<?php

include("eff_setup2.php");

$smarty = new EFFSmarty;

$smarty->assign('title','Senator Leahy\'s Letter to Attorney General John Ashcroft');
$smarty->assign('breadcrumb','true');

$issue = array("Issues" => "/issues/", "Privacy" => "/issues/privacy/", "TIA" => "/issues/privacy/tia/");
$smarty->assign('issue',$issue);
$smarty->assign('featuredNews','false');

$content = '
			<div id="featuretext">

     <p align="center"><b><font size="6" color="#000080">U.S. SENATOR PATRICK LEAHY</font></b></p>

         <p align="center"><font color="#000080"><b>CONTACT: Office of Senator 
         Leahy, 202-224-4242</b></font></p>

         <p align="center"><font color="#000080"><b>VERMONT</b></font></p>

     <hr noshade align="right">

    <div class="Section1">
            <p class="MsoNormal"><span style="font-size: 12.0pt">The Honorable 
            John Ashcroft<br />
            Attorney General<br />
            United States Department of Justice<br />
            Main Justice Building, Room 5137<br />
            950 Pennsylvania Avenue, N.W.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<br />

            Washington, D.C.&nbsp; 20530</span></p>
            <p class="MsoNormal"><span style="font-size: 12.0pt">Dear Attorney 
            General Ashcroft:</span></p>
            <p class="MsoNormal"><span style="font-size: 12.0pt">I am writing to 
            inquire about the current &quot;data mining&quot; operations, practices and 
            policies at the Department of Justice.&nbsp; Improved access to and the 
            sharing of information among intelligence and law enforcement 
            agencies at the federal, state and local levels is crucial in 
            promoting our national security interests.&nbsp; These national security 
            interests are most effectively and efficiently served, however, when 
            the information being collected and shared is relevant, reliable, 
            timely and accurate.&nbsp; As one recent expert report observed, &ldquo;Data 
            mining, like any other government data analysis, should occur where 
            there is a focused and demonstrable need to know, balanced against 
            the dangers to civil liberties.&nbsp; It should be purposeful and 
            responsible.&rdquo;&nbsp; <i>(Protecting America&#8217;s Freedom in the Information 
            Age, A Report of the Markle Foundation Task Force</i>, October, 
            2002, p. 27.)&nbsp; </span></p>

            <p class="MsoNormal"><span style="font-size: 12.0pt">Adequate 
            oversight by the Congress, and especially by the appropriate 
            committees of jurisdiction, is essential in helping to ensure that 
            adequate standards are set and met, so that these activities can be 
            both effective and respectful of the constitutional rights of the 
            American people.&nbsp; Accordingly, I am interested in learning the 
            extent to which the Department is relying on data mining to deal 
            with the terrorism threat or other criminal activity, and how this 
            technology is being used. </span></p>
            <p class="MsoNormal"><span style="font-size: 12.0pt">I raise this 
            inquiry against the backdrop of public concern over the Total 
            Information Awareness System (TIA) being developed under the 
            supervision of Admiral Poindexter within the Defense Advanced 
            Research Project Agency (DARPA).&nbsp; TIA is intended, according to 
            Department of Defense officials, to generate tools for monitoring 
            the daily personal transactions by Americans and others, including 
            tracking the use of passports, driver&#8217;s licenses, credit cards, 
            airline tickets, and rental cars.&nbsp; The Administration&#8217;s goal is to 
            turn these tools over to law enforcement agencies.&nbsp; According to 
            press reports, one such tool, a software program called &ldquo;Genoa,&rdquo; has 
            already been delivered by DARPA to the Department of Justice. </span>
            </p>
            <p class="MsoNormal"><span style="font-size: 12.0pt">Advances in the 
            technological capability to search, track or &ldquo;mine&rdquo; commercial and 
            government databases and Americans&#8217; consumer transactions have 
            provided powerful tools that have dramatically changed the ways that 
            companies market their products and services.&nbsp; Collection and use by 
            government law enforcement agencies of such commercial transactional 
            data on law-abiding Americans poses unique issues and concerns, 
            however.&nbsp; These concerns include the specter of excessive government 
            surveillance that may intrude on important privacy interests and 
            chill the exercise of First Amendment-protected speech and 
            associational rights.&nbsp; </span></p>

