAFE HOMES FOR VICTIMS OF DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, AND STALKING" />
                      <outline text="SEC. 601. HOUSING PROTECTIONS FOR VICTIMS OF DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, AND STALKING." />
                      <outline text="(a) Amendment- Subtitle N of the Violence Against Women Act of 1994 (42 U.S.C. 14043e et seq.) is amended--" />
                      <outline text="(1) by inserting after the subtitle heading the following:" />
                      <outline text="&apos;CHAPTER 1--GRANT PROGRAMS&apos;;(2) in section 41402 (42 U.S.C. 14043e-1), in the matter preceding paragraph (1), by striking &apos;subtitle&apos; and inserting &apos;chapter&apos;;" />
                      <outline text="(3) in section 41403 (42 U.S.C. 14043e-2), in the matter preceding paragraph (1), by striking &apos;subtitle&apos; and inserting &apos;chapter&apos;; and" />
                      <outline text="(4) by adding at the end the following:" />
                      <outline text="&apos;CHAPTER 2--HOUSING RIGHTS&apos;SEC. 41411. HOUSING PROTECTIONS FOR VICTIMS OF DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, AND STALKING." />
                      <outline text="&apos;(a) Definitions- In this chapter:" />
                      <outline text="&apos;(1) AFFILIATED INDIVIDUAL- The term &apos;affiliated individual&apos; means, with respect to an individual--" />
                      <outline text="&apos;(A) a spouse, parent, brother, sister, or child of that individual, or an individual to whom that individual stands in loco parentis; or" />
                      <outline text="&apos;(B) any individual, tenant, or lawful occupant living in the household of that individual." />
                      <outline text="&apos;(2) APPROPRIATE AGENCY- The term &apos;appropriate agency&apos; means, with respect to a covered housing program, the Executive department (as defined in section 101 of title 5, United States Code) that carries out the covered housing program." />
                      <outline text="&apos;(3) COVERED HOUSING PROGRAM- The term &apos;covered housing program&apos; means--" />
                      <outline text="&apos;(A) the program under section 202 of the Housing Act of 1959 (12 U.S.C. 1701q);" />
                      <outline text="&apos;(B) the program under section 811 of the Cranston-Gonzalez National Affordable Housing Act (42 U.S.C. 8013);" />
                      <outline text="&apos;(C) the program under subtitle D of title VIII of the Cranston-Gonzalez National Affordable Housing Act (42 U.S.C. 12901 et seq.);" />
                      <outline text="&apos;(D) the program under subtitle A of title IV of the McKinney-Vento Homeless Assistance Act (42 U.S.C. 11360 et seq.);" />
                      <outline text="&apos;(E) the program under subtitle A of title II of the Cranston-Gonzalez National Affordable Housing Act (42 U.S.C. 12741 et seq.);" />
                      <outline text="&apos;(F) the program under paragraph (3) of section 221(d) of the National Housing Act (12 U.S.C. 1715l(d)) that bears interest at a rate determined under the proviso under paragraph (5) of such section 221(d);" />
                      <outline text="&apos;(G) the program under section 236 of the National Housing Act (12 U.S.C. 1715z-1);" />
                      <outline text="&apos;(H) the programs under sections 6 and 8 of the United States Housing Act of 1937 (42 U.S.C. 1437d and 1437f);" />
                      <outline text="&apos;(I) rural housing assistance provided under sections 514, 515, 516, 533, and 538 of the Housing Act of 1949 (42 U.S.C. 1484, 1485, 1486, 1490m, and 1490p-2); and" />
                      <outline text="&apos;(J) the low income housing tax credit program under section 42 of the Internal Revenue Code of 1986." />
                      <outline text="&apos;(b) Prohibited Basis for Denial or Termination of Assistance or Eviction-" />
                      <outline text="&apos;(1) IN GENERAL- An applicant for or tenant of housing assisted under a covered housing program may not be denied admission to, denied assistance under, terminated from participation in, or evicted from the housing on the basis that the applicant or tenant is or has been a victim of domestic violence, dating violence, sexual assault, or stalking, if the applicant or tenant otherwise qualifies for admission, assistance, participation, or occupancy." />
                      <outline text="&apos;(2) CONSTRUCTION OF LEASE TERMS- An incident of actual or threatened domestic violence, dating violence, sexual assault, or stalking shall not be construed as--" />
                      <outline text="&apos;(A) a serious or repeated violation of a lease for housing assisted under a covered housing program by the victim or threatened victim of such incident; or" />
                      <outline text="&apos;(B) good cause for terminating the assistance, tenancy, or occupancy rights to housing assisted under a covered housing program of the victim or threatened victim of such incident." />
                      <outline text="&apos;(3) TERMINATION ON THE BASIS OF CRIMINAL ACTIVITY-" />
                      <outline text="&apos;(A) DENIAL OF ASSISTANCE, TENANCY, AND OCCUPANCY RIGHTS PROHIBITED- No person may deny assistance, tenancy, or occupancy rights to housing assisted under a covered housing program to a tenant solely on the basis of criminal activity directly relating to domestic violence, dating violence, sexual assault, or stalking that is engaged in by a member of the household of the tenant or any guest or other person under the control of the tenant, if the tenant or an affiliated individual of the tenant is the victim or threatened victim of such domestic violence, dating violence, sexual assault, or stalking." />
                      <outline text="&apos;(B) BIFURCATION-" />
                      <outline text="&apos;(i) IN GENERAL- Notwithstanding subparagraph (A), a public housing agency or owner or manager of housing assisted under a covered housing program may bifurcate a lease for the housing in order to evict, remove, or terminate assistance to any individual who is a tenant or lawful occupant of the housing and who engages in criminal activity directly relating to domestic violence, dating violence, sexual assault, or stalking against an affiliated individual or other individual, without evicting, removing, terminating assistance to, or otherwise penalizing a victim of such criminal activity who is also a tenant or lawful occupant of the housing." />
                      <outline text="&apos;(ii) EFFECT OF EVICTION ON OTHER TENANTS- If public housing agency or owner or manager of housing assisted under a covered housing program evicts, removes, or terminates assistance to an individual under clause (i), and the individual is the sole tenant eligible to receive assistance under a covered housing program, the public housing agency or owner or manager of housing assisted under the covered housing program shall provide any remaining tenant an opportunity to establish eligibility for the covered housing program. If a tenant described in the preceding sentence cannot establish eligibility, the public housing agency or owner or manager of the housing shall provide the tenant a reasonable time, as determined by the appropriate agency, to find new housing or to establish eligibility for housing under another covered housing program." />
                      <outline text="&apos;(C) RULES OF CONSTRUCTION- Nothing in subparagraph (A) shall be construed--" />
                      <outline text="&apos;(i) to limit the authority of a public housing agency or owner or manager of housing assisted under a covered housing program, when notified of a court order, to comply with a court order with respect to--" />
                      <outline text="&apos;(I) the rights of access to or control of property, including civil protection orders issued to protect a victim of domestic violence, dating violence, sexual assault, or stalking; or" />
                      <outline text="&apos;(II) the distribution or possession of property among members of a household in a case;" />
                      <outline text="&apos;(ii) to limit any otherwise available authority of a public housing agency or owner or manager of housing assisted under a covered housing program to evict or terminate assistance to a tenant for any violation of a lease not premised on the act of violence in question against the tenant or an affiliated person of the tenant, if the public housing agency or owner or manager does not subject an individual who is or has been a victim of domestic violence, dating violence, or stalking to a more demanding standard than other tenants in determining whether to evict or terminate;" />
                      <outline text="&apos;(iii) to limit the authority to terminate assistance to a tenant or evict a tenant from housing assisted under a covered housing program if a public housing agency or owner or manager of the housing can demonstrate that an actual and imminent threat to other tenants or individuals employed at or providing service to the property would be present if the assistance is not terminated or the tenant is not evicted; or" />
                      <outline text="&apos;(iv) to supersede any provision of any Federal, State, or local law that provides greater protection than this section for victims of domestic violence, dating violence, sexual assault, or stalking." />
                      <outline text="&apos;(c) Documentation-" />
                      <outline text="&apos;(1) REQUEST FOR DOCUMENTATION- If an applicant for, or tenant of, housing assisted under a covered housing program represents to a public housing agency or owner or manager of the housing that the individual is entitled to protection under subsection (b), the public housing agency or owner or manager may request, in writing, that the applicant or tenant submit to the public housing agency or owner or manager a form of documentation described in paragraph (3)." />
                      <outline text="&apos;(2) FAILURE TO PROVIDE CERTIFICATION-" />
                      <outline text="&apos;(A) IN GENERAL- If an applicant or tenant does not provide the documentation requested under paragraph (1) within 14 business days after the tenant receives a request in writing for such certification from a public housing agency or owner or manager of housing assisted under a covered housing program, nothing in this chapter may be construed to limit the authority of the public housing agency or owner or manager to--" />
                      <outline text="&apos;(i) deny admission by the applicant or tenant to the covered program;" />
                      <outline text="&apos;(ii) deny assistance under the covered program to the applicant or tenant;" />
                      <outline text="&apos;(iii) terminate the participation of the applicant or tenant in the covered program; or" />
                      <outline text="&apos;(iv) evict the applicant, the tenant, or a lawful occupant that commits violations of a lease." />
                      <outline text="&apos;(B) EXTENSION- A public housing agency or owner or manager of housing may extend the 14-day deadline under subparagraph (A) at its discretion." />
                      <outline text="&apos;(3) FORM OF DOCUMENTATION- A form of documentation described in this paragraph is--" />
                      <outline text="&apos;(A) a certification form approved by the appropriate agency that--" />
                      <outline text="&apos;(i) states that an applicant or tenant is a victim of domestic violence, dating violence, sexual assault, or stalking;" />
                      <outline text="&apos;(ii) states that the incident of domestic violence, dating violence, sexual assault, or stalking that is the ground for protection under subsection (b) meets the requirements under subsection (b); and" />
                      <outline text="&apos;(iii) includes the name of the individual who committed the domestic violence, dating violence, sexual assault, or stalking, if the name is known and safe to provide;" />
                      <outline text="&apos;(B) a document that--" />
                      <outline text="&apos;(i) is signed by--" />
                      <outline text="&apos;(I) an employee, agent, or volunteer of a victim service provider, an attorney, a medical professional, or a mental health professional from whom an applicant or tenant has sought assistance relating to domestic violence, dating violence, sexual assault, or stalking, or the effects of the abuse; and" />
                      <outline text="&apos;(II) the applicant or tenant; and" />
                      <outline text="&apos;(ii) states under penalty of perjury that the individual described in clause (i)(I) believes that the incident of domestic violence, dating violence, sexual assault, or stalking that is the ground for protection under subsection (b) meets the requirements under subsection (b);" />
                      <outline text="&apos;(C) a record of a Federal, State, tribal, territorial, or local law enforcement agency, court, or administrative agency; or" />
                      <outline text="&apos;(D) at the discretion of a public housing agency or owner or manager of housing assisted under a covered housing program, a statement or other evidence provided by an applicant or tenant." />
                      <outline text="&apos;(4) CONFIDENTIALITY- Any information submitted to a public housing agency or owner or manager under this subsection, including the fact that an individual is a victim of domestic violence, dating violence, sexual assault, or stalking shall be maintained in confidence by the public housing agency or owner or manager and may not be entered into any shared database or disclosed to any other entity or individual, except to the extent that the disclosure is--" />
                      <outline text="&apos;(A) requested or consented to by the individual in writing;" />
                      <outline text="&apos;(B) required for use in an eviction proceeding under subsection (b); or" />
                      <outline text="&apos;(C) otherwise required by applicable law." />
                      <outline text="&apos;(5) DOCUMENTATION NOT REQUIRED- Nothing in this subsection shall be construed to require a public housing agency or owner or manager of housing assisted under a covered housing program to request that an individual submit documentation of the status of the individual as a victim of domestic violence, dating violence, sexual assault, or stalking." />
                      <outline text="&apos;(6) COMPLIANCE NOT SUFFICIENT TO CONSTITUTE EVIDENCE OF UNREASONABLE ACT- Compliance with subsection (b) by a public housing agency or owner or manager of housing assisted under a covered housing program based on documentation received under this subsection, shall not be sufficient to constitute evidence of an unreasonable act or omission by the public housing agency or owner or manager or an employee or agent of the public housing agency or owner or manager. Nothing in this paragraph shall be construed to limit the liability of a public housing agency or owner or manager of housing assisted under a covered housing program for failure to comply with subsection (b)." />
                      <outline text="&apos;(7) RESPONSE TO CONFLICTING CERTIFICATION- If a public housing agency or owner or manager of housing assisted under a covered housing program receives documentation under this subsection that contains conflicting information, the public housing agency or owner or manager may require an applicant or tenant to submit third-party documentation, as described in subparagraph (B), (C), or (D) of paragraph (3)." />
                      <outline text="&apos;(8) PREEMPTION- Nothing in this subsection shall be construed to supersede any provision of any Federal, State, or local law that provides greater protection than this subsection for victims of domestic violence, dating violence, sexual assault, or stalking." />
                      <outline text="&apos;(d) Notification-" />
                      <outline text="&apos;(1) DEVELOPMENT- The Secretary of Housing and Urban Development shall develop a notice of the rights of individuals under this section, including the right to confidentiality and the limits thereof." />
                      <outline text="&apos;(2) PROVISION- Each public housing agency or owner or manager of housing assisted under a covered housing program shall provide the notice developed under paragraph (1), together with the form described in subsection (c)(3)(A), to an applicant for or tenants of housing assisted under a covered housing program--" />
                      <outline text="&apos;(A) at the time the applicant is denied residency in a dwelling unit assisted under the covered housing program;" />
                      <outline text="&apos;(B) at the time the individual is admitted to a dwelling unit assisted under the covered housing program;" />
                      <outline text="&apos;(C) with any notification of eviction or notification of termination of assistance; and" />
                      <outline text="&apos;(D) in multiple languages, consistent with guidance issued by the Secretary of Housing and Urban Development in accordance with Executive Order 13166 (42 U.S.C. 2000d-1 note; relating to access to services for persons with limited English proficiency)." />
                      <outline text="&apos;(e) Emergency Transfers- Each appropriate agency shall adopt a model emergency transfer plan for use by public housing agencies and owners or managers of housing assisted under covered housing programs that--" />
                      <outline text="&apos;(1) allows tenants who are victims of domestic violence, dating violence, sexual assault, or stalking to transfer to another available and safe dwelling unit assisted under a covered housing program if--" />
                      <outline text="&apos;(A) the tenant expressly requests the transfer; and" />
                      <outline text="&apos;(B)(i) the tenant reasonably believes that the tenant is threatened with imminent harm from further violence if the tenant remains within the same dwelling unit assisted under a covered housing program; or" />
                      <outline text="&apos;(ii) in the case of a tenant who is a victim of sexual assault, the sexual assault occurred on the premises during the 90 day period preceding the request for transfer; and" />
                      <outline text="&apos;(2) incorporates reasonable confidentiality measures to ensure that the public housing agency or owner or manager does not disclose the location of the dwelling unit of a tenant to a person that commits an act of domestic violence, dating violence, sexual assault, or stalking against the tenant." />
                      <outline text="&apos;(f) Policies and Procedures for Emergency Transfer- The Secretary of Housing and Urban Development shall establish policies and procedures under which a victim requesting an emergency transfer under subsection (e) may receive, subject to the availability of tenant protection vouchers, assistance under section 8(o) of the United States Housing Act of 1937 (42 U.S.C. 1437f(o))." />
                      <outline text="&apos;(g) Implementation- The appropriate agency with respect to each covered housing program shall implement this section, as this section applies to the covered housing program.&apos;." />
                      <outline text="(b) Conforming Amendments-" />
                      <outline text="(1) SECTION 6- Section 6 of the United States Housing Act of 1937 (42 U.S.C. 1437d) is amended--" />
                      <outline text="(A) in subsection (c)--" />
                      <outline text="(i) by striking paragraph (3); and" />
                      <outline text="(ii) by redesignating paragraphs (4) and (5) as paragraphs (3) and (4), respectively;" />
                      <outline text="(B) in subsection (l)--" />
                      <outline text="(i) in paragraph (5), by striking &apos;, and that an incident or incidents of actual or threatened domestic violence, dating violence, or stalking will not be construed as a serious or repeated violation of the lease by the victim or threatened victim of that violence and will not be good cause for terminating the tenancy or occupancy rights of the victim of such violence&apos;; and" />
                      <outline text="(ii) in paragraph (6), by striking &apos;; except that&apos; and all that follows through &apos;stalking.&apos;; and" />
                      <outline text="(C) by striking subsection (u)." />
                      <outline text="(2) SECTION 8- Section 8 of the United States Housing Act of 1937 (42 U.S.C. 1437f) is amended--" />
                      <outline text="(A) in subsection (c), by striking paragraph (9);" />
                      <outline text="(B) in subsection (d)(1)--" />
                      <outline text="(i) in subparagraph (A), by striking &apos;and that an applicant or participant is or has been a victim of domestic violence, dating violence, or stalking is not an appropriate basis for denial of program assistance or for denial of admission if the applicant otherwise qualifies for assistance or admission&apos;; and" />
                      <outline text="(ii) in subparagraph (B)--" />
                      <outline text="(I) in clause (ii), by striking &apos;, and that an incident or incidents of actual or threatened domestic violence, dating violence, or stalking will not be construed as a serious or repeated violation of the lease by the victim or threatened victim of that violence and will not be good cause for terminating the tenancy or occupancy rights of the victim of such violence&apos;; and" />
                      <outline text="(II) in clause (iii), by striking &apos;, except that:&apos; and all that follows through &apos;stalking.&apos;;" />
                      <outline text="(C) in subsection (f)--" />
                      <outline text="(i) in paragraph (6), by adding &apos;and&apos; at the end;" />
                      <outline text="(ii) in paragraph (7), by striking the semicolon at the end and inserting a period; and" />
                      <outline text="(iii) by striking paragraphs (8), (9), (10), and (11);" />
                      <outline text="(D) in subsection (o)--" />
                      <outline text="(i) in paragraph (6)(B), by striking the last sentence;" />
                      <outline text="(ii) in paragraph (7)--" />
                      <outline text="(I) in subparagraph (C), by striking &apos;and that an incident or incidents of actual or threatened domestic violence, dating violence, or stalking shall not be construed as a serious or repeated violation of the lease by the victim or threatened victim of that violence and shall not be good cause for terminating the tenancy or occupancy rights of the victim of such violence&apos;; and" />
                      <outline text="(II) in subparagraph (D), by striking &apos;; except that&apos; and all that follows through &apos;stalking.&apos;; and" />
                      <outline text="(iii) by striking paragraph (20); and" />
                      <outline text="(E) by striking subsection (ee)." />
                      <outline text="(3) RULE OF CONSTRUCTION- Nothing in this Act, or the amendments made by this Act, shall be construed--" />
                      <outline text="(A) to limit the rights or remedies available to any person under section 6 or 8 of the United States Housing Act of 1937 (42 U.S.C. 1437d and 1437f), as in effect on the day before the date of enactment of this Act;" />
                      <outline text="(B) to limit any right, remedy, or procedure otherwise available under any provision of part 5, 91, 880, 882, 883, 884, 886, 891, 903, 960, 966, 982, or 983 of title 24, Code of Federal Regulations, that--" />
                      <outline text="(i) was issued under the Violence Against Women and Department of Justice Reauthorization Act of 2005 (Public Law 109-162; 119 Stat. 2960) or an amendment made by that Act; and" />
                      <outline text="(ii) provides greater protection for victims of domestic violence, dating violence, sexual assault, and stalking than this Act; or" />
                      <outline text="(C) to disqualify an owner, manager, or other individual from participating in or receiving the benefits of the low income housing tax credit program under section 42 of the Internal Revenue Code of 1986 because of noncompliance with the provisions of this Act." />
                      <outline text="SEC. 602. TRANSITIONAL HOUSING ASSISTANCE GRANTS FOR VICTIMS OF DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, AND STALKING." />
                      <outline text="Chapter 11 of subtitle B of the Violence Against Women Act of 1994 (42 U.S.C. 13975 et seq.) is amended--" />
                      <outline text="(1) in the chapter heading, by striking &apos;CHILD VICTIMS OF DOMESTIC VIOLENCE, STALKING, OR SEXUAL ASSAULT&apos; and inserting &apos;VICTIMS OF DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, OR STALKING&apos;; and" />
                      <outline text="(2) in section 40299 (42 U.S.C. 13975)--" />
                      <outline text="(A) in the header, by striking &apos;child victims of domestic violence, stalking, or sexual assault&apos; and inserting &apos;victims of domestic violence, dating violence, sexual assault, or stalking&apos;;" />
                      <outline text="(B) in subsection (a)(1), by striking &apos;fleeing&apos;;" />
                      <outline text="(C) in subsection (b)(3)--" />
                      <outline text="(i) in subparagraph (A), by striking &apos; and&apos; at the end;" />
                      <outline text="(ii) by redesignating subparagraph (B) as subparagraph (C);" />
                      <outline text="(iii) by inserting after subparagraph (A) the following:" />
                      <outline text="&apos;(B) secure employment, including obtaining employment counseling, occupational training, job retention counseling, and counseling concerning re-entry in to the workforce; and&apos;; and" />
                      <outline text="(iv) in subparagraph (C), as redesignated by clause (ii), by striking &apos; employment counseling,&apos;; and" />
                      <outline text="(D) in subsection (g)--" />
                      <outline text="(i) in paragraph (1), by striking &apos;$40,000,000 for each of fiscal years 2007 through 2011&apos; and inserting &apos;$35,000,000 for each of fiscal years 2014 through 2018&apos;; and" />
                      <outline text="(ii) in paragraph (3)--" />
