SECRET – Unveiled by Cryptome – US Bureau of Prisons Location Maps

US Bureau of Prisons Location Maps

 


http://www.bop.gov/locations/locationmap.jsp
Maps of Facilities

 

North Eastern Region Mid Atlantic Region South Eastern Region South Central Region North Central Region Western Region Western Region Western Region Central Office

Please select a region of the map to view facilities in that area; you can then access information specific to an institution or office.

If you would like more information on a facility, contact the facility directly.

Western Region Locations

Legend: Institution Correctional Complex Regional Office
CCM Office   Private Facility

Link to CCM Phoenix Page Link to FCI Phoenix Page Link to FCI Phoenix Page Link to CCM Phoenix Page Link to FCC Tuscon Page Link to FCI Safford Page Link to FCC Victorville Page Link to FCC Victorville Page Link to MCC San Diego Page Link to CCM Long Beach Page Link to Terminal Isl Page Link to MDC Los Angeles Page Link to FCC Lompoc Page Link to CI Taft Page Link to CI Taft Page Link to FDC Seatac Page Link to CCM Seattle Page Link to FCI Sheridan Page Link to CCM Salt Lake City Page Link to FCI Herlong Page Link to CCM Sacramento Page Link to USP Atwater Page Link to FCI Dublin Page Link to FCI Mendota Page Link to Western Regional Office Page Link to FDC Honolulu

 

North Central Region Locations

South Central Region Locations

Northeast Region Locations

Mid-Atlantic Region Locations

Southeast Region Locations

Legend: Institution Correctional Complex Regional Office
CCM Office   Private Facility   Training Center

Link to Southeast Regional Office Page Link to FCI Aliceville Page Link to USP Atlanta Page Link to CCM Atlanta Page Link to FCI Marianna Page Link to FPC Pensacola Page Link to FCI Bennettsville Page Link to FCI Williamsburg Page Link to FCI Edgefield Page Link to FCI Miami Page Link to CCM Miami Page Link to FDC Miami Page Link to CCM Orlando Page Link to MDC Guaynabo Page Link to FCC Coleman Page Link to FCI Tallahassee Page Link to STA Glynco Page Link to FCI Jesup Page Link to FCI Estill Page Link to CI McRae Page Link to FCI Talladega Page Link to CCM Montgomery Page Link to FPC Montgomery Page Link to FCC Yazoo City Page Link to CI Adams County Page Link to CI D. Ray James Page

 

 



PI – IARPA Office of Incisive Analysis Broad Agency Announcement

https://publicintelligence.net/wp-content/uploads/2013/02/IARPA-IncisiveAnalysis.png

 

Broad Agency Announcement Incisive Analysis

  • IARPA-BAA-13-02
  • 20 pages
  • January 14, 2013

Download

IARPA invests in high-risk, high-payoff research that has the potential to provide our nation with an overwhelming intelligence advantage over future adversaries. This research is parsed among three Offices: Smart Collection, Incisive Analysis, and Safe & Secure Operations. This BAA solicits abstracts/proposals for the Office of Incisive Analysis (IA).

IA focuses on maximizing insights from the massive, disparate, unreliable and dynamic data that are – or could be – available to analysts, in a timely manner. We are pursuing new sources of information from existing and novel data, and developing innovative techniques that can be utilized in the processes of analysis. IA programs are in diverse technical disciplines, but have common features: (a) Create technologies that can earn the trust of the analyst user by providing the reasoning for results; (b) Address data uncertainty and provenance explicitly.

The following topics (in no particular order) are of interest to IA:

  • Methods for developing understanding of how knowledge and ideas are transmitted and change within groups, organizations, and cultures;
  • Methods for analysis of social, cultural, and linguistic data;
  • Multidisciplinary approaches to assessing linguistic data sets;
  • Methods for measuring and improving human judgment and human reasoning;
  • Methods for extraction and representation of the information in the non-textual contents of documents, including figures, diagrams, and tables;
  • Methods for understanding and managing massive, dynamic data;
  • Analysis of massive, unreliable, and diverse data;
  • Methods for assessments of relevancy and reliability of new data;
  • Methods for understanding the process of analysis and potential impacts of technology;
  • Multidisciplinary approaches to processing noisy audio and speech;
  • Development of novel top-down models of visual perception and visual cognition;
  • Methods for analysis of significant societal events;
  • Methods for estimation and communication of uncertainty and risk;
  • Novel approaches for mobile augmented reality applied to analysis and collection;
  • Methods for topological data analysis and inferences of high-dimensional structures from low-dimensional representations;
  • Methods for the study of algorithms stated in terms of geometry (computational geometry);
  • Methods for geolocation of text and social media;
  • Novel approaches to biosurveillance;
  • Methods to make machine learning more useful and automatic;
  • Methods to construct and evaluate speech recognition systems in languages without a formalized orthography; and,
  • Methods and approaches to quantifiable representations of uncertainty simultaneously accounting for multiple types of uncertainty.