            <p class="MsoNormal"><span style="font-size: 12.0pt">Moreover, as 
            Federal law enforcement agencies obtain public source and 
            proprietary data for mining, the sheer volume of information may 
            make updating the data and checks for reliability and accuracy 
            difficult, if not impossible.&nbsp; Reliance on data mining by law 
            enforcement agencies may produce an increase in false leads and law 
            enforcement mistakes. &nbsp;While the former is a waste of resources, the 
            latter may result in mistaken arrests or surveillance.&nbsp; Such 
            mistakes do occur, even without data-mining.<a href="#_ftn1" name="_ftnref1"><sup>1</sup></a>&nbsp; 
            In short, while the only ill effect of business reliance on outdated 
            or incorrect information may be misdirected marketing efforts, data 
            mining mistakes made by a law enforcement agency may result in 
            misdirection or misallocation of limited government resources and 
            devastating consequences for mistakenly targeted Americans.&nbsp; </span>
            </p>
            <p class="MsoNormal"><span style="font-size: 12.0pt">I am interested 
            in determining the extent to which the Justice Department is relying 
            on data-mining and how the Department is addressing these concerns 
            with appropriate safeguards on the collection, use and dissemination 
            of information obtained through data mining.&nbsp; Specifically, I ask 
            for and would appreciate your responses to the following questions.</span></p></div>

          <div class="Section2">
            <p class="Level1" style="text-indent: -.5in">1.<span style="font-style: normal; font-variant: normal; font-weight: normal; font-size: 7.0pt; font-family: Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
            </span><b><u>Data-Mining Operations Underway Within the Department 
            of Justice. </u></b></p>
            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(A) Please identify any private 
            sector or proprietary databases obtained or being used by the 
            Department of Justice for data-mining or pattern-recognition 
            activities.&nbsp; </span></p>
            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(B) Have any private sector or 
            proprietary databases referred to in (A) above been aggregated by 
            the Department with any data from government agency databases for 
            data-mining or pattern-recognition activities? </span></p>

            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(C) Is the Department using any 
            data-mining tools to obtain information for law enforcement purposes 
            unrelated to the detection and prosecution of terrorism?</span></p></div>
          <div class="Section3">
            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(D) To the extent that the 
            Department is using proprietary data provided by private 
            intermediaries, (i) what procedures are you using to preserve the 
            confidentiality policies of these intermediaries?&nbsp; (ii) Is the 
            Department compensating the private intermediaries for assisting in 
            the data mining?&nbsp; (iii) Has the Department taken any steps to shield 
            the private intermediaries from liability for their cooperation with 
            the government?&nbsp; </span></p>

            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(E) What procedures, if any, does 
            the Department follow to ensure the accuracy and reliability of&nbsp; 
            information currently collected and stored in databases used for 
            data-mining?</span></p>
            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(F) By contrast to the use of 
            private sector or proprietary databases, in the search for proper 
            data mining tools, to what extent is the Department of Justice 
            developing new tools and to what extent is it making use of existing 
            tools developed in the private sector or used by other government 
            agencies (such as search engines and data mining software)? What are 
            the pros and cons of these differing approaches?</span></p>
            <p class="MsoNormal"><b><span style="font-size: 12.0pt">2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <u>
            Foreign Terrorist Tracking Task Force.</u></span></b><span style="font-size: 12.0pt">&nbsp; 
            On October 29, 2001, the President directed the Department to 
            establish the Foreign Terrorist Tracking Task Force (FTTTF) to 
            &ldquo;ensure that, to the maximum extent permitted by law, Federal 
            agencies coordinate programs to . . . 1) deny entry into the United 
            States of aliens associated with, suspected of being engaged in, or 
            supporting terrorist activity; and 2) locate, detain, prosecute, or 
            deport any such aliens already present in the United States.&rdquo;&nbsp; Your 
            April 11, 2002, order establishing the FTTTF would do more than 
            ensure that agencies &ldquo;coordinate programs&rdquo; and requires the FTTTF to 
            have &ldquo;electronic access to large sets of data, including the most 
            sensitive material from law enforcement and intelligence sources.&rdquo;&nbsp;&nbsp; 
            In response to my request for more detailed description of the 
            mission and activities of the FTTTF, you stated in response to 
            written questions that:</span></p>