                      <outline text="(I) in subparagraph (A), by striking &apos;eligible&apos; and inserting &apos;qualified&apos;; and" />
                      <outline text="(II) by adding at the end the following:" />
                      <outline text="&apos;(D) QUALIFIED APPLICATION DEFINED- In this paragraph, the term &apos;qualified application&apos; means an application that--" />
                      <outline text="&apos;(i) has been submitted by an eligible applicant;" />
                      <outline text="&apos;(ii) does not propose any activities that may compromise victim safety, including--" />
                      <outline text="&apos;(I) background checks of victims; or" />
                      <outline text="&apos;(II) clinical evaluations to determine eligibility for services;" />
                      <outline text="&apos;(iii) reflects an understanding of the dynamics of domestic violence, dating violence, sexual assault, or stalking; and" />
                      <outline text="&apos;(iv) does not propose prohibited activities, including mandatory services for victims.&apos;." />
                      <outline text="SEC. 603. ADDRESSING THE HOUSING NEEDS OF VICTIMS OF DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULT, AND STALKING." />
                      <outline text="Subtitle N of the Violence Against Women Act of 1994 (42 U.S.C. 14043e et seq.) is amended--" />
                      <outline text="(1) in section 41404(i) (42 U.S.C. 14043e-3(i)), by striking &apos;$10,000,000 for each of fiscal years 2007 through 2011&apos; and inserting &apos;$4,000,000 for each of fiscal years 2014 through 2018&apos;; and" />
                      <outline text="(2) in section 41405(g) (42 U.S.C. 14043e-4(g)), by striking &apos;$10,000,000 for each of fiscal years 2007 through 2011&apos; and inserting &apos;$4,000,000 for each of fiscal years 2014 through 2018&apos;." />
                      <outline text="TITLE VII--ECONOMIC SECURITY FOR VICTIMS OF VIOLENCE" />
                      <outline text="SEC. 701. NATIONAL RESOURCE CENTER ON WORKPLACE RESPONSES TO ASSIST VICTIMS OF DOMESTIC AND SEXUAL VIOLENCE." />
                      <outline text="Section 41501(e) of the Violence Against Women Act of 1994 (42 U.S.C. 14043f(e)) is amended by striking &apos;fiscal years 2007 through 2011&apos; and inserting &apos;fiscal years 2014 through 2018&apos;." />
                      <outline text="TITLE VIII--PROTECTION OF BATTERED IMMIGRANTS" />
                      <outline text="SEC. 801. U NONIMMIGRANT DEFINITION." />
                      <outline text="Section 101(a)(15)(U)(iii) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(15)(U)(iii)) is amended by inserting &apos;stalking;&apos; after &apos;sexual exploitation;&apos;." />
                      <outline text="SEC. 802. ANNUAL REPORT ON IMMIGRATION APPLICATIONS MADE BY VICTIMS OF ABUSE." />
                      <outline text="Not later than December 1, 2014, and annually thereafter, the Secretary of Homeland Security shall submit to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives a report that includes the following:" />
                      <outline text="(1) The number of aliens who--" />
                      <outline text="(A) submitted an application for nonimmigrant status under paragraph (15)(T)(i), (15)(U)(i), or (51) of section 101(a) of the Immigration and Nationality Act (8 U.S.C. 1101(a)) during the preceding fiscal year;" />
                      <outline text="(B) were granted such nonimmigrant status during such fiscal year; or" />
                      <outline text="(C) were denied such nonimmigrant status during such fiscal year." />
                      <outline text="(2) The mean amount of time and median amount of time to adjudicate an application for such nonimmigrant status during such fiscal year." />
                      <outline text="(3) The mean amount of time and median amount of time between the receipt of an application for such nonimmigrant status and the issuance of work authorization to an eligible applicant during the preceding fiscal year." />
                      <outline text="(4) The number of aliens granted continued presence in the United States under section 107(c)(3) of the Trafficking Victims Protection Act of 2000 (22 U.S.C. 7105(c)(3)) during the preceding fiscal year." />
                      <outline text="(5) A description of any actions being taken to reduce the adjudication and processing time, while ensuring the safe and competent processing, of an application described in paragraph (1) or a request for continued presence referred to in paragraph (4)." />
                      <outline text="SEC. 803. PROTECTION FOR CHILDREN OF VAWA SELF-PETITIONERS." />
                      <outline text="Section 204(l)(2) of the Immigration and Nationality Act (8 U.S.C. 1154(l)(2)) is amended--" />
                      <outline text="(1) in subparagraph (E), by striking &apos;or&apos; at the end;" />
                      <outline text="(2) by redesignating subparagraph (F) as subparagraph (G); and" />
                      <outline text="(3) by inserting after subparagraph (E) the following:" />
                      <outline text="&apos;(F) a child of an alien who filed a pending or approved petition for classification or application for adjustment of status or other benefit specified in section 101(a)(51) as a VAWA self-petitioner; or&apos;." />
                      <outline text="Section 212(a)(4) of the Immigration and Nationality Act (8 U.S.C. 1182(a)(4)) is amended by adding at the end the following:" />
                      <outline text="&apos;(E) SPECIAL RULE FOR QUALIFIED ALIEN VICTIMS- Subparagraphs (A), (B), and (C) shall not apply to an alien who--" />
                      <outline text="&apos;(i) is a VAWA self-petitioner;" />
                      <outline text="&apos;(ii) is an applicant for, or is granted, nonimmigrant status under section 101(a)(15)(U); or" />
                      <outline text="&apos;(iii) is a qualified alien described in section 431(c) of the Personal Responsibility and Work Opportunity Reconciliation Act of 1996 (8 U.S.C. 1641(c)).&apos;." />
                      <outline text="SEC. 805. REQUIREMENTS APPLICABLE TO U VISAS." />
                      <outline text="(a) In General- Section 214(p) of the Immigration and Nationality Act (8 U.S.C. 1184(p)) is amended by adding at the end the following:" />
                      <outline text="&apos;(7) AGE DETERMINATIONS-" />
                      <outline text="&apos;(A) CHILDREN- An unmarried alien who seeks to accompany, or follow to join, a parent granted status under section 101(a)(15)(U)(i), and who was under 21 years of age on the date on which such parent petitioned for such status, shall continue to be classified as a child for purposes of section 101(a)(15)(U)(ii), if the alien attains 21 years of age after such parent&apos;s petition was filed but while it was pending." />
                      <outline text="&apos;(B) PRINCIPAL ALIENS- An alien described in clause (i) of section 101(a)(15)(U) shall continue to be treated as an alien described in clause (ii)(I) of such section if the alien attains 21 years of age after the alien&apos;s application for status under such clause (i) is filed but while it is pending.&apos;." />
                      <outline text="(b) Effective Date- The amendment made by subsection (a) shall take effect as if enacted as part of the Victims of Trafficking and Violence Protection Act of 2000 (Public Law 106-386; 114 Stat. 1464)." />
                      <outline text="SEC. 806. HARDSHIP WAIVERS." />
                      <outline text="(a) In General- Section 216(c)(4) of the Immigration and Nationality Act (8 U.S.C. 1186a(c)(4)) is amended--" />
                      <outline text="(1) in subparagraph (A), by striking the comma at the end and inserting a semicolon;" />
                      <outline text="(2) in subparagraph (B), by striking &apos;(1), or&apos; and inserting &apos;(1); or&apos;;" />
                      <outline text="(3) in subparagraph (C), by striking the period at the end and inserting a semicolon and &apos;or&apos;; and" />
                      <outline text="(4) by inserting after subparagraph (C) the following:" />
                      <outline text="&apos;(D) the alien meets the requirements under section 204(a)(1)(A)(iii)(II)(aa)(BB) and following the marriage ceremony was battered by or subject to extreme cruelty perpetrated by the alien&apos;s intended spouse and was not at fault in failing to meet the requirements of paragraph (1).&apos;." />
                      <outline text="(b) Technical Corrections- Section 216(c)(4) of the Immigration and Nationality Act (8 U.S.C. 1186a(c)(4)), as amended by subsection (a), is further amended--" />
                      <outline text="(1) in the matter preceding subparagraph (A), by striking &apos;The Attorney General, in the Attorney General&apos;s&apos; and inserting &apos;The Secretary of Homeland Security, in the Secretary&apos;s&apos;; and" />
                      <outline text="(2) in the undesignated paragraph at the end--" />
                      <outline text="(A) in the first sentence, by striking &apos;Attorney General&apos; and inserting &apos;Secretary of Homeland Security&apos;;" />
                      <outline text="(B) in the second sentence, by striking &apos;Attorney General&apos; and inserting &apos;Secretary&apos;;" />
                      <outline text="(C) in the third sentence, by striking &apos;Attorney General.&apos; and inserting &apos;Secretary.&apos;; and" />
                      <outline text="(D) in the fourth sentence, by striking &apos;Attorney General&apos; and inserting &apos;Secretary&apos;." />
                      <outline text="SEC. 807. PROTECTIONS FOR A FIANCEE OR FIANCE OF A CITIZEN." />
                      <outline text="(a) In General- Section 214 of the Immigration and Nationality Act (8 U.S.C. 1184) is amended--" />
                      <outline text="(1) in subsection (d)--" />
                      <outline text="(A) in paragraph (1), by striking &apos;crime.&apos; and inserting &apos;crime described in paragraph (3)(B) and information on any permanent protection or restraining order issued against the petitioner related to any specified crime described in paragraph (3)(B)(i).&apos;;" />
                      <outline text="(B) in paragraph (2)(A), in the matter preceding clause (i)--" />
                      <outline text="(i) by striking &apos;a consular officer&apos; and inserting &apos;the Secretary of Homeland Security&apos;; and" />
                      <outline text="(ii) by striking &apos;the officer&apos; and inserting &apos;the Secretary&apos;; and" />
                      <outline text="(C) in paragraph (3)(B)(i), by striking &apos;abuse, and stalking.&apos; and inserting &apos;abuse, stalking, or an attempt to commit any such crime.&apos;; and" />
                      <outline text="(2) in subsection (r)--" />
                      <outline text="(A) in paragraph (1), by striking &apos;crime.&apos; and inserting &apos;crime described in paragraph (5)(B) and information on any permanent protection or restraining order issued against the petitioner related to any specified crime described in subsection (5)(B)(i).&apos;; and" />
                      <outline text="(B) by amending paragraph (4)(B)(ii) to read as follows:" />
                      <outline text="&apos;(ii) To notify the beneficiary as required by clause (i), the Secretary of Homeland Security shall provide such notice to the Secretary of State for inclusion in the mailing to the beneficiary described in section 833(a)(5)(A)(i) of the International Marriage Broker Regulation Act of 2005 (8 U.S.C. 1375a(a)(5)(A)(i)).&apos;; and" />
                      <outline text="(3) in paragraph (5)(B)(i), by striking &apos;abuse, and stalking.&apos; and inserting &apos;abuse, stalking, or an attempt to commit any such crime.&apos;." />
                      <outline text="(b) Provision of Information to K Nonimmigrants- Section 833 of the International Marriage Broker Regulation Act of 2005 (8 U.S.C. 1375a) is amended--" />
                      <outline text="(1) in subsection (a)(5)(A)--" />
                      <outline text="(A) in clause (iii)--" />
                      <outline text="(i) by striking &apos;State any&apos; and inserting &apos;State, for inclusion in the mailing described in clause (i), any&apos;; and" />
                      <outline text="(ii) by striking the last sentence; and" />
                      <outline text="(B) by adding at the end the following:" />
                      <outline text="&apos;(iv) The Secretary of Homeland Security shall conduct a background check of the National Crime Information Center&apos;s Protection Order Database on each petitioner for a visa under subsection (d) or (r) of section 214 of the Immigration and Nationality Act (8 U.S.C. 1184). Any appropriate information obtained from such background check--" />
                      <outline text="&apos;(I) shall accompany the criminal background information provided by the Secretary of Homeland Security to the Secretary of State and shared by the Secretary of State with a beneficiary of a petition referred to in clause (iii); and" />
                      <outline text="&apos;(II) shall not be used or disclosed for any other purpose unless expressly authorized by law." />
                      <outline text="&apos;(v) The Secretary of Homeland Security shall create a cover sheet or other mechanism to accompany the information required to be provided to an applicant for a visa under subsection (d) or (r) of section 214 of the Immigration and Nationality Act (8 U.S.C. 1184) by clauses (i) through (iv) of this paragraph or by clauses (i) and (ii) of subsection (r)(4)(B) of such section 214, that calls to the applicant&apos;s attention--" />
                      <outline text="&apos;(I) whether the petitioner disclosed a protection order, a restraining order, or criminal history information on the visa petition;" />
                      <outline text="&apos;(II) the criminal background information and information about any protection order obtained by the Secretary of Homeland Security regarding the petitioner in the course of adjudicating the petition; and" />
                      <outline text="&apos;(III) whether the information the petitioner disclosed on the visa petition regarding any previous petitions filed under subsection (d) or (r) of such section 214 is consistent with the information in the multiple visa tracking database of the Department of Homeland Security, as described in subsection (r)(4)(A) of such section 214.&apos;; and" />
                      <outline text="(2) in subsection (b)(1)(A), by striking &apos;or&apos; after &apos;orders&apos; and inserting &apos;and&apos;." />
                      <outline text="SEC. 808. REGULATION OF INTERNATIONAL MARRIAGE BROKERS." />
                      <outline text="(a) Implementation of the International Marriage Broker Act of 2005-" />
                      <outline text="(1) FINDINGS- Congress finds the following:" />
                      <outline text="(A) The International Marriage Broker Act of 2005 (subtitle D of Public Law 109-162; 119 Stat. 3066) has not been fully implemented with regard to investigating and prosecuting violations of the law, and for other purposes." />
                      <outline text="(B) Six years after Congress enacted the International Marriage Broker Act of 2005 to regulate the activities of the hundreds of for-profit international marriage brokers operating in the United States, the Attorney General has not determined which component of the Department of Justice will investigate and prosecute violations of such Act." />
                      <outline text="(2) REPORT- Not later than 90 days after the date of the enactment of this Act, the Attorney General shall submit to Congress a report that includes the following:" />
                      <outline text="(A) The name of the component of the Department of Justice responsible for investigating and prosecuting violations of the International Marriage Broker Act of 2005 (subtitle D of Public Law 109-162; 119 Stat. 3066) and the amendments made by this Act." />
                      <outline text="(B) A description of the policies and procedures of the Attorney General for consultation with the Secretary of Homeland Security and the Secretary of State in investigating and prosecuting such violations." />
                      <outline text="(b) Technical Correction- Section 833(a)(2)(H) of the International Marriage Broker Regulation Act of 2005 (8 U.S.C. 1375a(a)(2)(H)) is amended by striking &apos;Federal and State sex offender public registries&apos; and inserting &apos;the National Sex Offender Public Website&apos;." />
                      <outline text="(c) Regulation of International Marriage Brokers- Section 833(d) of the International Marriage Broker Regulation Act of 2005 (8 U.S.C. 1375a(d)) is amended--" />
                      <outline text="(1) by amending paragraph (1) to read as follows:" />
                      <outline text="&apos;(1) PROHIBITION ON MARKETING OF OR TO CHILDREN-" />
                      <outline text="&apos;(A) IN GENERAL- An international marriage broker shall not provide any individual or entity with the personal contact information, photograph, or general information about the background or interests of any individual under the age of 18." />
                      <outline text="&apos;(B) COMPLIANCE- To comply with the requirements of subparagraph (A), an international marriage broker shall--" />
                      <outline text="&apos;(i) obtain a valid copy of each foreign national client&apos;s birth certificate or other proof of age document issued by an appropriate government entity;" />
                      <outline text="&apos;(ii) indicate on such certificate or document the date it was received by the international marriage broker;" />
                      <outline text="&apos;(iii) retain the original of such certificate or document for 7 years after such date of receipt; and" />
                      <outline text="&apos;(iv) produce such certificate or document upon request to an appropriate authority charged with the enforcement of this paragraph.&apos;;" />
                      <outline text="(2) in paragraph (2)--" />
                      <outline text="(A) in subparagraph (A)(i)--" />
                      <outline text="(i) in the heading, by striking &apos;REGISTRIES- &apos; and inserting &apos;WEBSITE- &apos;; and" />
                      <outline text="(ii) by striking &apos;Registry or State sex offender public registry,&apos; and inserting &apos;Website,&apos;; and" />
                      <outline text="(B) in subparagraph (B)(ii), by striking &apos;or stalking.&apos; and inserting &apos;stalking, or an attempt to commit any such crime.&apos;;" />
                      <outline text="(3) in paragraph (3)--" />
                      <outline text="(A) in subparagraph (A)--" />
                      <outline text="(i) in clause (i), by striking &apos;Registry, or of the relevant State sex offender public registry for any State not yet participating in the National Sex Offender Public Registry, in which the United States client has resided during the previous 20 years,&apos; and inserting &apos;Website&apos;; and" />
                      <outline text="(ii) in clause (iii)(II), by striking &apos;background information collected by the international marriage broker under paragraph (2)(B);&apos; and inserting &apos;signed certification and accompanying documentation or attestation regarding the background information collected under paragraph (2)(B);&apos;; and" />
                      <outline text="(B) by striking subparagraph (C);" />
                      <outline text="(4) in paragraph (5)--" />
                      <outline text="(A) in subparagraph (A)(ii), by striking &apos;A penalty may be imposed under clause (i) by the Attorney General only&apos; and inserting &apos;At the discretion of the Attorney General, a penalty may be imposed under clause (i) either by a Federal judge, or by the Attorney General&apos;;" />
                      <outline text="(B) by amending subparagraph (B) to read as follows:" />
                      <outline text="&apos;(B) FEDERAL CRIMINAL PENALTIES-" />
                      <outline text="&apos;(i) FAILURE OF INTERNATIONAL MARRIAGE BROKERS TO COMPLY WITH OBLIGATIONS- Except as provided in clause (ii), an international marriage broker that, in circumstances in or affecting interstate or foreign commerce, or within the special maritime and territorial jurisdiction of the United States--" />
                      <outline text="&apos;(I) except as provided in subclause (II), violates (or attempts to violate) paragraph (1), (2), (3), or (4) shall be fined in accordance with title 18, United States Code, or imprisoned for not more than 1 year, or both; or" />
                      <outline text="&apos;(II) knowingly violates or attempts to violate paragraphs (1), (2), (3), or (4) shall be fined in accordance with title 18, United States Code, or imprisoned for not more than 5 years, or both." />
                      <outline text="&apos;(ii) MISUSE OF INFORMATION- A person who knowingly discloses, uses, or causes to be used any information obtained by an international marriage broker as a result of a requirement under paragraph (2) or (3) for any purpose other than the disclosures required under paragraph (3) shall be fined in accordance with title 18, United States Code, or imprisoned for not more than 1 year, or both." />
                      <outline text="&apos;(iii) FRAUDULENT FAILURES OF UNITED STATES CLIENTS TO MAKE REQUIRED SELF-DISCLOSURES- A person who knowingly and with intent to defraud another person outside the United States in order to recruit, solicit, entice, or induce that other person into entering a dating or matrimonial relationship, makes false or fraudulent representations regarding the disclosures described in clause (i), (ii), (iii), or (iv) of subsection (d)(2)(B), including by failing to make any such disclosures, shall be fined in accordance with title 18, United States Code, imprisoned for not more than 1 year, or both." />
                      <outline text="&apos;(iv) RELATIONSHIP TO OTHER PENALTIES- The penalties provided in clauses (i), (ii), and (iii) are in addition to any other civil or criminal liability under Federal or State law to which a person may be subject for the misuse of information, including misuse to threaten, intimidate, or harass any individual." />
                      <outline text="&apos;(v) CONSTRUCTION- Nothing in this paragraph or paragraph (3) or (4) may be construed to prevent the disclosure of information to law enforcement or pursuant to a court order.&apos;; and" />
                      <outline text="(C) in subparagraph (C), by striking the period at the end and inserting &apos;including equitable remedies.&apos;;" />
                      <outline text="(5) by redesignating paragraphs (6) and (7) as paragraphs (7) and (8), respectively; and" />
                      <outline text="(6) by inserting after paragraph (5) the following:" />
                      <outline text="&apos;(6) ENFORCEMENT-" />
                      <outline text="&apos;(A) AUTHORITY- The Attorney General shall be responsible for the enforcement of the provisions of this section, including the prosecution of civil and criminal penalties provided for by this section." />
                      <outline text="&apos;(B) CONSULTATION- The Attorney General shall consult with the Director of the Office on Violence Against Women of the Department of Justice to develop policies and public education designed to promote enforcement of this section.&apos;." />
                      <outline text="(d) GAO Study and Report- Section 833(f) of the International Marriage Broker Regulation Act of 2005 (8 U.S.C. 1375a(f)) is amended--" />
                      <outline text="(1) in the subsection heading, by striking &apos;Study and Report- &apos; and inserting &apos;Studies and Reports- &apos;; and" />
                      <outline text="(2) by adding at the end the following:" />
                      <outline text="&apos;(4) CONTINUING IMPACT STUDY AND REPORT-" />
                      <outline text="&apos;(A) STUDY- The Comptroller General shall conduct a study on the continuing impact of the implementation of this section and of section of 214 of the Immigration and Nationality Act (8 U.S.C. 1184) on the process for granting K nonimmigrant visas, including specifically a study of the items described in subparagraphs (A) through (E) of paragraph (1)." />
                      <outline text="&apos;(B) REPORT- Not later than 2 years after the date of the enactment of the Violence Against Women Reauthorization Act of 2013, the Comptroller General shall submit to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives a report setting forth the results of the study conducted under subparagraph (A)." />
                      <outline text="&apos;(C) DATA COLLECTION- The Attorney General, the Secretary of Homeland Security, and the Secretary of State shall collect and maintain the data necessary for the Comptroller General to conduct the study required by paragraph (1)(A).&apos;." />
                      <outline text="SEC. 809. ELIGIBILITY OF CRIME AND TRAFFICKING VICTIMS IN THE COMMONWEALTH OF THE NORTHERN MARIANA ISLANDS TO ADJUST STATUS." />
                      <outline text="Section 705(c) of the Consolidated Natural Resources Act of 2008 (Public Law 110-229; 48 U.S.C. 1806 note), is amended by striking &apos;except that,&apos; and all that follows through the end, and inserting the following: &apos;except that--" />
                      <outline text="&apos;(1) for the purpose of determining whether an alien lawfully admitted for permanent residence (as defined in section 101(a)(20) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(20)) has abandoned or lost such status by reason of absence from the United States, such alien&apos;s presence in the Commonwealth, before, on or after November 28, 2009, shall be considered to be presence in the United States; and" />
                      <outline text="&apos;(2) for the purpose of determining whether an alien whose application for status under subparagraph (T) or (U) of section 101(a)(15) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(15)) was granted is subsequently eligible for adjustment under subsection (l) or (m) of section 245 of such Act (8 U.S.C. 1255), such alien&apos;s physical presence in the Commonwealth before, on, or after November 28, 2009, and subsequent to the grant of the application, shall be considered as equivalent to presence in the United States pursuant to a nonimmigrant admission in such status.&apos;." />