This announcement seeks research ideas for topics that are not addressed by emerging or ongoing IARPA programs or other published IARPA solicitations. It is primarily, but not solely, intended for early stage research that may lead to larger, focused programs through a separate BAA in the future, so periods of performance will generally not exceed 12 months.

Offerors should demonstrate that their proposed effort has the potential to make revolutionary, rather than incremental, improvements to intelligence capabilities. Research that primarily results in evolutionary improvement to the existing state of practice is specifically excluded.

PI SECRET – U.S. Army Traffic Control Point Operations Smart Card February 13, 2013 in U.S. Army

https://publicintelligence.net/wp-content/uploads/2013/02/CALL-TrafficControlPoints.png

 

Center for Army Lessons Learned

  • 2 pages
  • For Official Use Only
  • September 2010
  • 2.93 MB

Download

You may engage the following individuals based on their conduct:

• Persons who are committing hostile acts against Coalition forces (CF).
• Persons who are exhibiting hostile intenttowards CF.

These persons may be engaged subject to the following instructions:

Positive identification (PID) is required prior to engagement. PID is a reasonable certainty that the proposed target is a legitimate military target. If no PID, contact your next higher commander for decision.

Use graduated measures of force. When time and circumstance permit, use the following degrees of graduated force when responding to hostile act/intent:

1. Shout verbal warnings to halt.
2. Show your weapon and demonstrate intentto use it.
3. Block access or detain.
4. Warning shots may be permitted in your operating environment (OE)/area of responsibility (AOR).
5. Fire proportional lethal force.

Do not target or strike anyone who has surrendered or is out of combat due to sickness or wounds.

Do not target or strike hospitals, mosques, churches, shrines, schools, museums, national monuments, any other historical and cultural sites, or civilian populated areas or buildings UNLESS the enemy is using them for military purposes or if necessary for your self-defense.

Do not target or strike Local infrastructure (public works, commercial communication facilities , dams), lines of communication (roads, highways, tunnels, bridges, railways), or economic objects (commercial storage facilities, pipelines) UNLESS necessary for self-defense or if ordered by your commander. If you must fire on these objects, fire to disable and disrupt rather than destroy.

ALWAYS minimize incidental injury, loss of life, and collateral damage.

The use of force, including deadly force, is authorized to
protect the following:

• Yourself, your unit, and other friendly forces.
• Detainees
• Civilians from crimes that are likely to cause death or serious bodily harm, such as murder or rape.
• Designated personnel or property, when such actions are necessary to restore order and security.

In general, WARNING SHOTS are authorized ONLY when the use of deadly force would be authorized in that particular situation.

Treat all civilians and their property with respect and dignity. Do not seize civilian property, including vehicles, unless the property presents a security threat. When possible, give a receipt to the property’s owner.

You may DETAIN civilians based upon a reasonable belief that the person:

• Must be detained for purposes of self-defense.
• Is interfering with CF mission accomplishment.
• Is on a list of persons wanted for questioning, arrest, or detention.
• Is or was engaged in criminal activity.
• Must be detained for imperative reasons of security.

Anyone you detain MUST be protected. Force, up to and including deadly force, is authorized to protect detainees in your custody. You MUST fill out a detainee apprehension card for EVERY person you detain.

Looting and the taking of war trophies are prohibited.

All personnel MUST report any suspected violations of the Law of War committed by any US, friendly, or enemy force. Notify your chain of command, Judge Advocate, IG, Chaplain, or appropriate service-related investigative branch.