            <p class="MsoNormal" style="margin-left: .5in; margin-right: .5in; margin-top: 0in; margin-bottom: .0001pt">
            <span style="font-size: 12.0pt">&ldquo;The FTTTF has identified a number 
            of specific projects which it can coordinate or run to fill gaps in 
            existing government efforts relating to prevention of terrorist 
            activities.&nbsp; For example, the FTTTF is pursuing projects to: 1) 
            create a unified, cohesive lookout list; 2)&nbsp;identify foreign 
            terrorists and their supporters who have entered or seek to enter 
            the U.S. or its territories; and 3) detect such factors as 
            violations of criminal or immigration law which would permit 
            exclusion, detention or deportation of such individuals.&nbsp; In 
            addition, the FTTTF is in the process of identifying other 
            intelligence-related projects that it can support through its 
            collaborative capability to co-locate data from multiple agency 
            sources.&rdquo;&nbsp;&nbsp; </span></p>
            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(A) Redundancy within government 
            programs can be both expensive and ineffective.&nbsp; The &ldquo;projects&rdquo; of 
            the FTTTF appear to overlap other initiatives underway within the 
            Department.&nbsp; For example, the FBI has an Information Sharing Task 
            Force and participates in 47 Joint Terrorism Task Forces (JTTF) to 
            unify all levels and branches of law enforcement in preventing and 
            investigating terrorist activity and helps coordinate the JTTF in 
            Regional Terrorism Task Forces (RTTF).&nbsp; Director Mueller has also 
            created a permanent Terrorism Watch List, a new Office of 
            Intelligence, a new Integrated Intelligence Information Application 
            (IIIA) database, and new hiring and recruiting initiatives.&nbsp; <b>

            Please explain how the Department&#8217;s FTTTF &ldquo;lookout list&rdquo; differs in 
            substance and use from the FBI&#8217;s Terrorism Watch List and how the 
            FTTTF&#8217;s &ldquo;other intelligence-related projects&rdquo; will differ from the 
            functions of the FBI&#8217;s JTTF, and IIIA database, and new Office of 
            Intelligence. </b></span></p>
            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(B) The FBI&#8217;s new Office of 
            Intelligence is intended to provide strategic analysis and gather 
            information from current and past cases and other agencies, to look 
            for patterns and analyze risks, and to meet the needs of other 
            organizations responsible for homeland security.&nbsp;&nbsp; The separate 
            FTTTF supervised by the Deputy Attorney General is required, with a 
            budget of over $20 million, to conduct its own intelligence analysis 
            projects and create and maintain its own databases and lookout list.<b>&nbsp; 
            Since Director Mueller routinely briefs the President with the CIA 
            Director on terrorist threats, please explain why you decided to 
            place the FTTTP in the Deputy Attorney General\'s office rather than 
            within the FBI as part of its new Office of Intelligence?</b>
            <a href="#_ftn2" name="_ftnref2"><sup>2</sup></a>&nbsp;&nbsp; </span>
            </p>

            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(C) The FBI has traditionally 
            performed the critical intelligence-gathering mission under the 
            supervision of a Director appointed for a ten-year term in a 
            structure designed, in part, to insulate the exercise of Bureau 
            powers from political considerations, and pursuant to formal 
            guidelines and Congressional oversight. <b>&nbsp;Are the investigative 
            restrictions applicable to FBI agents also applicable to employees 
            conducting data mining and operating the FTTTF under the guidance of 
            the Deputy Attorney General? </b></span></p>
            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(D) What information is necessary to 
            trigger a data-mining inquiry on a particular individual or targeted 
            activity to ensure that this technique is only being used for 
            purposes relevant to detecting, preventing or punishing terrorism or 
            other criminal activity?</span></p></div>
          <div class="Section4" style="width: 616; height: 704">
            <p class="MsoNormal" style="line-height: .1pt">
            <span style="font-size: 12.0pt">&nbsp;</span></p>

            <p class="MsoNormal"><b><span style="font-size: 12.0pt">3.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;<u>Admiral 
            Poindexter&#8217;s Total Information Awareness Project (TIA).</u></span></b><span style="font-size: 12.0pt">&nbsp; 
            According to the Department of Defense, the Defense Advanced 
            Research Project Agency (DARPA) has established the Total 
            Information Awareness (TIA) Project to develop technologies for 
            rapid language translation, commercial transaction data mining, and 
            interagency analysis and decision-making tools. </span></p>
            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(A) To what extent are you and the 
            Department of Justice consulting or collaborating with Admiral 
            Poindexter or the Department of Defense in designing and 
            implementing TIA surveillance tools and related programs? </span>
            </p>
            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(B) Have any TIA generated or 
            developed technologies been delivered to the Department of Justice 
            and, if so, (i) are any being used? (ii) describe the purposes for 
            which they are being used; and (iii) are any of the tools for data 
            mining and pattern recognition? </span></p>

            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(C)&nbsp;&nbsp; TIA has programs called Genoa 
            I and II.&nbsp; Has this program been delivered in whole or in part to 
            the Department of Justice and, if so, (i) is it being used? (ii) 
            Describe the purposes for which it is being used; and (iii) is this 
            a tool for data mining or pattern recognition? </span></p>
            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(D) TIA has a program called EELD 
            (Evidence Extraction and Link Discovery).&nbsp; Has this program been 
            delivered in whole or in part to the Department of Justice and, if 
            so, (i) is it being used? (ii) Describe the purposes for which it is 
            being used; and (iii) is this a tool for data mining or pattern 
            recognition? </span></p>
            <p class="MsoNormal" style="margin-left: .5in">