                      <outline text="SEC. 810. DISCLOSURE OF INFORMATION FOR NATIONAL SECURITY PURPOSES." />
                      <outline text="(a) Information Sharing- Section 384(b) of the Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (8 U.S.C. 1367(b)) is amended--" />
                      <outline text="(1) in paragraph (1)--" />
                      <outline text="(A) by inserting &apos;Secretary of Homeland Security or the&apos; before &apos;Attorney General may&apos;; and" />
                      <outline text="(B) by inserting &apos;Secretary&apos;s or the&apos; before &apos;Attorney General&apos;s discretion&apos;;" />
                      <outline text="(2) in paragraph (2)--" />
                      <outline text="(A) by inserting &apos;Secretary of Homeland Security or the&apos; before &apos;Attorney General may&apos;;" />
                      <outline text="(B) by inserting &apos;Secretary or the&apos; before &apos;Attorney General for&apos;; and" />
                      <outline text="(C) by inserting &apos;in a manner that protects the confidentiality of such information&apos; after &apos;law enforcement purpose&apos;;" />
                      <outline text="(3) in paragraph (5), by striking &apos;Attorney General is&apos; and inserting &apos;Secretary of Homeland Security and the Attorney General are&apos;; and" />
                      <outline text="(4) by adding at the end a new paragraph as follows:" />
                      <outline text="&apos;(8) Notwithstanding subsection (a)(2), the Secretary of Homeland Security, the Secretary of State, or the Attorney General may provide in the discretion of either such Secretary or the Attorney General for the disclosure of information to national security officials to be used solely for a national security purpose in a manner that protects the confidentiality of such information.&apos;." />
                      <outline text="(b) Guidelines- Section 384(d) of the Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (8 U.S.C. 1367(d)) is amended--" />
                      <outline text="(1) by inserting &apos;, Secretary of State,&apos; after &apos;The Attorney General&apos;;" />
                      <outline text="(2) by inserting &apos;, Department of State,&apos; after &apos;Department of Justice&apos;; and" />
                      <outline text="(3) by inserting &apos;and severe forms of trafficking in persons or criminal activity listed in section 101(a)(15)(U) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(15)(u))&apos; after &apos;domestic violence&apos;." />
                      <outline text="(c) Implementation- Not later than 180 days after the date of the enactment of this Act, the Attorney General, the Secretary of State, and Secretary of Homeland Security shall provide the guidance required by section 384(d) of the Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (8 U.S.C. 1367(d)), consistent with the amendments made by subsections (a) and (b)." />
                      <outline text="(d) Clerical Amendment- Section 384(a)(1) of the Illegal Immigration Reform and Immigrant Responsibility Act of 1986 is amended by striking &apos;241(a)(2)&apos; in the matter following subparagraph (F) and inserting &apos;237(a)(2)&apos;." />
                      <outline text="TITLE IX--SAFETY FOR INDIAN WOMEN" />
                      <outline text="SEC. 901. GRANTS TO INDIAN TRIBAL GOVERNMENTS." />
                      <outline text="Section 2015(a) of title I of the Omnibus Crime Control and Safe Streets Act of 1968 (42 U.S.C. 3796gg-10(a)) is amended--" />
                      <outline text="(1) in paragraph (2), by inserting &apos;sex trafficking,&apos; after &apos;sexual assault,&apos;;" />
                      <outline text="(2) in paragraph (4), by inserting &apos;sex trafficking,&apos; after &apos;sexual assault,&apos;;" />
                      <outline text="(3) in paragraph (5), by striking &apos;and stalking&apos; and all that follows and inserting &apos;sexual assault, sex trafficking, and stalking;&apos;;" />
                      <outline text="(4) in paragraph (7)--" />
                      <outline text="(A) by inserting &apos;sex trafficking,&apos; after &apos;sexual assault,&apos; each place it appears; and" />
                      <outline text="(B) by striking &apos;and&apos; at the end;" />
                      <outline text="(5) in paragraph (8)--" />
                      <outline text="(A) by inserting &apos;sex trafficking,&apos; after &apos;stalking,&apos;; and" />
                      <outline text="(B) by striking the period at the end and inserting a semicolon; and" />
                      <outline text="(6) by adding at the end the following:" />
                      <outline text="&apos;(9) provide services to address the needs of youth who are victims of domestic violence, dating violence, sexual assault, sex trafficking, or stalking and the needs of youth and children exposed to domestic violence, dating violence, sexual assault, or stalking, including support for the nonabusing parent or the caretaker of the youth or child; and" />
                      <outline text="&apos;(10) develop and promote legislation and policies that enhance best practices for responding to violent crimes against Indian women, including the crimes of domestic violence, dating violence, sexual assault, sex trafficking, and stalking.&apos;." />
                      <outline text="SEC. 902. GRANTS TO INDIAN TRIBAL COALITIONS." />
                      <outline text="Section 2001 of title I of the Omnibus Crime Control and Safe Streets Act of 1968 (42 U.S.C. 3796gg) is amended by striking subsection (d) and inserting the following:" />
                      <outline text="&apos;(d) Tribal Coalition Grants-" />
                      <outline text="&apos;(1) PURPOSE- The Attorney General shall award a grant to tribal coalitions for purposes of--" />
                      <outline text="&apos;(A) increasing awareness of domestic violence and sexual assault against Indian women;" />
                      <outline text="&apos;(B) enhancing the response to violence against Indian women at the Federal, State, and tribal levels;" />
                      <outline text="&apos;(C) identifying and providing technical assistance to coalition membership and tribal communities to enhance access to essential services to Indian women victimized by domestic and sexual violence, including sex trafficking; and" />
                      <outline text="&apos;(D) assisting Indian tribes in developing and promoting State, local, and tribal legislation and policies that enhance best practices for responding to violent crimes against Indian women, including the crimes of domestic violence, dating violence, sexual assault, sex trafficking, and stalking." />
                      <outline text="&apos;(2) GRANTS- The Attorney General shall award grants on an annual basis under paragraph (1) to--" />
                      <outline text="&apos;(A) each tribal coalition that--" />
                      <outline text="&apos;(i) meets the criteria of a tribal coalition under section 40002(a) of the Violence Against Women Act of 1994 (42 U.S.C. 13925(a));" />
                      <outline text="&apos;(ii) is recognized by the Office on Violence Against Women; and" />
                      <outline text="&apos;(iii) provides services to Indian tribes; and" />
                      <outline text="&apos;(B) organizations that propose to incorporate and operate a tribal coalition in areas where Indian tribes are located but no tribal coalition exists." />
                      <outline text="&apos;(3) USE OF AMOUNTS- For each of fiscal years 2014 through 2018, of the amounts appropriated to carry out this subsection--" />
                      <outline text="&apos;(A) not more than 10 percent shall be made available to organizations described in paragraph (2)(B), provided that 1 or more organizations determined by the Attorney General to be qualified apply;" />
                      <outline text="&apos;(B) not less than 90 percent shall be made available to tribal coalitions described in paragraph (2)(A), which amounts shall be distributed equally among each eligible tribal coalition for the applicable fiscal year." />
                      <outline text="&apos;(4) ELIGIBILITY FOR OTHER GRANTS- Receipt of an award under this subsection by a tribal coalition shall not preclude the tribal coalition from receiving additional grants under this title to carry out the purposes described in paragraph (1)." />
                      <outline text="&apos;(5) MULTIPLE PURPOSE APPLICATIONS- Nothing in this subsection prohibits any tribal coalition or organization described in paragraph (2) from applying for funding to address sexual assault or domestic violence needs in the same application.&apos;." />
                      <outline text="Section 903 of the Violence Against Women and Department of Justice Reauthorization Act of 2005 (42 U.S.C. 14045d) is amended--" />
                      <outline text="(1) in subsection (a)--" />
                      <outline text="(A) by striking &apos;and the Violence Against Women Act of 2000&apos; and inserting &apos;, the Violence Against Women Act of 2000&apos;; and" />
                      <outline text="(B) by inserting &apos;, and the Violence Against Women Reauthorization Act of 2013&apos; before the period at the end;" />
                      <outline text="(2) in subsection (b)--" />
                      <outline text="(A) in the matter preceding paragraph (1), by striking &apos;Secretary of the Department of Health and Human Services&apos; and inserting &apos;Secretary of Health and Human Services, the Secretary of the Interior,&apos;; and" />
                      <outline text="(B) in paragraph (2), by striking &apos;and stalking&apos; and inserting &apos;stalking, and sex trafficking&apos;; and" />
                      <outline text="(3) by adding at the end the following:" />
                      <outline text="&apos;(c) Annual Report- The Attorney General shall submit to Congress an annual report on the annual consultations required under subsection (a) that--" />
                      <outline text="&apos;(1) contains the recommendations made under subsection (b) by Indian tribes during the year covered by the report;" />
                      <outline text="&apos;(2) describes actions taken during the year covered by the report to respond to recommendations made under subsection (b) during the year or a previous year; and" />
                      <outline text="&apos;(3) describes how the Attorney General will work in coordination and collaboration with Indian tribes, the Secretary of Health and Human Services, and the Secretary of the Interior to address the recommendations made under subsection (b)." />
                      <outline text="&apos;(d) Notice- Not later than 120 days before the date of a consultation under subsection (a), the Attorney General shall notify tribal leaders of the date, time, and location of the consultation.&apos;." />
                      <outline text="SEC. 904. TRIBAL JURISDICTION OVER CRIMES OF DOMESTIC VIOLENCE." />
                      <outline text="Title II of Public Law 90-284 (25 U.S.C. 1301 et seq.) (commonly known as the &apos;Indian Civil Rights Act of 1968&apos;) is amended by adding at the end the following:" />
                      <outline text="&apos;SEC. 204. TRIBAL JURISDICTION OVER CRIMES OF DOMESTIC VIOLENCE." />
                      <outline text="&apos;(a) Definitions- In this section:" />
                      <outline text="&apos;(1) DATING VIOLENCE- The term &apos;dating violence&apos; means violence committed by a person who is or has been in a social relationship of a romantic or intimate nature with the victim, as determined by the length of the relationship, the type of relationship, and the frequency of interaction between the persons involved in the relationship." />
                      <outline text="&apos;(2) DOMESTIC VIOLENCE- The term &apos;domestic violence&apos; means violence committed by a current or former spouse or intimate partner of the victim, by a person with whom the victim shares a child in common, by a person who is cohabitating with or has cohabitated with the victim as a spouse or intimate partner, or by a person similarly situated to a spouse of the victim under the domestic- or family- violence laws of an Indian tribe that has jurisdiction over the Indian country where the violence occurs." />
                      <outline text="&apos;(3) INDIAN COUNTRY- The term &apos;Indian country&apos; has the meaning given the term in section 1151 of title 18, United States Code." />
                      <outline text="&apos;(4) PARTICIPATING TRIBE- The term &apos;participating tribe&apos; means an Indian tribe that elects to exercise special domestic violence criminal jurisdiction over the Indian country of that Indian tribe." />
                      <outline text="&apos;(5) PROTECTION ORDER- The term &apos;protection order&apos;--" />
                      <outline text="&apos;(A) means any injunction, restraining order, or other order issued by a civil or criminal court for the purpose of preventing violent or threatening acts or harassment against, sexual violence against, contact or communication with, or physical proximity to, another person; and" />
                      <outline text="&apos;(B) includes any temporary or final order issued by a civil or criminal court, whether obtained by filing an independent action or as a pendent lite order in another proceeding, if the civil or criminal order was issued in response to a complaint, petition, or motion filed by or on behalf of a person seeking protection." />
                      <outline text="&apos;(6) SPECIAL DOMESTIC VIOLENCE CRIMINAL JURISDICTION- The term &apos;special domestic violence criminal jurisdiction&apos; means the criminal jurisdiction that a participating tribe may exercise under this section but could not otherwise exercise." />
                      <outline text="&apos;(7) SPOUSE OR INTIMATE PARTNER- The term &apos;spouse or intimate partner&apos; has the meaning given the term in section 2266 of title 18, United States Code." />
                      <outline text="&apos;(b) Nature of the Criminal Jurisdiction-" />
                      <outline text="&apos;(1) IN GENERAL- Notwithstanding any other provision of law, in addition to all powers of self-government recognized and affirmed by sections 201 and 203, the powers of self-government of a participating tribe include the inherent power of that tribe, which is hereby recognized and affirmed, to exercise special domestic violence criminal jurisdiction over all persons." />
                      <outline text="&apos;(2) CONCURRENT JURISDICTION- The exercise of special domestic violence criminal jurisdiction by a participating tribe shall be concurrent with the jurisdiction of the United States, of a State, or of both." />
                      <outline text="&apos;(3) APPLICABILITY- Nothing in this section--" />
                      <outline text="&apos;(A) creates or eliminates any Federal or State criminal jurisdiction over Indian country; or" />
                      <outline text="&apos;(B) affects the authority of the United States or any State government that has been delegated authority by the United States to investigate and prosecute a criminal violation in Indian country." />
                      <outline text="&apos;(4) EXCEPTIONS-" />
                      <outline text="&apos;(A) VICTIM AND DEFENDANT ARE BOTH NON-INDIANS-" />
                      <outline text="&apos;(i) IN GENERAL- A participating tribe may not exercise special domestic violence criminal jurisdiction over an alleged offense if neither the defendant nor the alleged victim is an Indian." />
                      <outline text="&apos;(ii) DEFINITION OF VICTIM- In this subparagraph and with respect to a criminal proceeding in which a participating tribe exercises special domestic violence criminal jurisdiction based on a violation of a protection order, the term &apos;victim&apos; means a person specifically protected by a protection order that the defendant allegedly violated." />
                      <outline text="&apos;(B) DEFENDANT LACKS TIES TO THE INDIAN TRIBE- A participating tribe may exercise special domestic violence criminal jurisdiction over a defendant only if the defendant--" />
                      <outline text="&apos;(i) resides in the Indian country of the participating tribe;" />
                      <outline text="&apos;(ii) is employed in the Indian country of the participating tribe; or" />
                      <outline text="&apos;(iii) is a spouse, intimate partner, or dating partner of--" />
                      <outline text="&apos;(I) a member of the participating tribe; or" />
                      <outline text="&apos;(II) an Indian who resides in the Indian country of the participating tribe." />
                      <outline text="&apos;(c) Criminal Conduct- A participating tribe may exercise special domestic violence criminal jurisdiction over a defendant for criminal conduct that falls into one or more of the following categories:" />
                      <outline text="&apos;(1) DOMESTIC VIOLENCE AND DATING VIOLENCE- An act of domestic violence or dating violence that occurs in the Indian country of the participating tribe." />
                      <outline text="&apos;(2) VIOLATIONS OF PROTECTION ORDERS- An act that--" />
                      <outline text="&apos;(A) occurs in the Indian country of the participating tribe; and" />
                      <outline text="&apos;(B) violates the portion of a protection order that--" />
                      <outline text="&apos;(i) prohibits or provides protection against violent or threatening acts or harassment against, sexual violence against, contact or communication with, or physical proximity to, another person;" />
                      <outline text="&apos;(ii) was issued against the defendant;" />
                      <outline text="&apos;(iii) is enforceable by the participating tribe; and" />
                      <outline text="&apos;(iv) is consistent with section 2265(b) of title 18, United States Code." />
                      <outline text="&apos;(d) Rights of Defendants- In a criminal proceeding in which a participating tribe exercises special domestic violence criminal jurisdiction, the participating tribe shall provide to the defendant--" />
                      <outline text="&apos;(1) all applicable rights under this Act;" />
                      <outline text="&apos;(2) if a term of imprisonment of any length may be imposed, all rights described in section 202(c);" />
                      <outline text="&apos;(3) the right to a trial by an impartial jury that is drawn from sources that--" />
                      <outline text="&apos;(A) reflect a fair cross section of the community; and" />
                      <outline text="&apos;(B) do not systematically exclude any distinctive group in the community, including non-Indians; and" />
                      <outline text="&apos;(4) all other rights whose protection is necessary under the Constitution of the United States in order for Congress to recognize and affirm the inherent power of the participating tribe to exercise special domestic violence criminal jurisdiction over the defendant." />
                      <outline text="&apos;(e) Petitions To Stay Detention-" />
                      <outline text="&apos;(1) IN GENERAL- A person who has filed a petition for a writ of habeas corpus in a court of the United States under section 203 may petition that court to stay further detention of that person by the participating tribe." />
                      <outline text="&apos;(2) GRANT OF STAY- A court shall grant a stay described in paragraph (1) if the court--" />
                      <outline text="&apos;(A) finds that there is a substantial likelihood that the habeas corpus petition will be granted; and" />
                      <outline text="&apos;(B) after giving each alleged victim in the matter an opportunity to be heard, finds by clear and convincing evidence that under conditions imposed by the court, the petitioner is not likely to flee or pose a danger to any person or the community if released." />
                      <outline text="&apos;(3) NOTICE- An Indian tribe that has ordered the detention of any person has a duty to timely notify such person of his rights and privileges under this subsection and under section 203." />
                      <outline text="&apos;(f) Grants to Tribal Governments- The Attorney General may award grants to the governments of Indian tribes (or to authorized designees of those governments)--" />
                      <outline text="&apos;(1) to strengthen tribal criminal justice systems to assist Indian tribes in exercising special domestic violence criminal jurisdiction, including--" />
                      <outline text="&apos;(A) law enforcement (including the capacity of law enforcement or court personnel to enter information into and obtain information from national crime information databases);" />
                      <outline text="&apos;(B) prosecution;" />
                      <outline text="&apos;(C) trial and appellate courts;" />
                      <outline text="&apos;(D) probation systems;" />
                      <outline text="&apos;(E) detention and correctional facilities;" />
                      <outline text="&apos;(F) alternative rehabilitation centers;" />
                      <outline text="&apos;(G) culturally appropriate services and assistance for victims and their families; and" />
                      <outline text="&apos;(H) criminal codes and rules of criminal procedure, appellate procedure, and evidence;" />
                      <outline text="&apos;(2) to provide indigent criminal defendants with the effective assistance of licensed defense counsel, at no cost to the defendant, in criminal proceedings in which a participating tribe prosecutes a crime of domestic violence or dating violence or a criminal violation of a protection order;" />
                      <outline text="&apos;(3) to ensure that, in criminal proceedings in which a participating tribe exercises special domestic violence criminal jurisdiction, jurors are summoned, selected, and instructed in a manner consistent with all applicable requirements; and" />
                      <outline text="&apos;(4) to accord victims of domestic violence, dating violence, and violations of protection orders rights that are similar to the rights of a crime victim described in section 3771(a) of title 18, United States Code, consistent with tribal law and custom." />
                      <outline text="&apos;(g) Supplement, Not Supplant- Amounts made available under this section shall supplement and not supplant any other Federal, State, tribal, or local government amounts made available to carry out activities described in this section." />
                      <outline text="&apos;(h) Authorization of Appropriations- There are authorized to be appropriated $5,000,000 for each of fiscal years 2014 through 2018 to carry out subsection (f) and to provide training, technical assistance, data collection, and evaluation of the criminal justice systems of participating tribes.&apos;." />
                      <outline text="SEC. 905. TRIBAL PROTECTION ORDERS." />
                      <outline text="Section 2265 of title 18, United States Code, is amended by striking subsection (e) and inserting the following:" />
                      <outline text="&apos;(e) Tribal Court Jurisdiction- For purposes of this section, a court of an Indian tribe shall have full civil jurisdiction to issue and enforce protection orders involving any person, including the authority to enforce any orders through civil contempt proceedings, to exclude violators from Indian land, and to use other appropriate mechanisms, in matters arising anywhere in the Indian country of the Indian tribe (as defined in section 1151) or otherwise within the authority of the Indian tribe.&apos;." />
                      <outline text="SEC. 906. AMENDMENTS TO THE FEDERAL ASSAULT STATUTE." />
                      <outline text="(a) In General- Section 113 of title 18, United States Code, is amended--" />
                      <outline text="(1) in subsection (a)--" />
                      <outline text="(A) by striking paragraph (1) and inserting the following:" />
                      <outline text="&apos;(1) Assault with intent to commit murder or a violation of section 2241 or 2242, by a fine under this title, imprisonment for not more than 20 years, or both.&apos;;" />
                      <outline text="(B) in paragraph (2), by striking &apos;felony under chapter 109A&apos; and inserting &apos;violation of section 2241 or 2242&apos;;" />
                      <outline text="(C) in paragraph (3) by striking &apos;and without just cause or excuse,&apos;;" />
                      <outline text="(D) in paragraph (4), by striking &apos;six months&apos; and inserting &apos;1 year&apos;;" />
                      <outline text="(E) in paragraph (7)--" />
                      <outline text="(i) by striking &apos;substantial bodily injury to an individual who has not attained the age of 16 years&apos; and inserting &apos;substantial bodily injury to a spouse or intimate partner, a dating partner, or an individual who has not attained the age of 16 years&apos;; and" />
                      <outline text="(ii) by striking &apos;fine&apos; and inserting &apos;a fine&apos;; and" />
                      <outline text="(F) by adding at the end the following:" />
                      <outline text="&apos;(8) Assault of a spouse, intimate partner, or dating partner by strangling, suffocating, or attempting to strangle or suffocate, by a fine under this title, imprisonment for not more than 10 years, or both.&apos;; and" />
                      <outline text="(2) in subsection (b)--" />
                      <outline text="(A) by striking &apos;(b) As used in this subsection--&apos; and inserting the following:" />
                      <outline text="&apos;(b) Definitions- In this section--&apos;;" />
                      <outline text="(B) in paragraph (1)(B), by striking &apos;and&apos; at the end;" />
                      <outline text="(C) in paragraph (2), by striking the period at the end and inserting a semicolon; and" />
                      <outline text="(D) by adding at the end the following:" />
                      <outline text="&apos;(3) the terms &apos;dating partner&apos; and &apos;spouse or intimate partner&apos; have the meanings given those terms in section 2266;" />