TMZ – The Lindsay Lohan Porn Casting Call

 

The Lindsay Lohan Porn Casting Call

 

Vivid Entertainment is the porn company that literally caught FIRE this weekend — but they’re also casting for a parody porn of Lindsay Lohan’s new film because Lohan herself won’t do the gig. Just give her a few weeks.

“Mandiant” – Announcing Mandiant Intelligence Center

Organizations routinely struggle to understand which cyber threats pose the greatest
risk to them. New threats appear in the news daily and create fire drills for
security teams who must quickly determine what they can and should do to protect
themselves. 

Our newest offering, the Mandiant Intelligence Center
<http://app.connect.mandiant.com/e/er?s=2855&lid=239&elq=99b6edb99b004015923dfbfb964a346f>,
draws on our own proprietary intelligence to equip security teams like yours with
the context required to effectively respond to and defend against the most advanced
threat actors. 

With the Mandiant Intelligence Center your security teams can:
*Use tools embedded in the Center to query the Mandiant intelligence database and
receive detailed information on which group is using particular malware, IPs and
domains
*Access detailed profiles of advanced threat groups including their latest tactics,
techniques and procedures
*Obtain detailed context on high profile threat events with analysis on the
potential impact to your organization
*Monitor emerging threat trends

Read more
<http://www.mandiant.com/assets/Mandiant_Intelligence_Center.pdf?elq=99b6edb99b004015923dfbfb964a346f&elqCampaignId=283>
about Mandiant for Security Operations or request a call
<http://app.connect.mandiant.com/e/er?s=2855&lid=235&elq=99b6edb99b004015923dfbfb964a346f>
to receive a demonstration.

""            

Mandiant In The Headlines

January 30, 2013
Hackers in China Attacked The Times for Last 4 Months
<http://app.connect.mandiant.com/e/er?s=2855&lid=236&elq=99b6edb99b004015923dfbfb964a346f>
By Nicole Perlroth – The New York Times 
February 7, 2013
Mandiant, the Go- To Security Firm for Cyber-Espionage Attacks
<http://app.connect.mandiant.com/e/er?s=2855&lid=238&elq=99b6edb99b004015923dfbfb964a346f>
By Brad Stone & Michael Riley – Bloomberg Businessweek 
February 18, 2013
Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
<http://app.connect.mandiant.com/e/er?s=2855&lid=237&elq=99b6edb99b004015923dfbfb964a346f>
By David E. Sanger, David Barboza & Nicole Perlroth – The New York Times 

Learn More About Mandiant®

Mandiant Website
<http://www.mandiant.com/?elq=99b6edb99b004015923dfbfb964a346f&elqCampaignId=283>
www.mandiant.com
M-Unition™
<http://app.connect.mandiant.com/e/er?s=2855&lid=9&elq=99b6edb99b004015923dfbfb964a346f>
Mandiant's official blog
Mandiant on Twitter
<http://app.connect.mandiant.com/e/er?s=2855&lid=10&elq=99b6edb99b004015923dfbfb964a346f>
twitter.com/mandiant
Be Part of Something More
<http://www.mandiant.com/company/careers/?elq=99b6edb99b004015923dfbfb964a346f&elqCampaignId=283>
Join the Mandiant Team

SECRECY NEWS – SENATORS ASK SURVEILLANCE COURT TO SUMMARIZE OPINIONS

Several members of the Senate Intelligence Committee wrote to the Foreign
Intelligence Surveillance Court this month to ask the Court to prepare
summaries of classified opinions that represent significant interpretations
of the Foreign Intelligence Surveillance Act in order to facilitate their
declassification and public release.

Meanwhile, the U.S. Supreme Court ruled that plaintiffs challenging the
constitutionality of the FISA Amendments Act lacked the requisite legal
standing to pursue their case, effectively foreclosing public oversight of
intelligence surveillance through the courts.

The Senate letter, the text of which was not released, stems from an
amendment to the FISA Amendments Act that was introduced by Sen. Jeff
Merkley in December to promote declassification of significant Surveillance
Court opinons.  The Merkley amendment was not adopted -- none of the
legislative proposals to increase accountability were approved -- but
Senate Intelligence Committee chair Sen. Dianne Feinstein promised to work
with Sen. Merkley to advance the declassification of FISC opinions.

