You are on page 1of 2

Rogers / 4 Senator Gee

S.B._____

A BILL
To increase access to online data.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47

Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,
SECTION 1. SHORT TITLE
This act may be cited as the NetProtection Act of 2016.
SECTION 2. FINDINGS
Congress hereby finds and declares that,
1) 89% of adults aged 18 - 29 use social media
2) Terrorist organizations are increasingly using propaganda on platforms such as password-protected websites and
restricted- access Internet chat groups for recruitment.
3)In September 2002, al Qaeda cells operating in America reportedly were using Internet based phone services to
communicate with cells overseas.
4) Cloaked with a veil of objectivity, the Internet allows the aspiring jihadist to view the world and global conflicts
through this extremist lens, further reinforcing the objectives and political arguments of the jihadi-Salafi agenda.
5)Every second Al Qaeda member was holding a laptop computer along with their Kalashnikov
6).Legal analysts, even courts,if not the larger public, have long recognized that innovation in information and
communications technologies often moves faster than the protections afforded by legislation, which is usually written
without an understanding of new or emerging technologies, unanticipated terrorist tactics, or new analytical
capabilities.
7)In 2007 Estonia suffered from a cyber blockade which shut down all computers around the world, including banks
and the prime ministers office.
8) A 22-year-old student (a United States national), Emerson Win eld Begolly was indicted for his involvement in the
distribution over the Internet of information relating to bomb-making and solicitation to commit violence on
American soil.
9)On 4 November 2010, Bilal Zaheer Ahmad posted an article on the Revolution Muslim website that was headed
with the symbol of the Islamic State of Iraq (an Al-Qaida af liate) of which the opening text was a quotation from the
Koran stating that those who died without participating in jihad were hypocrites.
10)8.82% say it is acceptable to monitor communications of suspected terrorists.
SECTION 3. STATUTORY LANGUAGE
A) The purpose of this bill is to increase access to online data with the intent in lessening the percentages of
unknown suspects that may be potentially dangerous to the country. All information will be strictly used for the
purpose of protecting the country from foreign or native terrorists. All other found information will be void.First,
Homeland Security will gain special privilege to all online profiles and their personal information, including phone
numbers,addresses,social security,phone calls,emails,call detail records,buying habits,electronic records, geographic
mapping, online chats,online activity and searches.Secondly, nonstop screening of all content on the web will be
carried out by the Department of Homeland Security. If harmful information is found, the citizen will go into private
questioning with the local police office. All information will be sent to the DHS and be available to citizens as public
knowledge. If they are suspect they will go through a second investigation personally by the DHS and otherwise will
be sent back home. This bill pertains to all citizens of America and all native companies.
B) Funding will be provided by the Department of Homeland Security and an increase of taxes by 15% from the 1%
of top earning citizens.
C) Failure to coperate 90 days after its enactment will result in a thorough investigation of person and a fine of
$3000. A second failure to coperate will result in six months jail time. Failure of phone service providers to
cooperate will result in a revoking in any government funding for research purposes.

You might also like