                      <outline text="&apos;(4) the term &apos;strangling&apos; means intentionally, knowingly, or recklessly impeding the normal breathing or circulation of the blood of a person by applying pressure to the throat or neck, regardless of whether that conduct results in any visible injury or whether there is any intent to kill or protractedly injure the victim; and" />
                      <outline text="&apos;(5) the term &apos;suffocating&apos; means intentionally, knowingly, or recklessly impeding the normal breathing of a person by covering the mouth of the person, the nose of the person, or both, regardless of whether that conduct results in any visible injury or whether there is any intent to kill or protractedly injure the victim.&apos;." />
                      <outline text="(b) Indian Major Crimes- Section 1153(a) of title 18, United States Code, is amended by striking &apos;assault with intent to commit murder, assault with a dangerous weapon, assault resulting in serious bodily injury (as defined in section 1365 of this title)&apos; and inserting &apos;a felony assault under section 113&apos;." />
                      <outline text="(c) Repeat Offenders- Section 2265A(b)(1)(B) of title 18, United States Code, is amended by inserting &apos;or tribal&apos; after &apos;State&apos;." />
                      <outline text="SEC. 907. ANALYSIS AND RESEARCH ON VIOLENCE AGAINST INDIAN WOMEN." />
                      <outline text="(a) In General- Section 904(a) of the Violence Against Women and Department of Justice Reauthorization Act of 2005 (42 U.S.C. 3796gg-10 note) is amended--" />
                      <outline text="(1) in paragraph (1)--" />
                      <outline text="(A) by striking &apos;The National&apos; and inserting &apos;Not later than 2 years after the date of enactment of the Violence Against Women Reauthorization Act of 2013, the National&apos;; and" />
                      <outline text="(B) by inserting &apos;and in Native villages (as defined in section 3 of the Alaska Native Claims Settlement Act (43 U.S.C. 1602))&apos; before the period at the end;" />
                      <outline text="(2) in paragraph (2)(A)--" />
                      <outline text="(A) in clause (iv), by striking &apos;and&apos; at the end;" />
                      <outline text="(B) in clause (v), by striking the period at the end and inserting &apos;; and&apos;; and" />
                      <outline text="(C) by adding at the end the following:" />
                      <outline text="&apos;(vi) sex trafficking.&apos;;" />
                      <outline text="(3) in paragraph (4), by striking &apos;this Act&apos; and inserting &apos;the Violence Against Women Reauthorization Act of 2013&apos;; and" />
                      <outline text="(4) in paragraph (5), by striking &apos;this section $1,000,000 for each of fiscal years 2007 and 2008&apos; and inserting &apos;this subsection $1,000,000 for each of fiscal years 2014 and 2015&apos;." />
                      <outline text="(b) Authorization of Appropriations- Section 905(b)(2) of the Violence Against Women and Department of Justice Reauthorization Act of 2005 (28 U.S.C. 534 note) is amended by striking &apos;fiscal years 2007 through 2011&apos; and inserting &apos;fiscal years 2014 through 2018&apos;." />
                      <outline text="SEC. 908. EFFECTIVE DATES; PILOT PROJECT." />
                      <outline text="(a) General Effective Date- Except as provided in section 4 and subsection (b) of this section, the amendments made by this title shall take effect on the date of enactment of this Act." />
                      <outline text="(b) Effective Date for Special Domestic-violence Criminal Jurisdiction-" />
                      <outline text="(1) IN GENERAL- Except as provided in paragraph (2), subsections (b) through (d) of section 204 of Public Law 90-284 (as added by section 904) shall take effect on the date that is 2 years after the date of enactment of this Act." />
                      <outline text="(2) PILOT PROJECT-" />
                      <outline text="(A) IN GENERAL- At any time during the 2-year period beginning on the date of enactment of this Act, an Indian tribe may ask the Attorney General to designate the tribe as a participating tribe under section 204(a) of Public Law 90-284 on an accelerated basis." />
                      <outline text="(B) PROCEDURE- The Attorney General may grant a request under subparagraph (A) after coordinating with the Secretary of the Interior, consulting with affected Indian tribes, and concluding that the criminal justice system of the requesting tribe has adequate safeguards in place to protect defendants&apos; rights, consistent with section 204 of Public Law 90-284." />
                      <outline text="(C) EFFECTIVE DATES FOR PILOT PROJECTS- An Indian tribe designated as a participating tribe under this paragraph may commence exercising special domestic violence criminal jurisdiction pursuant to subsections (b) through (d) of section 204 of Public Law 90-284 on a date established by the Attorney General, after consultation with that Indian tribe, but in no event later than the date that is 2 years after the date of enactment of this Act." />
                      <outline text="SEC. 909. INDIAN LAW AND ORDER COMMISSION; REPORT ON THE ALASKA RURAL JUSTICE AND LAW ENFORCEMENT COMMISSION." />
                      <outline text="(a) In General- Section 15(f) of the Indian Law Enforcement Reform Act (25 U.S.C. 2812(f)) is amended by striking &apos;2 years&apos; and inserting &apos;3 years&apos;." />
                      <outline text="(b) Report- The Attorney General, in consultation with the Attorney General of the State of Alaska, the Commissioner of Public Safety of the State of Alaska, the Alaska Federation of Natives and Federally recognized Indian tribes in the State of Alaska, shall report to Congress not later than one year after enactment of this Act with respect to whether the Alaska Rural Justice and Law Enforcement Commission established under Section 112(a)(1) of the Consolidated Appropriations Act, 2004 should be continued and appropriations authorized for the continued work of the commission. The report may contain recommendations for legislation with respect to the scope of work and composition of the commission." />
                      <outline text="SEC. 910. SPECIAL RULE FOR THE STATE OF ALASKA." />
                      <outline text="(a) Expanded Jurisdiction- In the State of Alaska, the amendments made by sections 904 and 905 shall only apply to the Indian country (as defined in section 1151 of title 18, United States Code) of the Metlakatla Indian Community, Annette Island Reserve." />
                      <outline text="(b) Retained Jurisdiction- The jurisdiction and authority of each Indian tribe in the State of Alaska under section 2265(e) of title 18, United States Code (as in effect on the day before the date of enactment of this Act)--" />
                      <outline text="(1) shall remain in full force and effect; and" />
                      <outline text="(2) are not limited or diminished by this Act or any amendment made by this Act." />
                      <outline text="(c) Savings Provision- Nothing in this Act or an amendment made by this Act limits or diminishes the jurisdiction of the State of Alaska, any subdivision of the State of Alaska, or any Indian tribe in the State of Alaska." />
                      <outline text="TITLE X--SAFER ACT" />
                      <outline text="SEC. 1001. SHORT TITLE." />
                      <outline text="This title may be cited as the &apos;Sexual Assault Forensic Evidence Reporting Act of 2013&apos; or the &apos;SAFER Act of 2013&apos;." />
                      <outline text="SEC. 1002. DEBBIE SMITH GRANTS FOR AUDITING SEXUAL ASSAULT EVIDENCE BACKLOGS." />
                      <outline text="Section 2 of the DNA Analysis Backlog Elimination Act of 2000 (42 U.S.C. 14135) is amended--" />
                      <outline text="(1) in subsection (a), by adding at the end the following new paragraph:" />
                      <outline text="&apos;(7) To conduct an audit consistent with subsection (n) of the samples of sexual assault evidence that are in the possession of the State or unit of local government and are awaiting testing." />
                      <outline text="&apos;(8) To ensure that the collection and processing of DNA evidence by law enforcement agencies from crimes, including sexual assault and other violent crimes against persons, is carried out in an appropriate and timely manner and in accordance with the protocols and practices developed under subsection (o)(1).&apos;;" />
                      <outline text="(2) in subsection (c), by adding at the end the following new paragraph:" />
                      <outline text="&apos;(4) ALLOCATION OF GRANT AWARDS FOR AUDITS- For each of fiscal years 2014 through 2017, not less than 5 percent, but not more than 7 percent, of the grant amounts distributed under paragraph (1) shall, if sufficient applications to justify such amounts are received by the Attorney General, be awarded for purposes described in subsection (a)(7), provided that none of the funds required to be distributed under this paragraph shall decrease or otherwise limit the availability of funds required to be awarded to States or units of local government under paragraph (3).&apos;; and" />
                      <outline text="(3) by adding at the end the following new subsections:" />
                      <outline text="&apos;(n) Use of Funds for Auditing Sexual Assault Evidence Backlogs-" />
                      <outline text="&apos;(1) ELIGIBILITY- The Attorney General may award a grant under this section to a State or unit of local government for the purpose described in subsection (a)(7) only if the State or unit of local government--" />
                      <outline text="&apos;(A) submits a plan for performing the audit of samples described in such subsection; and" />
                      <outline text="&apos;(B) includes in such plan a good-faith estimate of the number of such samples." />
                      <outline text="&apos;(2) GRANT CONDITIONS- A State or unit of local government receiving a grant for the purpose described in subsection (a)(7)--" />
                      <outline text="&apos;(A) may not enter into any contract or agreement with any non-governmental vendor laboratory to conduct an audit described in subsection (a)(7); and" />
                      <outline text="&apos;(B) shall--" />
                      <outline text="&apos;(i) not later than 1 year after receiving the grant, complete the audit referred to in paragraph (1)(A) in accordance with the plan submitted under such paragraph;" />
                      <outline text="&apos;(ii) not later than 60 days after receiving possession of a sample of sexual assault evidence that was not in the possession of the State or unit of local government at the time of the initiation of an audit under paragraph (1)(A), subject to paragraph (4)(F), include in any required reports under clause (v), the information listed under paragraph (4)(B);" />
                      <outline text="&apos;(iii) for each sample of sexual assault evidence that is identified as awaiting testing as part of the audit referred to in paragraph (1)(A)--" />
                      <outline text="&apos;(I) assign a unique numeric or alphanumeric identifier to each sample of sexual assault evidence that is in the possession of the State or unit of local government and is awaiting testing; and" />
                      <outline text="&apos;(II) identify the date or dates after which the State or unit of local government would be barred by any applicable statutes of limitations from prosecuting a perpetrator of the sexual assault to which the sample relates;" />
                      <outline text="&apos;(iv) provide that--" />
                      <outline text="&apos;(I) the chief law enforcement officer of the State or unit of local government, respectively, is the individual responsible for the compliance of the State or unit of local government, respectively, with the reporting requirements described in clause (v); or" />
                      <outline text="&apos;(II) the designee of such officer may fulfill the responsibility described in subclause (I) so long as such designee is an employee of the State or unit of local government, respectively, and is not an employee of any governmental laboratory or non-governmental vendor laboratory; and" />
                      <outline text="&apos;(v) comply with all grantee reporting requirements described in paragraph (4)." />
                      <outline text="&apos;(3) EXTENSION OF INITIAL DEADLINE- The Attorney General may grant an extension of the deadline under paragraph (2)(B)(i) to a State or unit of local government that demonstrates that more time is required for compliance with such paragraph." />
                      <outline text="&apos;(4) SEXUAL ASSAULT FORENSIC EVIDENCE REPORTS-" />
                      <outline text="&apos;(A) IN GENERAL- For not less than 12 months after the completion of an initial count of sexual assault evidence that is awaiting testing during an audit referred to in paragraph (1)(A), a State or unit of local government that receives a grant award under subsection (a)(7) shall, not less than every 60 days, submit a report to the Department of Justice, on a form prescribed by the Attorney General, which shall contain the information required under subparagraph (B)." />
                      <outline text="&apos;(B) CONTENTS OF REPORTS- A report under this paragraph shall contain the following information:" />
                      <outline text="&apos;(i) The name of the State or unit of local government filing the report." />
                      <outline text="&apos;(ii) The period of dates covered by the report." />
                      <outline text="&apos;(iii) The cumulative total number of samples of sexual assault evidence that, at the end of the reporting period--" />
                      <outline text="&apos;(I) are in the possession of the State or unit of local government at the reporting period;" />
                      <outline text="&apos;(II) are awaiting testing; and" />
                      <outline text="&apos;(III) the State or unit of local government has determined should undergo DNA or other appropriate forensic analyses." />
                      <outline text="&apos;(iv) The cumulative total number of samples of sexual assault evidence in the possession of the State or unit of local government that, at the end of the reporting period, the State or unit of local government has determined should not undergo DNA or other appropriate forensic analyses, provided that the reporting form shall allow for the State or unit of local government, at its sole discretion, to explain the reasoning for this determination in some or all cases." />
                      <outline text="&apos;(v) The cumulative total number of samples of sexual assault evidence in a total under clause (iii) that have been submitted to a laboratory for DNA or other appropriate forensic analyses." />
                      <outline text="&apos;(vi) The cumulative total number of samples of sexual assault evidence identified by an audit referred to in paragraph (1)(A) or under paragraph (2)(B)(ii) for which DNA or other appropriate forensic analysis has been completed at the end of the reporting period." />
                      <outline text="&apos;(vii) The total number of samples of sexual assault evidence identified by the State or unit of local government under paragraph (2)(B)(ii), since the previous reporting period." />
                      <outline text="&apos;(viii) The cumulative total number of samples of sexual assault evidence described under clause (iii) for which the State or unit of local government will be barred within 12 months by any applicable statute of limitations from prosecuting a perpetrator of the sexual assault to which the sample relates." />
                      <outline text="&apos;(C) PUBLICATION OF REPORTS- Not later than 7 days after the submission of a report under this paragraph by a State or unit of local government, the Attorney General shall, subject to subparagraph (D), publish and disseminate a facsimile of the full contents of such report on an appropriate internet website." />
                      <outline text="&apos;(D) PERSONALLY IDENTIFIABLE INFORMATION- The Attorney General shall ensure that any information published and disseminated as part of a report under this paragraph, which reports information under this subsection, does not include personally identifiable information or details about a sexual assault that might lead to the identification of the individuals involved." />
                      <outline text="&apos;(E) OPTIONAL REPORTING- The Attorney General shall--" />
                      <outline text="&apos;(i) at the discretion of a State or unit of local government required to file a report under subparagraph (A), allow such State or unit of local government, at their sole discretion, to submit such reports on a more frequent basis; and" />
                      <outline text="&apos;(ii) make available to all States and units of local government the reporting form created pursuant to subparagraph (A), whether or not they are required to submit such reports, and allow such States or units of local government, at their sole discretion, to submit such reports for publication." />
                      <outline text="&apos;(F) SAMPLES EXEMPT FROM REPORTING REQUIREMENT- The reporting requirements described in paragraph (2) shall not apply to a sample of sexual assault evidence that--" />
                      <outline text="&apos;(i) is not considered criminal evidence (such as a sample collected anonymously from a victim who is unwilling to make a criminal complaint); or" />
                      <outline text="&apos;(ii) relates to a sexual assault for which the prosecution of each perpetrator is barred by a statute of limitations." />
                      <outline text="&apos;(5) DEFINITIONS- In this subsection:" />
                      <outline text="&apos;(A) AWAITING TESTING- The term &apos;awaiting testing&apos; means, with respect to a sample of sexual assault evidence, that--" />
                      <outline text="&apos;(i) the sample has been collected and is in the possession of a State or unit of local government;" />
                      <outline text="&apos;(ii) DNA and other appropriate forensic analyses have not been performed on such sample; and" />
                      <outline text="&apos;(iii) the sample is related to a criminal case or investigation in which final disposition has not yet been reached." />
                      <outline text="&apos;(B) FINAL DISPOSITION- The term &apos;final disposition&apos; means, with respect to a criminal case or investigation to which a sample of sexual assault evidence relates--" />
                      <outline text="&apos;(i) the conviction or acquittal of all suspected perpetrators of the crime involved;" />
                      <outline text="&apos;(ii) a determination by the State or unit of local government in possession of the sample that the case is unfounded; or" />
                      <outline text="&apos;(iii) a declaration by the victim of the crime involved that the act constituting the basis of the crime was not committed." />
                      <outline text="&apos;(C) POSSESSION-" />
                      <outline text="&apos;(i) IN GENERAL- The term &apos;possession&apos;, used with respect to possession of a sample of sexual assault evidence by a State or unit of local government, includes possession by an individual who is acting as an agent of the State or unit of local government for the collection of the sample." />
                      <outline text="&apos;(ii) RULE OF CONSTRUCTION- Nothing in clause (i) shall be construed to create or amend any Federal rights or privileges for non-governmental vendor laboratories described in regulations promulgated under section 210303 of the DNA Identification Act of 1994 (42 U.S.C. 14131)." />
                      <outline text="&apos;(o) Establishment of Protocols, Technical Assistance, and Definitions-" />
                      <outline text="&apos;(1) PROTOCOLS AND PRACTICES- Not later than 18 months after the date of enactment of the SAFER Act of 2013, the Director, in consultation with Federal, State, and local law enforcement agencies and government laboratories, shall develop and publish a description of protocols and practices the Director considers appropriate for the accurate, timely, and effective collection and processing of DNA evidence, including protocols and practices specific to sexual assault cases, which shall address appropriate steps in the investigation of cases that might involve DNA evidence, including--" />
                      <outline text="&apos;(A) how to determine--" />
                      <outline text="&apos;(i) which evidence is to be collected by law enforcement personnel and forwarded for testing;" />
                      <outline text="&apos;(ii) the preferred order in which evidence from the same case is to be tested; and" />
                      <outline text="&apos;(iii) what information to take into account when establishing the order in which evidence from different cases is to be tested;" />
                      <outline text="&apos;(B) the establishment of a reasonable period of time in which evidence is to be forwarded by emergency response providers, law enforcement personnel, and prosecutors to a laboratory for testing;" />
                      <outline text="&apos;(C) the establishment of reasonable periods of time in which each stage of analytical laboratory testing is to be completed;" />
                      <outline text="&apos;(D) systems to encourage communication within a State or unit of local government among emergency response providers, law enforcement personnel, prosecutors, courts, defense counsel, crime laboratory personnel, and crime victims regarding the status of crime scene evidence to be tested; and" />
                      <outline text="&apos;(E) standards for conducting the audit of the backlog for DNA case work in sexual assault cases required under subsection (n)." />
                      <outline text="&apos;(2) TECHNICAL ASSISTANCE AND TRAINING- The Director shall make available technical assistance and training to support States and units of local government in adopting and implementing the protocols and practices developed under paragraph (1) on and after the date on which the protocols and practices are published." />
                      <outline text="&apos;(3) DEFINITIONS- In this subsection, the terms &apos;awaiting testing&apos; and &apos;possession&apos; have the meanings given those terms in subsection (n).&apos;." />
                      <outline text="SEC. 1003. REPORTS TO CONGRESS." />
                      <outline text="Not later than 90 days after the end of each fiscal year for which a grant is made for the purpose described in section 2(a)(7) of the DNA Analysis Backlog Elimination Act of 2000, as amended by section 1002, the Attorney General shall submit to Congress a report that--" />
                      <outline text="(1) lists the States and units of local government that have been awarded such grants and the amount of the grant received by each such State or unit of local government;" />
                      <outline text="(2) states the number of extensions granted by the Attorney General under section 2(n)(3) of the DNA Analysis Backlog Elimination Act of 2000, as added by section 1002; and" />
                      <outline text="(3) summarizes the processing status of the samples of sexual assault evidence identified in Sexual Assault Forensic Evidence Reports established under section 2(n)(4) of the DNA Analysis Backlog Elimination Act of 2000, including the number of samples that have not been tested." />
                      <outline text="SEC. 1004. REDUCING THE RAPE KIT BACKLOG." />
                      <outline text="Section 2(c)(3) of the DNA Analysis Backlog Elimination Act of 2000 (42 U.S.C. 14135(c)(3)) is amended--" />
                      <outline text="(a) in subparagraph (B), by striking &apos;2014&apos; and inserting &apos;2018&apos;; and" />
                      <outline text="(b) by adding at the end the following:" />
                      <outline text="&apos;(C) For each of fiscal years 2014 through 2018, not less than 75 percent of the total grant amounts shall be awarded for a combination of purposes under paragraphs (1), (2), and (3) of subsection (a).&apos;." />
                      <outline text="SEC. 1005. OVERSIGHT AND ACCOUNTABILITY." />
                      <outline text="All grants awarded by the Department of Justice that are authorized under this title shall be subject to the following:" />
                      <outline text="(1) AUDIT REQUIREMENT- Beginning in fiscal year 2013, and each fiscal year thereafter, the Inspector General of the Department of Justice shall conduct audits of recipients of grants under this title to prevent waste, fraud, and abuse of funds by grantees. The Inspector General shall determine the appropriate number of grantees to be audited each year." />
                      <outline text="(2) MANDATORY EXCLUSION- A recipient of grant funds under this title that is found to have an unresolved audit finding shall not be eligible to receive grant funds under this title during the 2 fiscal years beginning after the 12-month period described in paragraph (5)." />
                      <outline text="(3) PRIORITY- In awarding grants under this title, the Attorney General shall give priority to eligible entities that, during the 3 fiscal years before submitting an application for a grant under this title, did not have an unresolved audit finding showing a violation in the terms or conditions of a Department of Justice grant program." />
                      <outline text="(4) REIMBURSEMENT- If an entity is awarded grant funds under this Act during the 2-fiscal-year period in which the entity is barred from receiving grants under paragraph (2), the Attorney General shall--" />
                      <outline text="(A) deposit an amount equal to the grant funds that were improperly awarded to the grantee into the General Fund of the Treasury; and" />
                      <outline text="(B) seek to recoup the costs of the repayment to the fund from the grant recipient that was erroneously awarded grant funds." />
                      <outline text="(5) DEFINED TERM- In this section, the term &apos;unresolved audit finding&apos; means an audit report finding in the final audit report of the Inspector General of the Department of Justice that the grantee has utilized grant funds for an unauthorized expenditure or otherwise unallowable cost that is not closed or resolved within a 12-month period beginning on the date when the final audit report is issued." />