"An open and democratic society such as ours should not be governed by
secret laws, and judicial interpretations are as much a part of the law as
the words that make up our statute," said Sen. Merkley at that time. "The
opinions of the FISA Court are controlling. They do matter. When a law is
kept secret, public debate, legislative intent, and finding the right
balance between security and privacy all suffer."

    http://www.fas.org/irp/congress/2012_cr/faa-amend.html

"I wish to address, if I could, what Senator Merkley said in his
comments," said Sen. Feinstein during the December 27 floor debate. "I
listened carefully. What he is saying is opinions of the Foreign
Intelligence Surveillance Court should, in some way, shape or form, be made
public, just as opinions of the Supreme Court or any court are made
available to the public. To a great extent, I find myself in agreement with
that. They should be."

"I have offered to Senator Merkley to write a letter requesting
declassification of more FISA Court opinions," Sen. Feinstein continued.
"[...] When possible, the opinions of the Foreign Intelligence Surveillance
Court should be made available to the public in declassified form. It can
be done, and I think it should be done more often. If the opinion cannot be
made public, hopefully a summary of the opinion can. And I have agreed with
Senator Merkley to work together on this issue."

That letter, signed by Senators Feinstein, Merkley, Ron Wyden and Mark
Udall, has now been sent to the FISA Court, where it awaits an official
response.

Though the letter itself is a modest step, the willingness of
congressional overseers to assert themselves on behalf of public
accountability takes on new importance in light of yesterday's Supreme
Court decision (by a 5-4 vote) to block a constitutional challenge to the
FISA Amendments Act. That decision all but closes the door to public
oversight of the law's implementation through the courts.

    http://www.supremecourt.gov/opinions/12pdf/11-1025_ihdj.pdf

The Court majority insisted that judicial review of government
surveillance activities is alive and well, contrary to the plaintiffs'
assertion.  It is "both legally and factually incorrect" to assert that
surveillance is insulated from judicial review, stated the majority opinion
written by Justice Samuel A. Alito, Jr., who cited the role of the Foreign
Intelligence Surveillance Court in authorizing surveillance activities.

But ACLU attorney Jameel Jaffer said that view "seems to be based on the
theory that the FISA Court may one day, in some as-yet unimagined case,
subject the law to constitutional review, but that day may never come. And
if it does, the proceeding will take place in a court that meets in secret,
doesn't ordinarily publish its decisions, and has limited authority to
consider constitutional arguments. This theory is foreign to the
Constitution and inconsistent with fundamental democratic values," Jaffer
said.

On Monday, Sen. Feinstein paid tribute to L. Christine Healey, a
professional staff member of the Senate Intelligence Committee who is
retiring this week.  For three decades, Ms. Healey has played an
influential role in intelligence oversight as a staffer on the House and
Senate intelligence committees, as well as on the 9/11 Commission.  "She
has been as responsible as anyone for the passage of a string of four
annual intelligence authorization bills, including the fiscal year 2013 act
that was completed in December," said Sen. Feinstein.

Ms. Healey was also credited by Sen. Feinstein as "the principal drafter
of the FISA Amendments Act of 2008."

    http://www.fas.org/irp/congress/2013_cr/healey.html

A PROFILE OF THE 113TH CONGRESS, AND MORE FROM CRS

"The average age of Members of the 113th Congress is among the highest of
any Congress in recent U.S. history," according to a new report from the
Congressional Research Service.  The average age of Members of the House of
Representatives is 57 years, while the average age of Senators is 62 years.

"The overwhelming majority of Members of Congress have a college
education," the CRS found. "The dominant professions of Members are public
service/politics, business, and law. Most Members identify as Christians,
and Protestants collectively constitute the majority religious affiliation.
Roman Catholics account for the largest single religious denomination, and
numerous other affiliations are represented."

One hundred women (a record number) serve in the 113th Congress. There are
43 African American Members, and 38 Hispanic or Latino Members (a record
number) serving. Thirteen Members are Asian American or Pacific Islanders.
There is one Native American serving in the House.

See Membership of the 113th Congress: A Profile, February 20, 2013:

        http://www.fas.org/sgp/crs/misc/R42964.pdf

Other noteworthy new and updated products of the Congressional Research
Service that Congress has not made publicly available include the
following.