            <span style="font-size: 12.0pt">(E) TIA has a program called Genisys.&nbsp; 
            Has this program been delivered in whole or in part to the 
            Department of Justice and, if so, (i) is it being used? (ii) 
            Describe the purposes for which it is being used; and (iii) is this 
            a tool for data mining or pattern recognition? </span></p>
            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(F) TIA has a program called TIDES (Translingual 
            Information Detection, Extraction and Summarization.&nbsp; Has this 
            program been delivered in whole or in part to the Department of 
            Justice and, if so, (i) is it being used? (ii) Describe the purposes 
            for which it is being used; and (iii) is this a tool for data mining 
            or pattern recognition?</span></p></div>
          <div class="Section5">
            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(G)&nbsp; Is the FTTTF coordinating its 
            work in any way with the TIA?</span></p>

            <p class="MsoNormal" style="margin-left: .5in">
            <span style="font-size: 12.0pt">(H) What safeguards, if any, do you 
            believe should be included in any data mining tools developed by TIA 
            to ensure the accuracy and reliability of the information collected 
            and stored in databases?&nbsp; Have you recommended such safeguards to 
            the Department of Defense? </span></p>
          </div>
          <p class="MsoNormal" style="line-height: .1pt">
          <span style="font-size: 12.0pt">&nbsp;</span></p>
          <p class="Level1" style="text-indent: -.5in">4.<span style="font-style: normal; font-variant: normal; font-weight: normal; font-size: 7.0pt; font-family: Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
          </span><b><u>Compliance With The Privacy Act</u></b><span style="font-size: 12.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p>

          <p class="MsoNormal" style="margin-left: .5in">
          <span style="font-size: 12.0pt">(A) Does the Privacy Act impose any 
          restriction on data-mining activities by the Department and, if so, 
          what are those restrictions?</span></p>
          <p class="MsoNormal" style="margin-left: .5in">
          <span style="font-size: 12.0pt">(B) Does the Department employ any 
          outside contractors to perform data mining services and, if so, how 
          does the Privacy Act apply, if at all, to the out-sourcing of data 
          mining activities? </span></p>
          <p class="MsoNormal" style="margin-left: .5in">
          <span style="font-size: 12.0pt">(C) The Privacy Act, 5 U.S.C. 
          &sect;552a(e)(4), requires agencies to &quot;publish in the Federal Register 
          upon establishment or revision a notice of the existence and character 
          of the system of records.&quot;&nbsp; Have you promulgated any regulations 
          regarding the FTTTF? </span></p>

          <p class="MsoNormal" style="margin-left: .5in">
          <span style="font-size: 12.0pt">(D) The Privacy Act, 5 U.S.C. 
          &sect;552a(e)(4)(E), requires publication of the policies and practices of 
          the agency regarding storage, retrievability, access, controls, 
          retention and disposal of the records.&nbsp; Have you published such 
          policies and practices regarding the FTTTF? </span></p>
          <p class="MsoNormal" style="margin-left: .5in">
          <span style="font-size: 12.0pt">(E) Generally, the Privacy Act 
          prohibits governmental agencies from disclosing records to another 
          agency, unless it falls under the &quot;routine use&quot; exception.&nbsp; 5 U.S.C. 
          &sect;552a(b)(3).&nbsp; Does the Department rely on this &ldquo;routine use&rdquo; exception 
          to obtain databases from other agencies for aggregation in the FTTTF 
          and other databases within the Department? </span></p>

          <p class="MsoNormal" style="margin-left: .5in">
          <span style="font-size: 12.0pt">(F) The Privacy Act, 5 U.S.C. 
          &sect;552a(e)(4)(D), requires Federal Register publication of &ldquo;each routine 
          use of the records contained in the system, including the categories 
          of users and the purpose of such use.&rdquo;&nbsp; If the answer to (E) above is 
          affirmative, has the Department published any Federal Register notice 
          required by the Privacy Act?&nbsp; If so, please provide a copy of any such 
          notice and, if not, please explain why.</span></p>
          <p class="MsoNormal" style="margin-left: .5in">
          <span style="font-size: 12.0pt">(G) The Privacy Act imposes 
          restrictions on &ldquo;matching&rdquo; programs conducted by the government or the 
          private sector on behalf of the government, unless the matching is 
          conducted &ldquo;subsequent to the initiation of a specific criminal or 
          civil law enforcement investigation&rdquo; or &ldquo;for foreign 
          counterintelligence purposes.&rdquo;&nbsp; How does the Department ensure that 
          the FTTTF and other Department databases comprised of aggregated data 
          from other agencies are operated within these restrictions? </span>
          </p>