                      <outline text="(6) NONPROFIT ORGANIZATION REQUIREMENTS-" />
                      <outline text="(A) DEFINITION- For purposes of this section and the grant programs described in this title, the term &apos;nonprofit organization&apos; means an organization that is described in section 501(c)(3) of the Internal Revenue Code of 1986 and is exempt from taxation under section 501(a) of such Code." />
                      <outline text="(B) PROHIBITION- The Attorney General shall not award a grant under any grant program described in this title to a nonprofit organization that holds money in offshore accounts for the purpose of avoiding paying the tax described in section 511(a) of the Internal Revenue Code of 1986." />
                      <outline text="(C) DISCLOSURE- Each nonprofit organization that is awarded a grant under a grant program described in this title and uses the procedures prescribed in regulations to create a rebuttable presumption of reasonableness for the compensation of its officers, directors, trustees and key employees, shall disclose to the Attorney General, in the application for the grant, the process for determining such compensation, including the independent persons involved in reviewing and approving such compensation, the comparability data used, and contemporaneous substantiation of the deliberation and decision. Upon request, the Attorney General shall make the information disclosed under this subsection available for public inspection." />
                      <outline text="(7) ADMINISTRATIVE EXPENSES- Unless otherwise explicitly provided in authorizing legislation, not more than 7.5 percent of the amounts authorized to be appropriated under this title may be used by the Attorney General for salaries and administrative expenses of the Department of Justice." />
                      <outline text="(8) CONFERENCE EXPENDITURES-" />
                      <outline text="(A) LIMITATION- No amounts authorized to be appropriated to the Department of Justice under this title may be used by the Attorney General or by any individual or organization awarded discretionary funds through a cooperative agreement under this Act, to host or support any expenditure for conferences that uses more than $20,000 in Department funds, unless the Deputy Attorney General or the appropriate Assistant Attorney General, Director, or principal deputy as the Deputy Attorney General may designate, provides prior written authorization that the funds may be expended to host a conference." />
                      <outline text="(B) WRITTEN APPROVAL- Written approval under subparagraph (A) shall include a written estimate of all costs associated with the conference, including the cost of all food and beverages, audio/visual equipment, honoraria for speakers, and any entertainment." />
                      <outline text="(C) REPORT- The Deputy Attorney General shall submit an annual report to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives on all conference expenditures approved by operation of this paragraph." />
                      <outline text="(9) PROHIBITION ON LOBBYING ACTIVITY-" />
                      <outline text="(A) IN GENERAL- Amounts authorized to be appropriated under this title may not be utilized by any grant recipient to--" />
                      <outline text="(i) lobby any representative of the Department of Justice regarding the award of grant funding; or" />
                      <outline text="(ii) lobby any representative of a Federal, state, local, or tribal government regarding the award of grant funding." />
                      <outline text="(B) PENALTY- If the Attorney General determines that any recipient of a grant under this title has violated subparagraph (A), the Attorney General shall--" />
                      <outline text="(i) require the grant recipient to repay the grant in full; and" />
                      <outline text="(ii) prohibit the grant recipient from receiving another grant under this title for not less than 5 years." />
                      <outline text="SEC. 1006. SUNSET." />
                      <outline text="Effective on December 31, 2018, subsections (a)(6) and (n) of section 2 of the DNA Analysis Backlog Elimination Act of 2000 (42 U.S.C. 14135(a)(6) and (n)) are repealed." />
                      <outline text="TITLE XI--OTHER MATTERS" />
                      <outline text="SEC. 1101. SEXUAL ABUSE IN CUSTODIAL SETTINGS." />
                      <outline text="(a) Suits by Prisoners- Section 7(e) of the Civil Rights of Institutionalized Persons Act (42 U.S.C. 1997e(e)) is amended by inserting before the period at the end the following: &apos;or the commission of a sexual act (as defined in section 2246 of title 18, United States Code)&apos;." />
                      <outline text="(b) United States as Defendant- Section 1346(b)(2) of title 28, United States Code, is amended by inserting before the period at the end the following: &apos;or the commission of a sexual act (as defined in section 2246 of title 18)&apos;." />
                      <outline text="(c) Adoption and Effect of National Standards- Section 8 of the Prison Rape Elimination Act of 2003 (42 U.S.C. 15607) is amended--" />
                      <outline text="(1) by redesignating subsection (c) as subsection (e); and" />
                      <outline text="(2) by inserting after subsection (b) the following:" />
                      <outline text="&apos;(c) Applicability to Detention Facilities Operated by the Department of Homeland Security-" />
                      <outline text="&apos;(1) IN GENERAL- Not later than 180 days after the date of enactment of the Violence Against Women Reauthorization Act of 2013, the Secretary of Homeland Security shall publish a final rule adopting national standards for the detection, prevention, reduction, and punishment of rape and sexual assault in facilities that maintain custody of aliens detained for a violation of the immigrations laws of the United States." />
                      <outline text="&apos;(2) APPLICABILITY- The standards adopted under paragraph (1) shall apply to detention facilities operated by the Department of Homeland Security and to detention facilities operated under contract with the Department." />
                      <outline text="&apos;(3) COMPLIANCE- The Secretary of Homeland Security shall--" />
                      <outline text="&apos;(A) assess compliance with the standards adopted under paragraph (1) on a regular basis; and" />
                      <outline text="&apos;(B) include the results of the assessments in performance evaluations of facilities completed by the Department of Homeland Security." />
                      <outline text="&apos;(4) CONSIDERATIONS- In adopting standards under paragraph (1), the Secretary of Homeland Security shall give due consideration to the recommended national standards provided by the Commission under section 7(e)." />
                      <outline text="&apos;(5) DEFINITION- As used in this section, the term &apos;detention facilities operated under contract with the Department&apos; includes, but is not limited to contract detention facilities and detention facilities operated through an intergovernmental service agreement with the Department of Homeland Security." />
                      <outline text="&apos;(d) Applicability to Custodial Facilities Operated by the Department of Health and Human Services-" />
                      <outline text="&apos;(1) IN GENERAL- Not later than 180 days after the date of enactment of the Violence Against Women Reauthorization Act of 2013, the Secretary of Health and Human Services shall publish a final rule adopting national standards for the detection, prevention, reduction, and punishment of rape and sexual assault in facilities that maintain custody of unaccompanied alien children (as defined in section 462(g) of the Homeland Security Act of 2002 (6 U.S.C. 279(g)))." />
                      <outline text="&apos;(2) APPLICABILITY- The standards adopted under paragraph (1) shall apply to facilities operated by the Department of Health and Human Services and to facilities operated under contract with the Department." />
                      <outline text="&apos;(3) COMPLIANCE- The Secretary of Health and Human Services shall--" />
                      <outline text="&apos;(A) assess compliance with the standards adopted under paragraph (1) on a regular basis; and" />
                      <outline text="&apos;(B) include the results of the assessments in performance evaluations of facilities completed by the Department of Health and Human Services." />
                      <outline text="&apos;(4) CONSIDERATIONS- In adopting standards under paragraph (1), the Secretary of Health and Human Services shall give due consideration to the recommended national standards provided by the Commission under section 7(e).&apos;." />
                      <outline text="SEC. 1102. ANONYMOUS ONLINE HARASSMENT." />
                      <outline text="Section 223(a)(1) of the Communications Act of 1934 (47 U.S.C. 223(a)(1)) is amended--" />
                      <outline text="(1) in subparagraph (A), in the undesignated matter following clause (ii), by striking &apos;annoy,&apos;;" />
                      <outline text="(2) in subparagraph (C)--" />
                      <outline text="(A) by striking &apos;annoy,&apos;; and" />
                      <outline text="(B) by striking &apos;harass any person at the called number or who receives the communication&apos; and inserting &apos;harass any specific person&apos;; and" />
                      <outline text="(3) in subparagraph (E), by striking &apos;harass any person at the called number or who receives the communication&apos; and inserting &apos;harass any specific person&apos;." />
                      <outline text="SEC. 1103. STALKER DATABASE." />
                      <outline text="Section 40603 of the Violence Against Women Act of 1994 (42 U.S.C. 14032) is amended by striking &apos;$3,000,000&apos; and all that follows and inserting &apos;$3,000,000 for fiscal years 2014 through 2018.&apos;." />
                      <outline text="SEC. 1104. FEDERAL VICTIM ASSISTANTS REAUTHORIZATION." />
                      <outline text="Section 40114 of the Violence Against Women Act of 1994 (Public Law 103-322; 108 Stat. 1910) is amended by striking &apos;fiscal years 2007 through 2011&apos; and inserting &apos;fiscal years 2014 through 2018&apos;." />
                      <outline text="SEC. 1105. CHILD ABUSE TRAINING PROGRAMS FOR JUDICIAL PERSONNEL AND PRACTITIONERS REAUTHORIZATION." />
                      <outline text="Subtitle C of the Victims of Child Abuse Act of 1990 (42 U.S.C. 13024) is amended in subsection (a) by striking &apos;$2,300,000&apos; and all that follows and inserting &apos;$2,300,000 for each of fiscal years 2014 through 2018.&apos;." />
                      <outline text="TITLE XII--TRAFFICKING VICTIMS PROTECTION" />
                      <outline text="Subtitle A--Combating International Trafficking in Persons" />
                      <outline text="SEC. 1201. REGIONAL STRATEGIES FOR COMBATING TRAFFICKING IN PERSONS." />
                      <outline text="Section 105 of the Trafficking Victims Protection Act of 2000 (22 U.S.C. 7103) is amended--" />
                      <outline text="(1) in subsection (d)(7)(J), by striking &apos;section 105(f) of this division&apos; and inserting &apos;subsection (g)&apos;;" />
                      <outline text="(2) in subsection (e)(2)--" />
                      <outline text="(A) by striking &apos;(2) coordination of certain activities- &apos; and all that follows through &apos;exploitation.&apos;;" />
                      <outline text="(B) by redesignating subparagraph (B) as paragraph (2), and moving such paragraph, as so redesignated, 2 ems to the left; and" />
                      <outline text="(C) by redesignating clauses (i) and (ii) as subparagraphs (A) and (B), respectively, and moving such subparagraphs, as so redesignated, 2 ems to the left;" />
                      <outline text="(3) by redesignating subsection (f) as subsection (g); and" />
                      <outline text="(4) by inserting after subsection (e) the following:" />
                      <outline text="&apos;(f) Regional Strategies for Combating Trafficking in Persons- Each regional bureau in the Department of State shall contribute to the realization of the anti-trafficking goals and objectives of the Secretary of State. Each year, in cooperation with the Office to Monitor and Combat Trafficking in Persons, each regional bureau shall submit a list of anti-trafficking goals and objectives to the Secretary of State for each country in the geographic area of responsibilities of the regional bureau. Host governments shall be informed of the goals and objectives for their particular country and, to the extent possible, host government officials should be consulted regarding the goals and objectives.&apos;." />
                      <outline text="SEC. 1202. PARTNERSHIPS AGAINST SIGNIFICANT TRAFFICKING IN PERSONS." />
                      <outline text="The Trafficking Victims Protection Act of 2000 is amended by inserting after section 105 (22 U.S.C. 7103) the following:" />
                      <outline text="&apos;SEC. 105A. CREATING, BUILDING, AND STRENGTHENING PARTNERSHIPS AGAINST SIGNIFICANT TRAFFICKING IN PERSONS." />
                      <outline text="&apos;(a) Declaration of Purpose- The purpose of this section is to promote collaboration and cooperation--" />
                      <outline text="&apos;(1) between the United States Government and governments listed on the annual Trafficking in Persons Report;" />
                      <outline text="&apos;(2) between foreign governments and civil society actors; and" />
                      <outline text="&apos;(3) between the United States Government and private sector entities." />
                      <outline text="&apos;(b) Partnerships- The Director of the office established pursuant to section 105(e)(1) of this Act, in coordination and cooperation with other officials at the Department of State, officials at the Department of Labor, and other relevant officials of the United States Government, shall promote, build, and sustain partnerships between the United States Government and private entities, including foundations, universities, corporations, community-based organizations, and other nongovernmental organizations, to ensure that--" />
                      <outline text="&apos;(1) United States citizens do not use any item, product, or material produced or extracted with the use and labor from victims of severe forms of trafficking; and" />
                      <outline text="&apos;(2) such entities do not contribute to trafficking in persons involving sexual exploitation." />
                      <outline text="&apos;(c) Program To Address Emergency Situations- The Secretary of State, acting through the Director established pursuant to section 105(e)(1) of this Act, is authorized to establish a fund to assist foreign governments in meeting unexpected, urgent needs in prevention of trafficking in persons, protection of victims, and prosecution of trafficking offenders." />
                      <outline text="&apos;(d) Child Protection Compacts-" />
                      <outline text="&apos;(1) IN GENERAL- The Secretary of State, in consultation with the Administrator of the United States Agency for International Development, the Secretary of Labor, and the heads of other relevant agencies, is authorized to provide assistance under this section for each country that enters into a child protection compact with the United States to support policies and programs that--" />
                      <outline text="&apos;(A) prevent and respond to violence, exploitation, and abuse against children; and" />
                      <outline text="&apos;(B) measurably reduce the trafficking of minors by building sustainable and effective systems of justice, prevention, and protection." />
                      <outline text="&apos;(2) ELEMENTS- A child protection compact under this subsection shall establish a multi-year plan for achieving shared objectives in furtherance of the purposes of this Act. The compact should take into account, if applicable, the national child protection strategies and national action plans for human trafficking of a country, and shall describe--" />
                      <outline text="&apos;(A) the specific objectives the foreign government and the United States Government expect to achieve during the term of the compact;" />
                      <outline text="&apos;(B) the responsibilities of the foreign government and the United States Government in the achievement of such objectives;" />
                      <outline text="&apos;(C) the particular programs or initiatives to be undertaken in the achievement of such objectives and the amount of funding to be allocated to each program or initiative by both countries;" />
                      <outline text="&apos;(D) regular outcome indicators to monitor and measure progress toward achieving such objectives;" />
                      <outline text="&apos;(E) a multi-year financial plan, including the estimated amount of contributions by the United States Government and the foreign government, and proposed mechanisms to implement the plan and provide oversight;" />
                      <outline text="&apos;(F) how a country strategy will be developed to sustain progress made toward achieving such objectives after expiration of the compact; and" />
                      <outline text="&apos;(G) how child protection data will be collected, tracked, and managed to provide strengthened case management and policy planning." />
                      <outline text="&apos;(3) FORM OF ASSISTANCE- Assistance under this subsection may be provided in the form of grants, cooperative agreements, or contracts to or with national governments, regional or local governmental units, or non-governmental organizations or private entities with expertise in the protection of victims of severe forms of trafficking in persons." />
                      <outline text="&apos;(4) ELIGIBLE COUNTRIES- The Secretary of State, in consultation with the agencies set forth in paragraph (1) and relevant officers of the Department of Justice, shall select countries with which to enter into child protection compacts. The selection of countries under this paragraph shall be based on--" />
                      <outline text="&apos;(A) the selection criteria set forth in paragraph (5); and" />
                      <outline text="&apos;(B) objective, documented, and quantifiable indicators, to the maximum extent possible." />
                      <outline text="&apos;(5) SELECTION CRITERIA- A country shall be selected under paragraph (4) on the basis of criteria developed by the Secretary of State in consultation with the Administrator of the United States Agency for International Development and the Secretary of Labor. Such criteria shall include--" />
                      <outline text="&apos;(A) a documented high prevalence of trafficking in persons within the country; and" />
                      <outline text="&apos;(B) demonstrated political motivation and sustained commitment by the government of such country to undertake meaningful measures to address severe forms of trafficking in persons, including prevention, protection of victims, and the enactment and enforcement of anti-trafficking laws against perpetrators." />
                      <outline text="&apos;(6) SUSPENSION AND TERMINATION OF ASSISTANCE-" />
                      <outline text="&apos;(A) IN GENERAL- The Secretary may suspend or terminate assistance provided under this subsection in whole or in part for a country or entity if the Secretary determines that--" />
                      <outline text="&apos;(i) the country or entity is engaged in activities that are contrary to the national security interests of the United States;" />
                      <outline text="&apos;(ii) the country or entity has engaged in a pattern of actions inconsistent with the criteria used to determine the eligibility of the country or entity, as the case may be; or" />
                      <outline text="&apos;(iii) the country or entity has failed to adhere to its responsibilities under the Compact." />
                      <outline text="&apos;(B) REINSTATEMENT- The Secretary may reinstate assistance for a country or entity suspended or terminated under this paragraph only if the Secretary determines that the country or entity has demonstrated a commitment to correcting each condition for which assistance was suspended or terminated under subparagraph (A).&apos;." />
                      <outline text="SEC. 1203. PROTECTION AND ASSISTANCE FOR VICTIMS OF TRAFFICKING." />
                      <outline text="(a) Task Force Activities- Section 105(d)(6) of the Trafficking Victims Protection Act of 2000 (22 U.S.C. 7103(d)(6)) is amended by inserting &apos;, and make reasonable efforts to distribute information to enable all relevant Federal Government agencies to publicize the National Human Trafficking Resource Center Hotline on their websites, in all headquarters offices, and in all field offices throughout the United States&apos; before the period at the end." />
                      <outline text="(b) Congressional Briefing- Section 107(a)(2) of the Trafficking Victims Protection Act of 2000 (22 U.S.C. 7105(a)(2)) is amended by inserting &apos;and shall brief Congress annually on such efforts&apos; before the period at the end." />
                      <outline text="SEC. 1204. MINIMUM STANDARDS FOR THE ELIMINATION OF TRAFFICKING." />
                      <outline text="Section 108(b) of the Trafficking Victims Protection Act of 2000 (22 U.S.C. 7106(b)) is amended--" />
                      <outline text="(1) in paragraph (3)--" />
                      <outline text="(A) by striking &apos;peacekeeping&apos; and inserting &apos;diplomatic, peacekeeping,&apos;;" />
                      <outline text="(B) by striking &apos;, and measures&apos; and inserting &apos;, a transparent system for remediating or punishing such public officials as a deterrent, measures&apos;; and" />
                      <outline text="(C) by inserting &apos;, effective bilateral, multilateral, or regional information sharing and cooperation arrangements with other countries, and effective policies or laws regulating foreign labor recruiters and holding them civilly and criminally liable for fraudulent recruiting&apos; before the period at the end;" />
                      <outline text="(2) in paragraph (4), by inserting &apos;and has entered into bilateral, multilateral, or regional law enforcement cooperation and coordination arrangements with other countries&apos; before the period at the end;" />
                      <outline text="(3) in paragraph (7)--" />
                      <outline text="(A) by inserting &apos;, including diplomats and soldiers,&apos; after &apos;public officials&apos;;" />
                      <outline text="(B) by striking &apos;peacekeeping&apos; and inserting &apos;diplomatic, peacekeeping,&apos;; and" />
                      <outline text="(C) by inserting &apos;A government&apos;s failure to appropriately address public allegations against such public officials, especially once such officials have returned to their home countries, shall be considered inaction under these criteria.&apos; after &apos;such trafficking.&apos;;" />
                      <outline text="(4) by redesignating paragraphs (9) through (11) as paragraphs (10) through (12), respectively; and" />
                      <outline text="(5) by inserting after paragraph (8) the following:" />
                      <outline text="&apos;(9) Whether the government has entered into effective, transparent partnerships, cooperative arrangements, or agreements that have resulted in concrete and measurable outcomes with--" />
                      <outline text="&apos;(A) domestic civil society organizations, private sector entities, or international nongovernmental organizations, or into multilateral or regional arrangements or agreements, to assist the government&apos;s efforts to prevent trafficking, protect victims, and punish traffickers; or" />
                      <outline text="&apos;(B) the United States toward agreed goals and objectives in the collective fight against trafficking.&apos;." />
                      <outline text="SEC. 1205. BEST PRACTICES IN TRAFFICKING IN PERSONS ERADICATION." />
                      <outline text="Section 110(b) of the Trafficking Victims Protection Act of 2000 (22 U.S.C. 7107(b)) is amended--" />
                      <outline text="(1) in paragraph (1)--" />
                      <outline text="(A) by striking &apos;with respect to the status of severe forms of trafficking in persons that shall include--&apos; and inserting &apos;describing the anti-trafficking efforts of the United States and foreign governments according to the minimum standards and criteria enumerated in section 108, and the nature and scope of trafficking in persons in each country and analysis of the trend lines for individual governmental efforts. The report should include--&apos;;" />
                      <outline text="(B) in subparagraph (E), by striking &apos;; and&apos; and inserting a semicolon;" />
                      <outline text="(C) in subparagraph (F), by striking the period at the end and inserting &apos;; and&apos;; and" />
                      <outline text="(D) by inserting at the end the following:" />
                      <outline text="&apos;(G) a section entitled &apos;Promising Practices in the Eradication of Trafficking in Persons&apos; to highlight effective practices and use of innovation and technology in prevention, protection, prosecution, and partnerships, including by foreign governments, the private sector, and domestic civil society actors.&apos;;" />
                      <outline text="(2) by striking paragraph (2);" />
                      <outline text="(3) by redesignating paragraphs (3) and (4) as paragraphs (2) and (3), respectively; and" />
                      <outline text="(4) in paragraph (2), as redesignated, by adding at the end the following:" />
                      <outline text="&apos;(E) PUBLIC NOTICE- Not later than 30 days after notifying Congress of each country determined to have met the requirements under subclauses (I) through (III) of subparagraph (D)(ii), the Secretary of State shall provide a detailed description of the credible evidence supporting such determination on a publicly available website maintained by the Department of State.&apos;." />