Congressional Authority to Limit Military Operations, February 19, 2013:

        http://www.fas.org/sgp/crs/natsec/R41989.pdf

Nuclear Weapons R&D Organizations in Nine Nations, February 22, 2013:

        http://www.fas.org/sgp/crs/nuke/R40439.pdf

Bond v. United States: Validity and Construction of the Federal Chemical
Weapons Statute, February 21, 2013:

        http://www.fas.org/sgp/crs/nuke/R42968.pdf

Arms Control and Nonproliferation: A Catalog of Treaties and Agreements,
February 20, 2013:

        http://www.fas.org/sgp/crs/nuke/RL33865.pdf

Border Security: Understanding Threats at U.S. Borders, February 21, 2013:

        http://www.fas.org/sgp/crs/homesec/R42969.pdf

NAFTA at 20: Overview and Trade Effects, February 21, 2013:

        http://www.fas.org/sgp/crs/row/R42965.pdf

Navy Force Structure and Shipbuilding Plans: Background and Issues for
Congress, February 22, 2013, with new material on the anticipated impact of
sequestration:

        http://www.fas.org/sgp/crs/weapons/RL32665.pdf

Azerbaijan: Recent Developments and U.S. Interests, February 22, 2013:

        http://www.fas.org/sgp/crs/row/97-522.pdf

U.S.-Japan Economic Relations: Significance, Prospects, and Policy
Options, February 20, 2013:

        http://www.fas.org/sgp/crs/row/RL32649.pdf

Egypt: Background and U.S. Relations, February 26, 2013:

        http://www.fas.org/sgp/crs/mideast/RL33003.pdf

_______________________________________________
Secrecy News is written by Steven Aftergood and published by the
Federation of American Scientists.

The Secrecy News Blog is at:
     http://www.fas.org/blog/secrecy/

To SUBSCRIBE to Secrecy News, go to:
     http://www.fas.org/sgp/news/secrecy/subscribe.html

To UNSUBSCRIBE, go to
     http://www.fas.org/sgp/news/secrecy/unsubscribe.html

OR email your request to saftergood@fas.org

Secrecy News is archived at:
     http://www.fas.org/sgp/news/secrecy/index.html

Support the FAS Project on Government Secrecy with a donation:
     http://www.fas.org/member/donate_today.html

_______________________
Steven Aftergood
Project on Government Secrecy
Federation of American Scientists
web:    www.fas.org/sgp/index.html
email:  saftergood@fas.org
voice:  (202) 454-4691
twitter: @saftergood

Whistleblowing on Whistleblowing Oversight – revealed by Cryptome

Whistleblowing on Whistleblowing Oversight

 


[Federal Register Volume 78, Number 38 (Tuesday, February 26, 2013)]
[Notices]
[Pages 13101-13102]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2013-04467]

=======================================================================
-----------------------------------------------------------------------

PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD

[Notice-PCLOB-2013-01; Docket No. 2013-0004; Sequence No. 1]

No FEAR Act Notice; Notice of Rights and Protections Available 
Under Federal Antidiscrimination and Whistleblower Protection Laws

AGENCY: Privacy and Civil Liberties Oversight Board.

ACTION: Notice.

-----------------------------------------------------------------------

SUMMARY: In accordance with the requirements of the Notification and 
Federal Employee Antidiscrimination and Retaliation Act of 2002, the 
Privacy and Civil Liberties Oversight Board is providing notice to its 
employees, former employees, and applicants for Board employment about 
the rights and remedies available to them under the federal anti-
discrimination, whistleblower protection, and retaliation laws.

FOR FURTHER INFORMATION CONTACT: Claire McKenna, Legal Counsel, at 202-
366-0365 or claire.mckenna.pclob@dot.gov.

SUPPLEMENTARY INFORMATION: On May 15, 2002, Congress enacted the 
Notification and Federal Employee Antidiscrimination and Retaliation 
Act of 2002, Public Law 107-174, also known as the No FEAR Act. The Act 
requires that federal agencies provide notice to their employees, 
former employees, and applicants for employment to inform them of the 
rights and protections available under federal anti-discrimination, 
whistleblower protection, and retaliation laws.