          <p class="MsoNormal" style="margin-left: .5in">
          <span style="font-size: 12.0pt">(H) Does the Department believe that 
          any amendments to the Privacy Act would be helpful to facilitate data 
          mining by the Department and, if so, does the Department intend to 
          transmit to the Congress any amendments to the Privacy Act to clarify 
          the legality of data-mining by Federal agencies?&nbsp; </span></p>
          <p class="Level1" style="text-indent: -.5in">5.<span style="font-style: normal; font-variant: normal; font-weight: normal; font-size: 7.0pt; font-family: Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
          </span><b><u>Coordination With the Department of Homeland Security.</u></b>
          </p>
          <p class="MsoNormal" style="margin-left: .5in">
          <span style="font-size: 12.0pt">(A) The Homeland Security Act 
          expressly authorizes the new department to request, access, receive, 
          analyze and integrate information from government agencies and private 
          sector entities, and to establish and utilize &ldquo;a secure communications 
          and information technology infrastructure, including data-mining and 
          other advanced analytical tools, in order to assess, receive and 
          analyze data and information. . . .&rdquo; [P.L. 107-296, Sections 
          201(d)(1), (13), (14)].&nbsp; Does the Department of Justice have any such 
          express statutory authority to conduct data mining?&nbsp; If so, please 
          describe that authority. </span></p>

          <p class="MsoNormal" style="margin-left: .5in">
          <span style="font-size: 12.0pt">(B) Do you anticipate the Department 
          of Justice&#8217;s data mining operations being transferred to the new 
          Department of Homeland Security? If not, please explain why.</span></p>
          <p class="MsoNormal" style="margin-left: .5in">
          <span style="font-size: 12.0pt">(C) Do you believe it is valuable to 
          have a coordinated data mining effort with one agency clearly held 
          accountable for setting guidelines of data uniformity and reliability 
          and, if so, which agency do you believe should take this primary 
          position in order to avoid duplication of effort? </span></p>
          <p class="MsoNormal"><span style="font-size: 12.0pt">I appreciate your 
          attention to this important matter. </span></p>
          <p class="MsoNormal"><span style="font-size: 12.0pt">Sincerely,</span></p>
          <p class="MsoNormal"><span style="font-size: 12.0pt">PATRICK LEAHY</span></p>

          <p class="MsoNormal"><span style="font-size: 12.0pt">Chairman</span></p>
          <div style="mso-element: footnote-list">
            <br clear="all">
&nbsp;<hr align="left" size="1" width="33%">
            <div style="mso-element: footnote" id="ftn1">
              <p class="MsoNormal" style="margin-bottom: 12.0pt">
              <a href="#_ftnref1" name="_ftn1">
              <span style="font-size: 12.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></a><sup>

              <span style="font-size: 12.0pt">1</span></sup><span style="font-size: 12.0pt"> 
              A recently declassified FBI memorandum, dated April 14, 2000, 
              makes this point with startling details about incidents of 
              mistaken surveillance activity, including a Foreign Intelligence 
              Surveillance Act (FISA) order being improperly implemented with 
              unauthorized videotaping of a meeting; wiretapping a cellular 
              telephone that had been dropped by the target and assigned to an 
              innocent user, who &ldquo;was therefore the target of unauthorized 
              electronic surveillance for a substantial period of time;&rdquo; 
              unauthorized monitoring of an e-mail account; and &ldquo;unauthorized 
              searches, incorrect addresses, incorrect interpretation of a FISA 
              order and overruns of ELSUR [electronic surveillance].&rdquo; </span></p>
            </div>
            <div style="mso-element: footnote" id="ftn2">
              <p class="MsoNormal" style="margin-bottom: 12.0pt">
              <a href="#_ftnref2" name="_ftn2">
              <span style="font-size: 12.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></a><sup>
              <span style="font-size: 12.0pt">2</span></sup><span style="font-size: 12.0pt"> 
              This question was originally directed to Deputy Attorney General 
              Thompson in May 2002, but no response has been provided. </span>
			</p>
            </div>
          </div>
<p>
Source: <a href="http://www.senate.gov/~leahy/press/200301/011003.html">http://www.senate.gov/~leahy/press/200301/011003.html</a>
</p>

			</div>
';

global $REQUEST_URI;
$smarty->assign('content',$content);
$smarty->display('generic.tpl',$REQUEST_URI);

?>