                      <outline text="SEC. 1206. PROTECTIONS FOR DOMESTIC WORKERS AND OTHER NONIMMIGRANTS." />
                      <outline text="Section 202 of the William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008 (8 U.S.C. 1375b) is amended--" />
                      <outline text="(1) in subsection (a)--" />
                      <outline text="(A) in the subsection heading, by inserting &apos;and Video for Consular Waiting Rooms&apos; after &apos;Information Pamphlet&apos;; and" />
                      <outline text="(B) in paragraph (1)--" />
                      <outline text="(i) by inserting &apos;and video&apos; after &apos;information pamphlet&apos;; and" />
                      <outline text="(ii) by adding at the end the following: &apos;The video shall be distributed and shown in consular waiting rooms in embassies and consulates appropriate to the circumstances that are determined to have the greatest concentration of employment or education-based non-immigrant visa applicants, and where sufficient video facilities exist in waiting or other rooms where applicants wait or convene. The Secretary of State is authorized to augment video facilities in such consulates or embassies in order to fulfill the purposes of this section.&apos;;" />
                      <outline text="(2) in subsection (b), by inserting &apos;and video&apos; after &apos;information pamphlet&apos;;" />
                      <outline text="(3) in subsection (c)--" />
                      <outline text="(A) in paragraph (1), by inserting &apos;and produce or dub the video&apos; after &apos;information pamphlet&apos;; and" />
                      <outline text="(B) in paragraph (2), by inserting &apos;and the video produced or dubbed&apos; after &apos;translated&apos;; and" />
                      <outline text="(4) in subsection (d)--" />
                      <outline text="(A) in paragraph (1), by inserting &apos;and video&apos; after &apos;information pamphlet&apos;;" />
                      <outline text="(B) in paragraph (2), by inserting &apos;and video&apos; after &apos;information pamphlet&apos;; and" />
                      <outline text="(C) by adding at the end the following:" />
                      <outline text="&apos;(4) DEADLINE FOR VIDEO DEVELOPMENT AND DISTRIBUTION- Not later than 1 year after the date of the enactment of the Violence Against Women Reauthorization Act of 2013, the Secretary of State shall make available the video developed under subsection (a) produced or dubbed in all the languages referred to in subsection (c).&apos;." />
                      <outline text="SEC. 1207. PREVENTION OF CHILD MARRIAGE." />
                      <outline text="(a) In General- Section 106 of the Trafficking Victims Protection Act of 2000 (22 U.S.C. 7104) is amended by adding at the end the following:" />
                      <outline text="&apos;(j) Prevention of Child Trafficking Through Child Marriage- The Secretary of State shall establish and implement a multi-year, multi-sectoral strategy--" />
                      <outline text="&apos;(1) to prevent child marriage;" />
                      <outline text="&apos;(2) to promote the empowerment of girls at risk of child marriage in developing countries;" />
                      <outline text="&apos;(3) that should address the unique needs, vulnerabilities, and potential of girls younger than 18 years of age in developing countries;" />
                      <outline text="&apos;(4) that targets areas in developing countries with high prevalence of child marriage; and" />
                      <outline text="&apos;(5) that includes diplomatic and programmatic initiatives.&apos;." />
                      <outline text="(b) Inclusion of Child Marriage Status in Reports- The Foreign Assistance Act of 1961 (22 U.S.C. 2151 et seq.) is amended--" />
                      <outline text="(1) in section 116 (22 U.S.C. 2151n), by adding at the end the following:" />
                      <outline text="&apos;(g) Child Marriage Status-" />
                      <outline text="&apos;(1) IN GENERAL- The report required under subsection (d) shall include, for each country in which child marriage is prevalent, a description of the status of the practice of child marriage in such country." />
                      <outline text="&apos;(2) DEFINED TERM- In this subsection, the term &apos;child marriage&apos; means the marriage of a girl or boy who is--" />
                      <outline text="&apos;(A) younger than the minimum age for marriage under the laws of the country in which such girl or boy is a resident; or" />
                      <outline text="&apos;(B) younger than 18 years of age, if no such law exists.&apos;; and" />
                      <outline text="(2) in section 502B (22 U.S.C. 2304), by adding at the end the following:" />
                      <outline text="&apos;(i) Child Marriage Status-" />
                      <outline text="&apos;(1) IN GENERAL- The report required under subsection (b) shall include, for each country in which child marriage is prevalent, a description of the status of the practice of child marriage in such country." />
                      <outline text="&apos;(2) DEFINED TERM- In this subsection, the term &apos;child marriage&apos; means the marriage of a girl or boy who is--" />
                      <outline text="&apos;(A) younger than the minimum age for marriage under the laws of the country in which such girl or boy is a resident; or" />
                      <outline text="&apos;(B) younger than 18 years of age, if no such law exists.&apos;." />
                      <outline text="SEC. 1208. CHILD SOLDIERS." />
                      <outline text="Section 404 of the William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008 (22 U.S.C. 2370c-1) is amended--" />
                      <outline text="(1) in subsection (a), by striking &apos;(b), (c), and (d), the authorities contained in section 516 or 541 of the Foreign Assistance Act of 1961 (22 U.S.C. 2321j or 2347)&apos; and inserting &apos;(b) through (f), the authorities contained in sections 516, 541, and 551 of the Foreign Assistance Act of 1961 (22 U.S.C. 2321j, 2347, and 2348)&apos;; and" />
                      <outline text="(2) by adding at the end the following:" />
                      <outline text="&apos;(f) Exception for Peacekeeping Operations- The limitation set forth in subsection (a) that relates to section 551 of the Foreign Assistance Act of 1961 shall not apply to programs that support military professionalization, security sector reform, heightened respect for human rights, peacekeeping preparation, or the demobilization and reintegration of child soldiers.&apos;." />
                      <outline text="Subtitle B--Combating Trafficking in Persons in the United States" />
                      <outline text="PART I--PENALTIES AGAINST TRAFFICKERS AND OTHER CRIMESSEC. 1211. CRIMINAL TRAFFICKING OFFENSES." />
                      <outline text="(a) RICO Amendment- Section 1961(1)(B) of title 18, United States Code, is amended by inserting &apos;section 1351 (relating to fraud in foreign labor contracting),&apos; before &apos;section 1425&apos;." />
                      <outline text="(b) Engaging in Illicit Sexual Conduct in Foreign Places- Section 2423(c) of title 18, United States Code, is amended by inserting &apos;or resides, either temporarily or permanently, in a foreign country&apos; after &apos;commerce&apos;." />
                      <outline text="(c) Unlawful Conduct With Respect to Documents-" />
                      <outline text="(1) IN GENERAL- Chapter 77 of title 18, United States Code, is amended by adding at the end the following:" />
                      <outline text="-&apos;Sec. 1597. Unlawful conduct with respect to immigration documents" />
                      <outline text="&apos;(a) Destruction, Concealment, Removal, Confiscation, or Possession of Immigration Documents- It shall be unlawful for any person to knowingly destroy, conceal, remove, confiscate, or possess, an actual or purported passport or other immigration document of another individual --" />
                      <outline text="&apos;(1) in the course of violating section 1351 of this title or section 274 of the Immigration and Nationality Act (8 U.S.C. 1324);" />
                      <outline text="&apos;(2) with intent to violate section 1351 of this title or section 274 of the Immigration and Nationality Act (8 U.S.C. 1324); or" />
                      <outline text="&apos;(3) in order to, without lawful authority, maintain, prevent, or restrict the labor of services of the individual." />
                      <outline text="&apos;(b) Penalty- Any person who violates subsection (a) shall be fined under this title, imprisoned for not more than 1 year, or both." />
                      <outline text="&apos;(c) Obstruction- Any person who knowingly obstructs, attempts to obstruct, or in any way interferes with or prevents the enforcement of this section, shall be subject to the penalties described in subsection (b).&apos;." />
                      <outline text="(2) TECHNICAL AND CONFORMING AMENDMENT- The table of sections for chapter 77 of title 18, United States Code, is amended by adding at the end the following:" />
                      <outline text="&apos;1597. Unlawful conduct with respect to immigration documents.&apos;." />
                      <outline text="SEC. 1212. CIVIL REMEDIES; CLARIFYING DEFINITION." />
                      <outline text="(a) Civil Remedy for Personal Injuries- Section 2255 of title 18, United States Code, is amended--" />
                      <outline text="(1) in subsection (a), by striking &apos;section 2241(c)&apos; and inserting &apos;section 1589, 1590, 1591, 2241(c)&apos;; and" />
                      <outline text="(2) in subsection (b), by striking &apos;six years&apos; and inserting &apos;10 years&apos;." />
                      <outline text="(b) Definition-" />
                      <outline text="(1) IN GENERAL- Section 103 of the Trafficking Victims Protection Act of 2000 (22 U.S.C. 7102) is amended--" />
                      <outline text="(A) by redesignating paragraphs (1) through (14) as paragraphs (2) through (15), respectively;" />
                      <outline text="(B) by inserting before paragraph (2), as redesignated, the following:" />
                      <outline text="&apos;(1) ABUSE OR THREATENED ABUSE OF LAW OR LEGAL PROCESS- The term &apos;abuse or threatened abuse of the legal process&apos; means the use or threatened use of a law or legal process, whether administrative, civil, or criminal, in any manner or for any purpose for which the law was not designed, in order to exert pressure on another person to cause that person to take some action or refrain from taking some action.&apos;;" />
                      <outline text="(C) in paragraph (14), as redesignated, by striking &apos;paragraph (8)&apos; and inserting &apos;paragraph (9)&apos;; and" />
                      <outline text="(D) in paragraph (15), as redesignated, by striking &apos;paragraph (8) or (9)&apos; and inserting &apos;paragraph (9) or (10)&apos;." />
                      <outline text="(2) TECHNICAL AND CONFORMING AMENDMENTS-" />
                      <outline text="(A) TRAFFICKING VICTIMS PROTECTION ACT OF 2000- The Trafficking Victims Protection Act of 2000 (22 U.S.C. 7101 et eq.) is amended--" />
                      <outline text="(i) in section 110(e) (22 U.S.C. 7107(e))--" />
                      <outline text="(I) by striking &apos;section 103(7)(A)&apos; and inserting &apos;section 103(8)(A)&apos;; and" />
                      <outline text="(II) by striking &apos;section 103(7)(B)&apos; and inserting &apos;section 103(8)(B)&apos;; and" />
                      <outline text="(ii) in section 113(g)(2) (22 U.S.C. 7110(g)(2)), by striking &apos;section 103(8)(A)&apos; and inserting &apos;section 103(9)(A)&apos;." />
                      <outline text="(B) NORTH KOREAN HUMAN RIGHTS ACT OF 2004- Section 203(b)(2) of the North Korean Human Rights Act of 2004 (22 U.S.C. 7833(b)(2)) is amended by striking &apos;section 103(14)&apos; and inserting &apos;section 103(15)&apos;." />
                      <outline text="(C) TRAFFICKING VICTIMS PROTECTION REAUTHORIZATION ACT OF 2005- Section 207 of the Trafficking Victims Protection Reauthorization Act of 2005 (42 U.S.C. 14044e) is amended--" />
                      <outline text="(i) in paragraph (1), by striking &apos;section 103(8)&apos; and inserting &apos;section 103(9)&apos;;" />
                      <outline text="(ii) in paragraph (2), by striking &apos;section 103(9)&apos; and inserting &apos;section 103(10)&apos;; and" />
                      <outline text="(iii) in paragraph (3), by striking &apos;section 103(3)&apos; and inserting &apos;section 103(4)&apos;." />
                      <outline text="(D) VIOLENCE AGAINST WOMEN AND DEPARTMENT OF JUSTICE REAUTHORIZATION ACT OF 2005- Section 111(a)(1) of the Violence Against Women and Department of Justice Reauthorization Act of 2005 (42 U.S.C. 14044f(a)(1)) is amended by striking &apos;paragraph (8)&apos; and inserting &apos;paragraph (9)&apos;." />
                      <outline text="PART II--ENSURING AVAILABILITY OF POSSIBLE WITNESSES AND INFORMANTSSEC. 1221. PROTECTIONS FOR TRAFFICKING VICTIMS WHO COOPERATE WITH LAW ENFORCEMENT." />
                      <outline text="Section 101(a)(15)(T)(ii)(III) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(15)(T)(ii)(III) is amended by inserting &apos;, or any adult or minor children of a derivative beneficiary of the alien, as&apos; after &apos;age&apos;." />
                      <outline text="SEC. 1222. PROTECTION AGAINST FRAUD IN FOREIGN LABOR CONTRACTING." />
                      <outline text="Section 101(a)(15)(U)(iii) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(15)(U)(iii)) is amended by inserting &apos;fraud in foreign labor contracting (as defined in section 1351 of title 18, United States Code);&apos; after &apos;perjury;&apos;." />
                      <outline text="PART III--ENSURING INTERAGENCY COORDINATION AND EXPANDED REPORTINGSEC. 1231. REPORTING REQUIREMENTS FOR THE ATTORNEY GENERAL." />
                      <outline text="Section 105(d)(7) of the Trafficking Victims Protection Act of 2000 (22 U.S.C. 7103(d)(7)) is amended--" />
                      <outline text="(1) by redesignating subparagraphs (D) through (J) as subparagraphs (I) through (O);" />
                      <outline text="(2) by striking subparagraphs (B) and (C) and inserting the following:" />
                      <outline text="&apos;(B) the number of persons who have been granted continued presence in the United States under section 107(c)(3) during the preceding fiscal year and the mean and median time taken to adjudicate applications submitted under such section, including the time from the receipt of an application by law enforcement to the issuance of continued presence, and a description of any efforts being taken to reduce the adjudication and processing time while ensuring the safe and competent processing of the applications;" />
                      <outline text="&apos;(C) the number of persons who have applied for, been granted, or been denied a visa or otherwise provided status under subparagraph (T)(i) or (U)(i) of section 101(a)(15) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(15)) during the preceding fiscal year;" />
                      <outline text="&apos;(D) the number of persons who have applied for, been granted, or been denied a visa or status under clause (ii) of section 101(a)(15)(T) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(15)(T)) during the preceding fiscal year, broken down by the number of such persons described in subclauses (I), (II), and (III) of such clause (ii);" />
                      <outline text="&apos;(E) the amount of Federal funds expended in direct benefits paid to individuals described in subparagraph (D) in conjunction with T visa status;" />
                      <outline text="&apos;(F) the number of persons who have applied for, been granted, or been denied a visa or status under section 101(a)(15)(U)(i) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(15)(U)(i)) during the preceding fiscal year;" />
                      <outline text="&apos;(G) the mean and median time in which it takes to adjudicate applications submitted under the provisions of law set forth in subparagraph (C), including the time between the receipt of an application and the issuance of a visa and work authorization;" />
                      <outline text="&apos;(H) any efforts being taken to reduce the adjudication and processing time, while ensuring the safe and competent processing of the applications;&apos;;" />
                      <outline text="(3) in subparagraph (N)(iii), as redesignated, by striking &apos;and&apos; at the end;" />
                      <outline text="(4) in subparagraph (O), as redesignated, by striking the period at the end and inserting &apos;; and&apos;; and" />
                      <outline text="(5) by adding at the end the following:" />
                      <outline text="&apos;(P) the activities undertaken by Federal agencies to train appropriate State, tribal, and local government and law enforcement officials to identify victims of severe forms of trafficking, including both sex and labor trafficking;" />
                      <outline text="&apos;(Q) the activities undertaken by Federal agencies in cooperation with State, tribal, and local law enforcement officials to identify, investigate, and prosecute offenses under sections 1581, 1583, 1584, 1589, 1590, 1592, and 1594 of title 18, United States Code, or equivalent State offenses, including, in each fiscal year--" />
                      <outline text="&apos;(i) the number, age, gender, country of origin, and citizenship status of victims identified for each offense;" />
                      <outline text="&apos;(ii) the number of individuals charged, and the number of individuals convicted, under each offense;" />
                      <outline text="&apos;(iii) the number of individuals referred for prosecution for State offenses, including offenses relating to the purchasing of commercial sex acts;" />
                      <outline text="&apos;(iv) the number of victims granted continued presence in the United States under section 107(c)(3); and" />
                      <outline text="&apos;(v) the number of victims granted a visa or otherwise provided status under subparagraph (T)(i) or (U)(i) of section 101(a)(15) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(15)); and" />
                      <outline text="&apos;(R) the activities undertaken by the Department of Justice and the Department of Health and Human Services to meet the specific needs of minor victims of domestic trafficking, including actions taken pursuant to subsection (f) and section 202(a) of the Trafficking Victims Protection Reauthorization Act of 2005 (42 U.S.C. 14044(a)), and the steps taken to increase cooperation among Federal agencies to ensure the effective and efficient use of programs for which the victims are eligible.&apos;." />
                      <outline text="SEC. 1232. REPORTING REQUIREMENTS FOR THE SECRETARY OF LABOR." />
                      <outline text="Section 105(b) of the Trafficking Victims Protection Act of 2005 (22 U.S.C. 7112(b)) is amended by adding at the end the following:" />
                      <outline text="&apos;(3) SUBMISSION TO CONGRESS- Not later than December 1, 2014, and every 2 years thereafter, the Secretary of Labor shall submit the list developed under paragraph (2)(C) to Congress.&apos;." />
                      <outline text="SEC. 1233. INFORMATION SHARING TO COMBAT CHILD LABOR AND SLAVE LABOR." />
                      <outline text="Section 105(a) of the Trafficking Victims Protection Act of 2005 (22 U.S.C. 7112(a)) is amended by adding at the end the following:" />
                      <outline text="&apos;(3) INFORMATION SHARING- The Secretary of State shall, on a regular basis, provide information relating to child labor and forced labor in the production of goods in violation of international standards to the Department of Labor to be used in developing the list described in subsection (b)(2)(C).&apos;." />
                      <outline text="SEC. 1234. GOVERNMENT TRAINING EFFORTS TO INCLUDE THE DEPARTMENT OF LABOR." />
                      <outline text="Section 107(c)(4) of the Trafficking Victims Protection Act of 2000 (22 U.S.C. 7105(c)(4)) is amended--" />
                      <outline text="(1) in the first sentence, by inserting &apos;the Department of Labor, the Equal Employment Opportunity Commission,&apos; before &apos;and the Department&apos;; and" />
                      <outline text="(2) in the second sentence, by inserting &apos;, in consultation with the Secretary of Labor,&apos; before &apos;shall provide&apos;." />
                      <outline text="SEC. 1235. GAO REPORT ON THE USE OF FOREIGN LABOR CONTRACTORS." />
                      <outline text="(a) In General- Not later than 2 years after the date of the enactment of this Act, the Comptroller General of the United States shall submit a report on the use of foreign labor contractors to--" />
                      <outline text="(1) the Committee on the Judiciary of the Senate;" />
                      <outline text="(2) the Committee on Health, Education, Labor, and Pensions of the Senate;" />
                      <outline text="(3) the Committee on the Judiciary of the House of Representatives; and" />
                      <outline text="(4) the Committee on Education and the Workforce of the House of Representatives." />
                      <outline text="(b) Contents- The report under subsection (a) should, to the extent possible--" />
                      <outline text="(1) address the role and practices of United States employers in--" />
                      <outline text="(A) the use of labor recruiters or brokers; or" />
                      <outline text="(B) directly recruiting foreign workers;" />
                      <outline text="(2) analyze the laws that protect such workers, both overseas and domestically;" />
                      <outline text="(3) describe the oversight and enforcement mechanisms in Federal departments and agencies for such laws; and" />
                      <outline text="(4) identify any gaps that may exist in these protections; and" />
                      <outline text="(5) recommend possible actions for Federal departments and agencies to combat any abuses." />
                      <outline text="(c) Requirements- The report under subsection (a) shall--" />
                      <outline text="(1) describe the role of labor recruiters or brokers working in countries that are sending workers and receiving funds, including any identified involvement in labor abuses;" />
                      <outline text="(2) describe the role and practices of employers in the United States that commission labor recruiters or brokers or directly recruit foreign workers;" />
                      <outline text="(3) describe the role of Federal departments and agencies in overseeing and regulating the foreign labor recruitment process, including certifying and enforcing under existing regulations;" />
                      <outline text="(4) describe the type of jobs and the numbers of positions in the United States that have been filled through foreign workers during each of the last 8 years, including positions within the Federal Government;" />
                      <outline text="(5) describe any efforts or programs undertaken by Federal, State and local government entities to encourage employers, directly or indirectly, to use foreign workers or to reward employers for using foreign workers; and" />
                      <outline text="(6) based on the information required under paragraphs (1) through (3), identify any common abuses of foreign workers and the employment system, including the use of fees and debts, and recommendations of actions that could be taken by Federal departments and agencies to combat any identified abuses." />
                      <outline text="SEC. 1236. ACCOUNTABILITY." />
                      <outline text="All grants awarded by the Attorney General under this title or an Act amended by this title shall be subject to the following accountability provisions:" />
                      <outline text="(1) AUDIT REQUIREMENT-" />
                      <outline text="(A) DEFINITION- In this paragraph, the term &apos;unresolved audit finding&apos; means an audit report finding in the final audit report of the Inspector General of the Department of Justice that the grantee has used grant funds for an unauthorized expenditure or otherwise unallowable cost that is not closed or resolved during the 12-month period beginning on the date on which the final audit report is issued" />
                      <outline text="(B) REQUIREMENT- Beginning in the first fiscal year beginning after the date of enactment of this Act, and in each fiscal year thereafter, the Inspector General of the Department of Justice shall conduct audits of recipients of grants under this title or an Act amended by this title to prevent waste, fraud, and abuse of funds by grantees. The Inspector General shall determine the appropriate number of grantees to be audited each year." />
                      <outline text="(C) MANDATORY EXCLUSION- A recipient of grant funds under this title or an Act amended by this title that is found to have an unresolved audit finding shall not be eligible to receive grant funds under this title or an Act amended by this title during the first 2 fiscal years beginning after the end of the 12-month period described in subparagraph (A)." />
                      <outline text="(D) PRIORITY- In awarding grants under this title or an Act amended by this title, the Attorney General shall give priority to eligible applicants that did not have an unresolved audit finding during the 3 fiscal years before submitting an application for a grant under this title or an Act amended by this title." />
                      <outline text="(E) REIMBURSEMENT- If an entity is awarded grant funds under this title or an Act amended by this title during the 2-fiscal-year period during which the entity is barred from receiving grants under subparagraph (C), the Attorney General shall--" />
                      <outline text="(i) deposit an amount equal to the amount of the grant funds that were improperly awarded to the grantee into the General Fund of the Treasury; and" />