Anti-Discrimination Laws

    A federal agency cannot discriminate against an employee or 
applicant with respect to the terms, conditions, or privileges of 
employment on the basis of race, color, religion, sex, national origin, 
age, disability, marital status, or political affiliation. 
Discrimination on these bases is prohibited by one or more of the 
following statutes: 5 U.S.C. 2302(b)(1), 29 U.S.C. 206(d), 29 U.S.C. 
631, 29 U.S.C. 633a, 2 U.S.C. 791, and 42 U.S.C. 2000e-16.
    If you believe that you have been the victim of unlawful 
discrimination on the basis of race, color, religion, sex, national 
origin, or disability, you must contact an Equal Employment Opportunity 
(EEO) counselor within 45 calendar days of the alleged discriminatory 
action, or, in the case of personnel action, within 45 calendar days of 
the effective date of the action, before you can file a formal 
complaint of discrimination with your agency. This timeline may be 
extended by the Board under the circumstances described in 29 CFR 
1614.105(a)(2). If you believe that you have been the victim of 
unlawful discrimination on the basis of age, you must either contact an 
EEO counselor as noted above or give notice of intent to sue to the 
Equal Employment Opportunity Commission (EEOC) within 180 calendar days 
of the alleged discriminatory action. If you are alleging 
discrimination based on marital status or political affiliation, you 
may file a written complaint with the U.S. Office of Special Counsel 
(OSC) (see contact information below). In the alternative (or in some 
cases, in addition), you may pursue a discrimination complaint by 
filing a grievance through the Board's administrative or negotiated 
grievance procedures, if such procedures apply and are available.

Whistleblower Protection Laws

    A federal employee with authority to take, direct others to take, 
recommend, or approve any personnel action must not use that authority 
to take or fail to take, or threaten to take or fail to take, a 
personnel action against an employee or applicant because of disclosure 
of information by that individual that is reasonably believed to 
evidence violations of law, rule, or regulation; gross mismanagement; 
gross waste of funds; an abuse of authority; or a substantial and 
specific danger to public health or safety, unless disclosures of such 
information is specifically prohibited by law and such information is 
specifically required by executive order to be kept secret in the 
interest of national defense or the conduct of foreign affairs.
    Retaliation against an employee or applicant for making a protected 
disclosure is prohibited by 5 U.S.C. 2302(b)(8). If you believe that 
you have been the victim of whistleblower retaliation, you may file a 
written complaint (Form OSC-11) with the U.S. Office of Special Counsel 
at 1730 M Street NW., Suite 218, Washington, DC 20036-4505 or online 
through the OSC Web site, http://www.osc.gov.

Retaliation for Engaging in Protected Activity

    A federal agency cannot retaliate against an employee or applicant 
because that individual exercises his or her rights under any of the 
federal antidiscrimination or whistleblower protection laws listed 
above. If you believe that you are the victim or retaliation for 
engaging in protected activity, you must follow, as appropriate, the 
procedures described in the Antidiscrimination Laws and Whistleblower 
Protection Laws section or, if applicable, the administrative or 
negotiated grievance procedures in order to pursue any legal remedy.

Disciplinary Actions

    Under existing laws, each agency retains the right, where 
appropriate, to discipline a federal employee for conduct that is 
inconsistent with the Federal Antidiscrimination and Whistleblower 
Protection Laws up to and including removal. If OSC has initiated an 
investigation under 5 U.S.C. 1214, however, agencies must seek approval 
from OSC to discipline employees for, among other activities, engaging 
in prohibited retaliation, 5 U.S.C. 1214(f). Nothing in the No FEAR Act 
alters existing laws or permits an agency to take unfounded 
disciplinary action against a federal employee or to

[[Page 13102]]

violate the procedural rights of a federal employee who has been 
accused of discrimination.

Additional Information

    For further information regarding the No FEAR Act regulations, 
refer to 5 CFR 724, as well as the appropriate Board offices. 
Additional information regarding federal antidiscrimination laws can be 
found at the EEOC Web site, http://www.eeoc.gov, and the OSC Web site, 
http://www.osc.gov.

Existing Rights Unchanged

    Pursuant to section 205 of the No FEAR Act, neither the No FEAR Act 
nor this notice creates, expands, or reduces any rights otherwise 
available to any employee, former employee, or applicant under the laws 
of the United States, including the provisions of law specified in 5 
U.S.C. 2302(d).

    Dated: February 21, 2013.
Claire McKenna,
Legal Counsel, Privacy and Civil Liberties Oversight Board.
[FR Doc. 2013-04467 Filed 2-25-13; 8:45 am]
BILLING CODE P