                      <outline text="(ii) seek to recoup the costs of the repayment to the fund from the grant recipient that was erroneously awarded grant funds." />
                      <outline text="(2) NONPROFIT ORGANIZATION REQUIREMENTS-" />
                      <outline text="(A) DEFINITION- For purposes of this paragraph and the grant programs under this title or an Act amended by this title, the term &apos;nonprofit organization&apos; means an organization that is described in section 501(c)(3) of the Internal Revenue Code of 1986 and is exempt from taxation under section 501(a) of such Code." />
                      <outline text="(B) PROHIBITION- The Attorney General may not award a grant under this title or an Act amended by this title to a nonprofit organization that holds money in offshore accounts for the purpose of avoiding paying the tax described in section 511(a) of the Internal Revenue Code of 1986." />
                      <outline text="(C) DISCLOSURE- Each nonprofit organization that is awarded a grant under this title or an Act amended by this title and uses the procedures prescribed in regulations to create a rebuttable presumption of reasonableness for the compensation of its officers, directors, trustees and key employees, shall disclose to the Attorney General, in the application for the grant, the process for determining such compensation, including the independent persons involved in reviewing and approving such compensation, the comparability data used, and contemporaneous substantiation of the deliberation and decision. Upon request, the Attorney General shall make the information disclosed under this subparagraph available for public inspection." />
                      <outline text="(3) CONFERENCE EXPENDITURES-" />
                      <outline text="(A) LIMITATION- No amounts authorized to be appropriated to the Department of Justice under this title or an Act amended by this title may be used by the Attorney General, or by any individual or entity awarded discretionary funds through a cooperative agreement under this title or an Act amended by this title, to host or support any expenditure for conferences that uses more than $20,000 in funds made available to the Department of Justice, unless the Deputy Attorney General or the appropriate Assistant Attorney General, Director, or principal deputy (as designated by the Deputy Attorney General) provides prior written authorization that the funds may be expended to host the conference." />
                      <outline text="(B) WRITTEN APPROVAL- Written approval under subparagraph (A) shall include a written estimate of all costs associated with the conference, including the cost of all food, beverages, audio-visual equipment, honoraria for speakers, and entertainment." />
                      <outline text="(C) REPORT- The Deputy Attorney General shall submit an annual report to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives on all conference expenditures approved under this paragraph." />
                      <outline text="(4) ANNUAL CERTIFICATION- Beginning in the first fiscal year beginning after the date of enactment of this Act, the Attorney General shall submit, to the Committee on the Judiciary and the Committee on Appropriations of the Senate and the Committee on the Judiciary and the Committee on Appropriations of the House of Representatives, an annual certification indicating whether--" />
                      <outline text="(A) all audits issued by the Office of the Inspector General under paragraph (1) have been completed and reviewed by the appropriate Assistant Attorney General or Director;" />
                      <outline text="(B) all mandatory exclusions required under paragraph (1)(C) have been issued;" />
                      <outline text="(C) all reimbursements required under paragraph (1)(E) have been made; and" />
                      <outline text="(D) includes a list of any grant recipients excluded under paragraph (1) from the previous year." />
                      <outline text="PART IV--ENHANCING STATE AND LOCAL EFFORTS TO COMBAT TRAFFICKING IN PERSONSSEC. 1241. ASSISTANCE FOR DOMESTIC MINOR SEX TRAFFICKING VICTIMS." />
                      <outline text="(a) In General- Section 202 of the Trafficking Victims Protection Reauthorization Act of 2005 (42 U.S.C. 14044a) is amended to read as follows:" />
                      <outline text="&apos;SEC. 202. ESTABLISHMENT OF A GRANT PROGRAM TO DEVELOP, EXPAND, AND STRENGTHEN ASSISTANCE PROGRAMS FOR CERTAIN PERSONS SUBJECT TO TRAFFICKING." />
                      <outline text="&apos;(a) Definitions- In this section:" />
                      <outline text="&apos;(1) ASSISTANT SECRETARY- The term &apos;Assistant Secretary&apos; means the Assistant Secretary for Children and Families of the Department of Health and Human Services." />
                      <outline text="&apos;(2) ASSISTANT ATTORNEY GENERAL- The term &apos;Assistant Attorney General&apos; means the Assistant Attorney General for the Office of Justice Programs of the Department of Justice." />
                      <outline text="&apos;(3) ELIGIBLE ENTITY- The term &apos;eligible entity&apos; means a State or unit of local government that--" />
                      <outline text="&apos;(A) has significant criminal activity involving sex trafficking of minors;" />
                      <outline text="&apos;(B) has demonstrated cooperation between Federal, State, local, and, where applicable, tribal law enforcement agencies, prosecutors, and social service providers in addressing sex trafficking of minors;" />
                      <outline text="&apos;(C) has developed a workable, multi-disciplinary plan to combat sex trafficking of minors, including--" />
                      <outline text="&apos;(i) building or establishing a residential care facility for minor victims of sex trafficking;" />
                      <outline text="&apos;(ii) the provision of rehabilitative care to minor victims of sex trafficking;" />
                      <outline text="&apos;(iii) the provision of specialized training for law enforcement officers and social service providers for all forms of sex trafficking, with a focus on sex trafficking of minors;" />
                      <outline text="&apos;(iv) prevention, deterrence, and prosecution of offenses involving sex trafficking of minors;" />
                      <outline text="&apos;(v) cooperation or referral agreements with organizations providing outreach or other related services to runaway and homeless youth; and" />
                      <outline text="&apos;(vi) law enforcement protocols or procedures to screen all individuals arrested for prostitution, whether adult or minor, for victimization by sex trafficking and by other crimes, such as sexual assault and domestic violence; and" />
                      <outline text="&apos;(D) provides assurance that a minor victim of sex trafficking shall not be required to collaborate with law enforcement to have access to residential care or services provided with a grant under this section." />
                      <outline text="&apos;(4) MINOR VICTIM OF SEX TRAFFICKING- The term &apos;minor victim of sex trafficking&apos; means an individual who--" />
                      <outline text="&apos;(A) is younger than 18 years of age, and is a victim of an offense described in section 1591(a) of title 18, United States Code, or a comparable State law; or" />
                      <outline text="&apos;(B)(i) is not younger than 18 years of age nor older than 20 years of age;" />
                      <outline text="&apos;(ii) before the individual reached 18 years of age, was described in subparagraph (A); and" />
                      <outline text="&apos;(iii) was receiving shelter or services as a minor victim of sex trafficking." />
                      <outline text="&apos;(5) QUALIFIED NONGOVERNMENTAL ORGANIZATION- The term &apos;qualified nongovernmental organization&apos; means an organization that--" />
                      <outline text="&apos;(A) is not a State or unit of local government, or an agency of a State or unit of local government;" />
                      <outline text="&apos;(B) has demonstrated experience providing services to victims of sex trafficking or related populations (such as runaway and homeless youth), or employs staff specialized in the treatment of sex trafficking victims; and" />
                      <outline text="&apos;(C) demonstrates a plan to sustain the provision of services beyond the period of a grant awarded under this section." />
                      <outline text="&apos;(6) SEX TRAFFICKING OF A MINOR- The term &apos;sex trafficking of a minor&apos; means an offense described in section 1591(a) of title 18, United States Code, or a comparable State law, against a minor." />
                      <outline text="&apos;(b) Sex Trafficking Block Grants-" />
                      <outline text="&apos;(1) GRANTS AUTHORIZED-" />
                      <outline text="&apos;(A) IN GENERAL- The Assistant Attorney General, in consultation with the Assistant Secretary, may make block grants to 4 eligible entities located in different regions of the United States to combat sex trafficking of minors." />
                      <outline text="&apos;(B) REQUIREMENT- Not fewer than 1 of the block grants made under subparagraph (A) shall be awarded to an eligible entity with a State population of less than 5,000,000." />
                      <outline text="&apos;(C) GRANT AMOUNT- Subject to the availability of appropriations under subsection (g) to carry out this section, each grant made under this section shall be for an amount not less than $1,500,000 and not greater than $2,000,000." />
                      <outline text="&apos;(D) DURATION-" />
                      <outline text="&apos;(i) IN GENERAL- A grant made under this section shall be for a period of 1 year." />
                      <outline text="&apos;(ii) RENEWAL-" />
                      <outline text="&apos;(I) IN GENERAL- The Assistant Attorney General may renew a grant under this section for up to 3 1-year periods." />
                      <outline text="&apos;(II) PRIORITY- In making grants in any fiscal year after the first fiscal year in which grants are made under this section, the Assistant Attorney General shall give priority to an eligible entity that received a grant in the preceding fiscal year and is eligible for renewal under this subparagraph, taking into account any evaluation of the eligible entity conducted under paragraph (4), if available." />
                      <outline text="&apos;(E) CONSULTATION- In carrying out this section, the Assistant Attorney General shall consult with the Assistant Secretary with respect to--" />
                      <outline text="&apos;(i) evaluations of grant recipients under paragraph (4);" />
                      <outline text="&apos;(ii) avoiding unintentional duplication of grants; and" />
                      <outline text="&apos;(iii) any other areas of shared concern." />
                      <outline text="&apos;(2) USE OF FUNDS-" />
                      <outline text="&apos;(A) ALLOCATION- Not less than 67 percent of each grant made under paragraph (1) shall be used by the eligible entity to provide residential care and services (as described in clauses (i) through (iv) of subparagraph (B)) to minor victims of sex trafficking through qualified nongovernmental organizations." />
                      <outline text="&apos;(B) AUTHORIZED ACTIVITIES- Grants awarded pursuant to paragraph (2) may be used for--" />
                      <outline text="&apos;(i) providing residential care to minor victims of sex trafficking, including temporary or long-term placement as appropriate;" />
                      <outline text="&apos;(ii) providing 24-hour emergency social services response for minor victims of sex trafficking;" />
                      <outline text="&apos;(iii) providing minor victims of sex trafficking with clothing and other daily necessities needed to keep such victims from returning to living on the street;" />
                      <outline text="&apos;(iv) case management services for minor victims of sex trafficking;" />
                      <outline text="&apos;(v) mental health counseling for minor victims of sex trafficking, including specialized counseling and substance abuse treatment;" />
                      <outline text="&apos;(vi) legal services for minor victims of sex trafficking;" />
                      <outline text="&apos;(vii) specialized training for social service providers, public sector personnel, and private sector personnel likely to encounter sex trafficking victims on issues related to the sex trafficking of minors and severe forms of trafficking in persons;" />
                      <outline text="&apos;(viii) outreach and education programs to provide information about deterrence and prevention of sex trafficking of minors;" />
                      <outline text="&apos;(ix) programs to provide treatment to individuals charged or cited with purchasing or attempting to purchase sex acts in cases where--" />
                      <outline text="&apos;(I) a treatment program can be mandated as a condition of a sentence, fine, suspended sentence, or probation, or is an appropriate alternative to criminal prosecution; and" />
                      <outline text="&apos;(II) the individual was not charged with purchasing or attempting to purchase sex acts with a minor; and" />
                      <outline text="&apos;(x) screening and referral of minor victims of severe forms of trafficking in persons." />
                      <outline text="&apos;(3) APPLICATION-" />
                      <outline text="&apos;(A) IN GENERAL- Each eligible entity desiring a grant under this section shall submit an application to the Assistant Attorney General at such time, in such manner, and accompanied by such information as the Assistant Attorney General may reasonably require." />
                      <outline text="&apos;(B) CONTENTS- Each application submitted pursuant to subparagraph (A) shall--" />
                      <outline text="&apos;(i) describe the activities for which assistance under this section is sought; and" />
                      <outline text="&apos;(ii) provide such additional assurances as the Assistant Attorney General determines to be essential to ensure compliance with the requirements of this section." />
                      <outline text="&apos;(4) EVALUATION- The Assistant Attorney General shall enter into a contract with an academic or non-profit organization that has experience in issues related to sex trafficking of minors and evaluation of grant programs to conduct an annual evaluation of each grant made under this section to determine the impact and effectiveness of programs funded with the grant." />
                      <outline text="&apos;(c) Mandatory Exclusion- An eligible entity that receives a grant under this section that is found to have utilized grant funds for any unauthorized expenditure or otherwise unallowable cost shall not be eligible for any grant funds awarded under the grant for 2 fiscal years following the year in which the unauthorized expenditure or unallowable cost is reported." />
                      <outline text="&apos;(d) Compliance Requirement- An eligible entity shall not be eligible to receive a grant under this section if, during the 5 fiscal years before the eligible entity submits an application for the grant, the eligible entity has been found to have violated the terms or conditions of a Government grant program by utilizing grant funds for unauthorized expenditures or otherwise unallowable costs." />
                      <outline text="&apos;(e) Administrative Cap- The cost of administering the grants authorized by this section shall not exceed 3 percent of the total amount appropriated to carry out this section." />
                      <outline text="&apos;(f) Audit Requirement- For fiscal years 2016 and 2017, the Inspector General of the Department of Justice shall conduct an audit of all 4 eligible entities that receive block grants under this section." />
                      <outline text="&apos;(g) Match Requirement- An eligible entity that receives a grant under this section shall provide a non-Federal match in an amount equal to not less than--" />
                      <outline text="&apos;(1) 15 percent of the grant during the first year;" />
                      <outline text="&apos;(2) 25 percent of the grant during the first renewal period;" />
                      <outline text="&apos;(3) 40 percent of the grant during the second renewal period; and" />
                      <outline text="&apos;(4) 50 percent of the grant during the third renewal period." />
                      <outline text="&apos;(h) No Limitation on Section 204 Grants- An entity that applies for a grant under section 204 is not prohibited from also applying for a grant under this section." />
                      <outline text="&apos;(i) Authorization of Appropriations- There are authorized to be appropriated $8,000,000 to the Attorney General for each of the fiscal years 2014 through 2017 to carry out this section." />
                      <outline text="&apos;(j) GAO Evaluation- Not later than 30 months after the date of the enactment of this Act, the Comptroller General of the United States shall submit a report to Congress that contains--" />
                      <outline text="&apos;(1) an evaluation of the impact of this section in aiding minor victims of sex trafficking in the jurisdiction of the entity receiving the grant; and" />
                      <outline text="&apos;(2) recommendations, if any, regarding any legislative or administrative action the Comptroller General determines appropriate.&apos;." />
                      <outline text="(b) Sunset Provision- The amendment made by subsection (a) shall be effective during the 4-year period beginning on the date of the enactment of this Act." />
                      <outline text="SEC. 1242. EXPANDING LOCAL LAW ENFORCEMENT GRANTS FOR INVESTIGATIONS AND PROSECUTIONS OF TRAFFICKING." />
                      <outline text="Section 204 of the Trafficking Victims Protection Reauthorization Act of 2005 (42 U.S.C. 14044c) is amended--" />
                      <outline text="(1) in subsection (a)(1)--" />
                      <outline text="(A) in subparagraph (A), by striking &apos;, which involve United States citizens, or aliens admitted for permanent residence, and&apos;;" />
                      <outline text="(B) by redesignating subparagraphs (B), (C), and (D) as subparagraphs (C), (D), and (E), respectively; and" />
                      <outline text="(C) by inserting after subparagraph (A) the following:" />
                      <outline text="&apos;(B) to train law enforcement personnel how to identify victims of severe forms of trafficking in persons and related offenses;&apos;; and" />
                      <outline text="(D) in subparagraph (C), as redesignated, by inserting &apos;and prioritize the investigations and prosecutions of those cases involving minor victims&apos; after &apos;sex acts&apos;;" />
                      <outline text="(2) by redesignating subsection (d) as subsection (e);" />
                      <outline text="(3) by inserting after subsection (c) the following:" />
                      <outline text="&apos;(d) No Limitation on Section 202 Grant Applications- An entity that applies for a grant under section 202 is not prohibited from also applying for a grant under this section.&apos;;" />
                      <outline text="(4) in subsection (e), as redesignated, by striking &apos;$20,000,000 for each of the fiscal years 2008 through 2011&apos; and inserting &apos;$10,000,000 for each of the fiscal years 2014 through 2017&apos;; and" />
                      <outline text="(5) by adding at the end the following:" />
                      <outline text="&apos;(f) GAO Evaluation and Report- Not later than 30 months after the date of enactment of this Act, the Comptroller General of the United States shall conduct a study of and submit to Congress a report evaluating the impact of this section on--" />
                      <outline text="&apos;(1) the ability of law enforcement personnel to identify victims of severe forms of trafficking in persons and investigate and prosecute cases against offenders, including offenders who engage in the purchasing of commercial sex acts with a minor; and" />
                      <outline text="&apos;(2) recommendations, if any, regarding any legislative or administrative action the Comptroller General determines appropriate to improve the ability described in paragraph (1).&apos;." />
                      <outline text="SEC. 1243. MODEL STATE CRIMINAL LAW PROTECTION FOR CHILD TRAFFICKING VICTIMS AND SURVIVORS." />
                      <outline text="Section 225(b) of the Trafficking Victims Reauthorization Act of 2008 (22 U.S.C. 7101 note) is amended--" />
                      <outline text="(1) in paragraph (1), by striking &apos;and&apos; at the end;" />
                      <outline text="(2) by redesignating paragraph (2) as paragraph (3); and" />
                      <outline text="(3) by inserting after paragraph (1) the following:" />
                      <outline text="&apos;(2) protects children exploited through prostitution by including safe harbor provisions that--" />
                      <outline text="&apos;(A) treat an individual under 18 years of age who has been arrested for engaging in, or attempting to engage in, a sexual act with another person in exchange for monetary compensation as a victim of a severe form of trafficking in persons;" />
                      <outline text="&apos;(B) prohibit the charging or prosecution of an individual described in subparagraph (A) for a prostitution offense;" />
                      <outline text="&apos;(C) require the referral of an individual described in subparagraph (A) to appropriate service providers, including comprehensive service or community-based programs that provide assistance to child victims of commercial sexual exploitation; and" />
                      <outline text="&apos;(D) provide that an individual described in subparagraph (A) shall not be required to prove fraud, force, or coercion in order to receive the protections described under this paragraph;&apos;." />
                      <outline text="Subtitle C--Authorization of Appropriations" />
                      <outline text="SEC. 1251. ADJUSTMENT OF AUTHORIZATION LEVELS FOR THE TRAFFICKING VICTIMS PROTECTION ACT OF 2000." />
                      <outline text="The Trafficking Victims Protection Act of 2000 (22 U.S.C. 7101 et seq.) is amended--" />
                      <outline text="(1) in section 112A(b)(4) (22 U.S.C. 7109a(b)(4))--" />
                      <outline text="(A) by striking &apos;$2,000,000&apos; and inserting &apos;$1,000,000&apos;; and" />
                      <outline text="(B) by striking &apos;2008 through 2011&apos; and inserting &apos;2014 through 2017&apos;; and" />
                      <outline text="(2) in section 113 (22 U.S.C. 7110)--" />
                      <outline text="(A) subsection (a)--" />
                      <outline text="(i) by striking &apos;$5,500,000 for each of the fiscal years 2008 through 2011&apos; each place it appears and inserting &apos;$2,000,000 for each of the fiscal years 2014 through 2017&apos;;" />
                      <outline text="(ii) by inserting &apos;, including regional trafficking in persons officers,&apos; after &apos;for additional personnel,&apos;; and" />
                      <outline text="(iii) by striking &apos;, and $3,000 for official reception and representation expenses&apos;;" />
                      <outline text="(B) in subsection (b)--" />
                      <outline text="(i) in paragraph (1), by striking &apos;$12,500,000 for each of the fiscal years 2008 through 2011&apos; and inserting &apos;$14,500,000 for each of the fiscal years 2014 through 2017&apos;; and" />
                      <outline text="(ii) in paragraph (2), by striking &apos;to the Secretary of Health and Human Services&apos; and all that follows and inserting &apos;$8,000,000 to the Secretary of Health and Human Services for each of the fiscal years 2014 through 2017.&apos;;" />
                      <outline text="(C) in subsection (c)(1)--" />
                      <outline text="(i) in subparagraph (A), by striking &apos;2008 through 2011&apos; each place it appears and inserting &apos;2014 through 2017&apos;;" />
                      <outline text="(ii) in subparagraph (B)--" />
                      <outline text="(I) by striking &apos;$15,000,000 for fiscal year 2003 and $10,000,000 for each of the fiscal years 2008 through 2011&apos; and inserting &apos;$10,000,000 for each of the fiscal years 2014 through 2017&apos;; and" />
                      <outline text="(II) by striking &apos;2008 through 2011&apos; and inserting &apos;2014 through 2017&apos;; and" />
                      <outline text="(iii) in subparagraph (C), by striking &apos;2008 through 2011&apos; and inserting &apos;2014 through 2017&apos;;" />
                      <outline text="(D) in subsection (d)--" />
                      <outline text="(i) by redesignating subparagraphs (A) through (C) as paragraphs (1) through (3), respectively, and moving such paragraphs 2 ems to the left;" />
                      <outline text="(ii) in the paragraph (1), as redesignated, by striking &apos;$10,000,000 for each of the fiscal years 2008 through 2011&apos; and inserting &apos;$11,000,000 for each of the fiscal years 2014 through 2017&apos;; and" />
                      <outline text="(iii) in paragraph (3), as redesignated, by striking &apos;to the Attorney General&apos; and all that follows and inserting &apos;$11,000,000 to the Attorney General for each of the fiscal years 2014 through 2017.&apos;;" />
                      <outline text="(E) in subsection (e)--" />
                      <outline text="(i) in paragraph (1), by striking &apos;$15,000,000 for each of the fiscal years 2008 through 2011&apos; and inserting &apos;$7,500,000 for each of the fiscal years 2014 through 2017&apos;; and" />
                      <outline text="(ii) in paragraph (2), by striking &apos;$15,000,000 for each of the fiscal years 2008 through 2011&apos; and inserting &apos;$7,500,000 for each of the fiscal years 2014 through 2017&apos;;" />
                      <outline text="(F) in subsection (f), by striking &apos;$10,000,000 for each of the fiscal years 2008 through 2011&apos; and inserting &apos;$5,000,000 for each of the fiscal years 2014 through 2017&apos;; and" />
                      <outline text="(G) in subsection (i), by striking &apos;$18,000,000 for each of the fiscal years 2008 through 2011&apos; and inserting &apos;$10,000,000 for each of the fiscal years 2014 through 2017&apos;." />
                      <outline text="SEC. 1252. ADJUSTMENT OF AUTHORIZATION LEVELS FOR THE TRAFFICKING VICTIMS PROTECTION REAUTHORIZATION ACT OF 2005." />
                      <outline text="The Trafficking Victims Protection Reauthorization Act of 2005 (Public Law 109-164) is amended--" />
                      <outline text="(1) by striking section 102(b)(7); and" />
                      <outline text="(2) in section 201(c)(2), by striking &apos;$1,000,000 for each of the fiscal years 2008 through 2011&apos; and inserting &apos;$250,000 for each of the fiscal years 2014 through 2017&apos;." />
                      <outline text="Subtitle D--Unaccompanied Alien Children" />
                      <outline text="SEC. 1261. APPROPRIATE CUSTODIAL SETTINGS FOR UNACCOMPANIED MINORS WHO REACH THE AGE OF MAJORITY WHILE IN FEDERAL CUSTODY." />
                      <outline text="Section 235(c)(2) of the William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008 (8 U.S.C. 1232(c)(2)) is amended--" />
                      <outline text="(1) by striking &apos;Subject to&apos; and inserting the following:" />
                      <outline text="&apos;(A) MINORS IN DEPARTMENT OF HEALTH AND HUMAN SERVICES CUSTODY- Subject to&apos;; and" />
                      <outline text="(2) by adding at the end the following:" />
                      <outline text="&apos;(B) ALIENS TRANSFERRED FROM DEPARTMENT OF HEALTH AND HUMAN SERVICES TO DEPARTMENT OF HOMELAND SECURITY CUSTODY- If a minor described in subparagraph (A) reaches 18 years of age and is transferred to the custody of the Secretary of Homeland Security, the Secretary shall consider placement in the least restrictive setting available after taking into account the alien&apos;s danger to self, danger to the community, and risk of flight. Such aliens shall be eligible to participate in alternative to detention programs, utilizing a continuum of alternatives based on the alien&apos;s need for supervision, which may include placement of the alien with an individual or an organizational sponsor, or in a supervised group home.&apos;." />
                      <outline text="SEC. 1262. APPOINTMENT OF CHILD ADVOCATES FOR UNACCOMPANIED MINORS." />
                      <outline text="Section 235(c)(6) of the William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008 (8 U.S.C. 1232(c)(6)) is amended--" />
                      <outline text="(1) by striking &apos;The Secretary&apos; and inserting the following:" />
                      <outline text="&apos;(A) IN GENERAL- The Secretary&apos;; and" />
                      <outline text="(2) by striking &apos;and criminal&apos;; and" />
                      <outline text="(3) by adding at the end the following:" />
                      <outline text="&apos;(B) APPOINTMENT OF CHILD ADVOCATES-" />
                      <outline text="&apos;(i) INITIAL SITES- Not later than 2 years after the date of the enactment of the Violence Against Women Reauthorization Act of 2013, the Secretary of Health and Human Services shall appoint child advocates at 3 new immigration detention sites to provide independent child advocates for trafficking victims and vulnerable unaccompanied alien children." />
                      <outline text="&apos;(ii) ADDITIONAL SITES- Not later than 3 years after the date of the enactment of the Violence Against Women Reauthorization Act of 2013, the Secretary shall appoint child advocates at not more than 3 additional immigration detention sites." />
                      <outline text="&apos;(iii) SELECTION OF SITES- Sites at which child advocate programs will be established under this subparagraph shall be located at immigration detention sites at which more than 50 children are held in immigration custody, and shall be selected sequentially, with priority given to locations with--" />
                      <outline text="&apos;(I) the largest number of unaccompanied alien children; and" />
                      <outline text="&apos;(II) the most vulnerable populations of unaccompanied children." />
                      <outline text="&apos;(C) RESTRICTIONS-" />
                      <outline text="&apos;(i) ADMINISTRATIVE EXPENSES- A child advocate program may not use more that 10 percent of the Federal funds received under this section for administrative expenses." />
                      <outline text="&apos;(ii) NONEXCLUSIVITY- Nothing in this section may be construed to restrict the ability of a child advocate program under this section to apply for or obtain funding from any other source to carry out the programs described in this section." />
                      <outline text="&apos;(iii) CONTRIBUTION OF FUNDS- A child advocate program selected under this section shall contribute non-Federal funds, either directly or through in-kind contributions, to the costs of the child advocate program in an amount that is not less than 25 percent of the total amount of Federal funds received by the child advocate program under this section. In-kind contributions may not exceed 40 percent of the matching requirement under this clause." />
                      <outline text="&apos;(D) ANNUAL REPORT TO CONGRESS- Not later than 1 year after the date of the enactment of the Violence Against Women Reauthorization Act of 2013, and annually thereafter, the Secretary of Health and Human Services shall submit a report describing the activities undertaken by the Secretary to authorize the appointment of independent Child Advocates for trafficking victims and vulnerable unaccompanied alien children to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives." />
                      <outline text="&apos;(E) ASSESSMENT OF CHILD ADVOCATE PROGRAM-" />
                      <outline text="&apos;(i) IN GENERAL- As soon as practicable after the date of the enactment of the Violence Against Women Reauthorization Act of 2013, the Comptroller General of the United States shall conduct a study regarding the effectiveness of the Child Advocate Program operated by the Secretary of Health and Human Services." />
                      <outline text="&apos;(ii) MATTERS TO BE STUDIED- In the study required under clause (i), the Comptroller General shall-- collect information and analyze the following:" />
                      <outline text="&apos;(I) analyze the effectiveness of existing child advocate programs in improving outcomes for trafficking victims and other vulnerable unaccompanied alien children;" />
                      <outline text="&apos;(II) evaluate the implementation of child advocate programs in new sites pursuant to subparagraph (B);" />
                      <outline text="&apos;(III) evaluate the extent to which eligible trafficking victims and other vulnerable unaccompanied children are receiving child advocate services and assess the possible budgetary implications of increased participation in the program;" />
                      <outline text="&apos;(IV) evaluate the barriers to improving outcomes for trafficking victims and other vulnerable unaccompanied children; and" />
                      <outline text="&apos;(V) make recommendations on statutory changes to improve the Child Advocate Program in relation to the matters analyzed under subclauses (I) through (IV)." />
                      <outline text="&apos;(iii) GAO REPORT- Not later than 3 years after the date of the enactment of this Act, the Comptroller General of the United States shall submit the results of the study required under this subparagraph to--" />
                      <outline text="&apos;(I) the Committee on the Judiciary of the Senate;" />
                      <outline text="&apos;(II) the Committee on Health, Education, Labor, and Pensions of the Senate;" />
                      <outline text="&apos;(III) the Committee on the Judiciary of the House of Representatives; and" />
                      <outline text="&apos;(IV) the Committee on Education and the Workforce of the House of Representatives." />
                      <outline text="&apos;(F) AUTHORIZATION OF APPROPRIATIONS- There are authorized to be appropriated to the Secretary and Human Services to carry out this subsection--" />
                      <outline text="&apos;(i) $1,000,000 for each of the fiscal years 2014 and 2015; and" />
                      <outline text="&apos;(ii) $2,000,000 for each of the fiscal years 2016 and 2017.&apos;." />
                      <outline text="SEC. 1263. ACCESS TO FEDERAL FOSTER CARE AND UNACCOMPANIED REFUGEE MINOR PROTECTIONS FOR CERTAIN U VISA RECIPIENTS." />
                      <outline text="Section 235(d)(4) of the William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008 (8 U.S.C. 1232(d)(4)) is amended--" />
                      <outline text="(1) in subparagraph (A)," />
                      <outline text="(A) by striking &apos;either&apos;;" />
                      <outline text="(B) by striking &apos;or who&apos; and inserting a comma; and" />
                      <outline text="(C) by inserting &apos;, or has been granted status under section 101(a)(15)(U) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(15)(U)),&apos; before &apos;, shall be eligible&apos;; and" />
                      <outline text="(2) in subparagraph (B), by inserting &apos;, or status under section 101(a)(15)(U) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(15)(U)),&apos; after &apos;(8 U.S.C. 1101(a)(27)(J))&apos;." />
                      <outline text="SEC. 1264. GAO STUDY OF THE EFFECTIVENESS OF BORDER SCREENINGS." />
                      <outline text="(a) Study-" />
                      <outline text="(1) IN GENERAL- The Comptroller General of the United States shall conduct a study examining the effectiveness of screenings conducted by Department of Homeland Security personnel in carrying out section 235(a)(4) of the William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008 (8 U.S.C. 1232(a)(4))." />
                      <outline text="(2) STUDY- In carrying out paragraph (1), the Comptroller General shall take into account--" />
                      <outline text="(A) the degree to which Department of Homeland Security personnel are adequately ensuring that--" />
                      <outline text="(i) all children are being screened to determine whether they are described in section 235(a)(2)(A) of the William Wilberforce Trafficking Victims Protection Reauthorization Act;" />
                      <outline text="(ii) appropriate and reliable determinations are being made about whether children are described in section 235(a)(2)(A) of such Act, including determinations of the age of such children;" />
                      <outline text="(iii) children are repatriated in an appropriate manner, consistent with clauses (i) through (iii) of section 235(a)(2)(C) of such Act;" />
                      <outline text="(iv) children are appropriately being permitted to withdraw their applications for admission, in accordance with section 235(a)(2)(B)(i) of such Act;" />
                      <outline text="(v) children are being properly cared for while they are in the custody of the Department of Homeland Security and awaiting repatriation or transfer to the custody of the Secretary of Health and Human Services; and" />
                      <outline text="(vi) children are being transferred to the custody of the Secretary of Health and Human Services in a manner that is consistent with such Act; and" />
                      <outline text="(B) the number of such children that have been transferred to the custody of the Department of Health and Human Services, the Federal funds expended to maintain custody of such children, and the Federal benefits available to such children, if any." />
                      <outline text="(3) ACCESS TO DEPARTMENT OF HOMELAND SECURITY OPERATIONS-" />
                      <outline text="(A) IN GENERAL- Except as provided in subparagraph (B), for the purposes of conducting the study described in subsection (a), the Secretary shall provide the Comptroller General with unrestricted access to all stages of screenings and other interactions between Department of Homeland Security personnel and children encountered by the Comptroller General." />
                      <outline text="(B) EXCEPTIONS- The Secretary shall not permit unrestricted access under subparagraph (A) if the Secretary determines that the security of a particular interaction would be threatened by such access." />
                      <outline text="(b) Report to Congress- Not later than 2 years after the date of the commencement of the study described in subsection (a), the Comptroller General of the United States shall submit a report to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives that contains the Commission&apos;s findings and recommendations." />
                      <outline text="Speaker of the House of Representatives." />
                      <outline text="Vice President of the United States and" />
                      <outline text="President of the Senate." />
              </outline>

              <outline text="House Passes Violence Against Women Act">
                      <outline text="Link to Article" type="link" url="http://occupyamerica.crooksandliars.com/diane-sweet/house-passes-violence-against-women" />        <outline text="Source: Crooks and Liars" type="link" url="http://feeds.feedburner.com/crooksandliars/YaCP" />
      <outline text="Fri, 01 Mar 2013 15:14" />
                      <outline text="" />
                      <outline text="Rep. Debbie Wasserman Schultz (D-FL) spoke on the House floor Thursday, urging colleagues to vote for the version of VAWA passed by the Senate that protects all victims of domestic violence and sexual assault." />
                      <outline text="In what House Minority Whip Steny Hoyer (D-Maryland) called &apos;&apos;probably the first positive act we&apos;ve taken this Congress,&apos;&apos; House Democrats joined with 87 Republicans to reauthorize the Violence Against Women Act on Thursday. The bill will grant more than $650 million over five years to states and local governments to provide transitional housing, legal advice, and other services to victims. VAWA will also include protections for immigrants and LGBT people, and grants Native American tribal courts the authority to prosecute non-American Indians." />
                      <outline text="Via:" />
                      <outline text="The bill, which was passed by the Senate earlier this month, is aimed at protecting women against domestic violence. It will grant more than $650 million over five years to states and local governments to provide services such as transitional housing and legal advice to victims. It will now go to President Barack Obama who is expected to sign it into law." />
                      <outline text="House Republicans did object to the fact that the bill includes a provision that allows Native American authorities to prosecute non-American Indians in tribal courts. It also includes protections for immigrants and lesbian, gay, bisxual and transgender people." />
                      <outline text="Rep. Trey Gowdy (R-SC), head of the House immigration subcommittee, was one of 138 Republicans to vote against the bill. In the end, 286 lawmakers voted in favor, including 87 Republicans and every Democrat. Gowdy called the vote &quot;constitutionally suspect&quot; in a statement." />
                      <outline text="&quot;I appreciate the work of prosecutors, law enforcement officers, victims&apos; advocates and service providers,&quot; he said. &quot;They deserve better, and the victims of domestic violence deserve better, than a patently unconstitutional bill.&quot;" />
                      <outline text="House Republicans had previously introduced a more limited version of the act, but it was voted down Thursday before the vote on the Senate bill." />
                      <outline text="ABC/Univision broke down the details of that bill earlier this month after it passed the Senate. Click here to read that report." />
                      <outline text="Here&apos;s the yes and no vote tally, as well as those who couldn&apos;t be bothered to show up at all." />
              </outline>

              <outline text="Sequester railroads Biden&apos;s pricey plane travel">
                      <outline text="Link to Article" type="link" url="http://www.foxnews.com/politics/2013/02/28/sequester-railroads-bidens-pricey-plane-travel/" />      <outline text="Fri, 01 Mar 2013 15:13" />
                      <outline text="" />
                      <outline text="Feb. 27, 2013: Vice President Biden gestures as he speaks at the Winter-Spring meeting of the National Association of Attorneys General.AP" />
                      <outline text="As the federal budget goes off the rails, Joe Biden&apos;s getting back on -- with Amtrak." />
                      <outline text="The looming sequester is forcing the veep to once again take the train -- as opposed to military aircraft -- to his weekend trips home to Delaware." />
                      <outline text="Biden said Wednesday he initiated the change, calling it the one thing about the sequester that&apos;s working to his &quot;benefit.&quot;" />
                      <outline text="Speaking at the National Association of Attorneys General, Biden said that while he took nearly 8,000 train trips as senator, the Secret Service made him travel by air because the Amtrak &quot;gives too many opportunities for people to interact with me in a way they wouldn&apos;t like to see.&quot;  " />
                      <outline text="But because of the looming budget cuts, Biden said: &quot;I was able to say, &apos;Look guys, I&apos;ve got to take the train now -- it&apos;s cheaper than flying.&apos; So I get to take the train again.&quot;" />
                      <outline text="The plane trips to Delaware cost tens of thousands of dollars each, according to published reports." />
                      <outline text="Multiple sources confirmed the vice president&apos;s plans." />
                      <outline text="&quot;AF2 is grounded for weekend trips starting Friday,&quot; one source said, referring to the pricey military plane Biden uses most weekends to travel home, often to play golf at Fieldstone Golf Club, a private club. Biden also occasionally flies by military plane to Delaware during the week." />
                      <outline text="&quot;He&apos;ll start taking the train again this weekend when the sequestration starts. It&apos;s a huge expense to be taking the military flights,&quot; a source said. &quot;So now it&apos;s back to &apos;regular Joe.&quot;" />
                      <outline text="And by &quot;regular Joe,&quot; that means first-class seats, nowhere near the quiet car. Those familiar with the veep&apos;s travel history say Biden would pass some of the one-hour, 18-minute trip from D.C. to Wilmington, Del., reading the paper or reviewing work materials." />
                      <outline text="But mostly he just talks, a source said. A lot. And poses for photos." />
                      <outline text="&quot;He just walks around shaking hands posing for pics,&quot; said the source. &quot;He talks to everyone and anyone, and doesn&apos;t sit still.&quot;" />
              </outline>

              <outline text="Radiotelegrafia - Imparare il CW">
                      <outline text="Link to Article" type="link" url="http://www.qsl.net/ik0ygj/enu/rt_imparare.html" />      <outline text="Fri, 01 Mar 2013 11:50" />
                      <outline text="" />
                      <outline text="In this phase, we concentrate only on receiving.Start using a software, preferably Super Morse gradually introducing the following groups:ETANIMDSOURCKPBGWLQHFYZVXJ1234567890" />
                      <outline text="Keep training in daily essions of 10-15 minutes, not more. Start from 10 WPM as a minimumm when you are able to copy all the characters in a group, go to the next group.When you learn all groups, go to phase 2.Phase 1 takes an average of one month: please keep in mind to follow your natural speed and inclination. There is no hurry, its just a game !2. Speed up to 20WPM copying with paper and pencil.Ok, now you are ready to purchase your first telegraph key.Go to eBay and get a Lionel J-38 straight key: it is cheap and is a very good value for the money.Use a PC to transmit groups of characters, receive them for 5 minutes and, then, re-transmit the groups with your straight key trying to repeat exactly the same time and spacing.When you are able to copy 90% of the characters, speed-up of 1 WPM up to 20 WPM (click here to download a 20 WPM sample QSO 800 kB mp3).Go on air, now you are ready !  Do not be ashamed to ask for QRS (even if you should not even ask for it: a real RT knows when a QRS is needed ...).Keep this phase as long as possible e.g: one year or so, since this phase is crucial to achieve the correct timing and spacing that will be vital for the subsequent phase and, if you wish so, it will save you a lot of pain when changing kind of telegraph key." />
                      <outline text="In this phase, add the following characters:" />
                      <outline text="Special Chars?..--..,--..--:---.....-.-.-=-....-/-..-.&apos;.----.This phase is tough, most people occurr in several difficulties such as:Plateu: at 15 WPM you will be struggling to increase speed. Don&apos;t worry, its a natural brain resistence. Keep trying until you unlock the plateau. You will be finding several plateaus, typically at 15, 20, 30, 40 WPM. Once unblocked a plateau you will be speeding up at a rather fast pace until you reach the next plateau.Sense of regressing: mosty in transmitting, from time to time you will find to operate really badly. It is a very good thing: you are unblocking a plateau and you are ready to jump to a new level. Try relaxing a bit and reduce your training sessions, one morning you will find that you are able to copy and send 20% faster than before.3. Speed bosting: abandoning paper and pencil.At 20WPM, you will find that it is impossible to write everything on paper and you need to abandon this way of copying CW.This step is rather delicate and time-consuming.Don&apos;t worry: keep training and QSOing, time will give you all that you need.Some hints and tips:At these speed, you need to learn the sound of the most common words.Convert them in MP3 using a software like Koch from G4FON playing a plain text for you.Practice, Practice, Practice.Increase length and frequency of your training sessions.Receive CW at high speed (25-30 WPM) while doing other things such as house works or driving a car. Do not force yourself to copy CW, simply get exposed to it.Relax, do not even think to succeed. Just hear the sound of CW.Fix a target (e.g. become an HSC member). Read the bible of CW: The Art &amp; Skill of Radiotelegraphy by N0HFF.Consider the opportunity to switch to a paddle or a bug.Transimt and receive at same speed.In this phase, all the timing and spacing problem you will be having accumulated will come back to you. That&apos;s why you need to pass more time than possible in phase 2.Remember: accuracy trascends speed - be stylish with CW, go slow and be precise.From time to time, find a friend with whom you might train for QRQ." />
              </outline>

              <outline text="BBC News - Bitcoin virtual currency reaches all-time high price">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/technology-21601608" />      <outline text="Fri, 01 Mar 2013 04:19" />
                      <outline text="" />
                      <outline text="28 February 2013Last updated at10:13 ETThe value of virtual currency Bitcoin has reached an all-time high, trading at more than $33 (&#163;22)." />
                      <outline text="Its appreciation - up from just $2 in November 2011 - has been attributed to increased trust in security efforts." />
                      <outline text="The surge coincided with Japan-based MT Gox, Bitcoin&apos;s biggest exchange, announcing a tie-up with US firm CoinLab to bring its operations to the States." />
                      <outline text="However, recent high-profile thefts continue to worry some investors." />
                      <outline text="In September last year, 24,000 Bitcoins - which at the time were worth &#163;157,800 - were stolen from another large exchange, Bitfloor." />
                      <outline text="In June 2011, a huge instance of fraud led to a market crash, with the value of Bitcoins at one point plummeting to almost zero." />
                      <outline text="But since then the currency has steadied somewhat, thanks in part to adoption by key websites such as Reddit and Kim Dotcom&apos;s file storage site Mega." />
                      <outline text="Other reasons given for the rise in value include the popularity of gambling websites accepting the currency. Bitcoin casinos have been reported to be bringing in about $500,000 (&#163;330,000) profit every six months - with more growth expected." />
                      <outline text="&apos;Light years ahead&apos;Unlike other currencies, Bitcoins are not issued by a central bank or other centralised authority. Instead they are created in a process called &quot;mining&quot;, in which coins are issued to a user when they solve a complicated mathematical problem using their computer." />
                      <outline text="Part of the attraction is they can be used to make transactions that are difficult to trace, offering privacy to their users, and the currency has been adopted by Wikileaks and other sites to receive donations." />
                      <outline text="Bitcoins can also be exchanged for &quot;real&quot; money - the value of which is tracked by services like Mt Gox." />
                      <outline text="Mt Gox&apos;s move to the States was announced in a statement from Peter Vessenes, chief executive of CoinLab, the firm that will administer the exchange in the US, in partnership with Silicon Valley Bank." />
                      <outline text="&quot;There are two major difficulties Bitcoin exchange customers have traditionally faced: banking troubles for the underlying exchange, and security of their coins,&quot; he said." />
                      <outline text="&quot;When our team discussed how to tackle these issues in the US, it seemed clear that Mt Gox had by far the best security record in the Bitcoin exchange landscape." />
                      <outline text="&quot;After I personally came to Japan and audited their fraud and security procedures, I understood why - they are light years ahead of other exchanges at this stuff - the fraud and security experience (some of it hard-won) they bring to the table is incredibly impressive.&quot;" />
              </outline>
      </body>
  </opml>