[{"command":"settings","settings":{"ajaxPageState":{"theme":"particle","libraries":"eJwDAAAAAAE"},"csp":{"nonce":"1W_7RQi3iA-YPGv4UWaY4Q"},"pluralDelimiter":"\u0003","user":{"uid":0,"permissionsHash":"acafb01019466829aaf6d2c62eb0df630372839aa74d100cee464526596bb6dc"}},"merge":true},{"command":"invoke","selector":null,"method":"naraFindingAidAdvBoxesUpdateHistory","args":["reset"]},{"command":"insert","method":"replaceWith","selector":"#finding-aid-boxes-list","data":"\u003Cdiv id=\u0022finding-aid-boxes-list\u0022\u003E\u003Cdiv class=\u0022nara-finding-aids-adv-boxes-folders\u0022\u003E\n      \u003Cdiv class=\u0022usa-accordion\u0022 id=\u0022series-content-\u0022\u003E\n      \n      \u003Cdiv\u003E\n        \n                  \n                      \u003Cdiv class=\u0022\u0022 id=\u0022content-box-15865\u0022\u003E\n              \u003Cp class=\u0022box-title\u0022\u003ERAC Box 1\u003C\/p\u003E\n              \u003Cdiv id=\u0022content-folders-15865\u0022 class=\u0022\u0022\u003E\n                                  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-0\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP Computer Security 03\/12\/1987-09\/23\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-1\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP Computer Security 09\/24\/1987-06\/27\/1988\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-2\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP General 06\/04\/1987-06\/20\/1988\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-3\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP General 06\/21\/l 988\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-4\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP NSTAC (National Security Telecommunications Advisory Committee) 02\/10\/1987-10\/14\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-5\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP NTISSC (National Telecommunications and Information Systems Security) 09\/17\/1984-10\/31\/1986\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-6\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP NTISSC (National Telecommunications and Information Systems Security) 11\/01\/1986-03\/31\/l987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-7\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP NTISSC (National Telecommunications and Information Systems Security) 04\/01\/1987-04\/30\/l987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-8\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP NTISSC (National Telecommunications and Information Systems Security) 05\/01\/1987-06\/30\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-9\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP NTISSC (National Telecommunications and Information Systems Security) 07\/01\/1987-07\/31\/l987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-10\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP NTISSC (National Telecommunications and Information Systems Security) 08\/01\/1987-12\/31\/l987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-11\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP NTISSC (National Telecommunications and Information Systems Security) 01\/01\/1988-01\/31\/1988\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-12\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP NTISSC (National Telecommunications and Information Systems Security) 02\/01\/1988-05\/31\/l 988\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-13\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP NTISSC (National Telecommunications and Information Systems Security) 6\/01\/1988-06\/30\/1988\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-14\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP NTISSC (National Telecommunications and Information Systems Security) 07\/01\/1988-07\/31\/l 988\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-15\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP NTISSC (National Telecommunications and Information Systems Security) 08\/01\/1988-11\/30\/1988\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-16\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  AADP Telecommunications 03\/19\/19811\/20\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-17\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  Computer Security 09\/17\/1984-10\/31\/1985\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-18\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  Computer Security 1l\/01\/1985-09\/22\/l 986\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-19\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  Computer Security 09\/23\/l 986-06\/13\/1988\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-20\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 2889 Computer Security Act of 1986 (1)-(9)\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-21\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 2889 Computer Security Act of 1986 [Implementation] (1)-(7)\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n\n              \u003C\/div\u003E\n            \u003C\/div\u003E\n                      \u003Cdiv class=\u0022\u0022 id=\u0022content-box-15866\u0022\u003E\n              \u003Cp class=\u0022box-title\u0022\u003ERAC Box 2\u003C\/p\u003E\n              \u003Cdiv id=\u0022content-folders-15866\u0022 class=\u0022\u0022\u003E\n                                  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-0\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 09\/17\/1984-12\/31\/1986\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-1\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 01\/01\/1987-01\/31\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-2\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 02\/01\/1987-02\/09\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-3\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 02\/10\/1987-02\/16\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-4\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 02\/17\/1987-02\/23\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-5\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 02\/24\/1987-02\/25\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-6\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 02\/26\/1987-03\/04\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-7\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 03\/05\/1987 (1)(2)\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-8\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 03\/06\/1987-03\/10\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-9\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 03\/11\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-10\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 03\/12\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-11\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 03\/13\/1987 (1)(2)\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-12\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 03\/14\/1987-03\/16\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-13\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 03\/17\/1987-03\/24\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-14\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 03\/25\/1987-03\/31\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-15\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 04\/01\/1987-08\/31\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-16\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 09\/0l\/1987-09\/28\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-17\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 09\/29\/1987-09\/30\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-18\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 10\/01\/1987-12\/13\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-19\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 12\/14\/1987 (1)-(3)\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-20\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 12\/15\/1987-12\/31\/1987\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-21\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  H.R. 145 Computer Security Act 01\/01\/1988-01\/06\/1988\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n  \u003Cdiv class=\u0022collection-archive\u0022 id=\u0022folder-content-22\u0022\u003E\n    \u003Cdiv class=\u0022item-listing\u0022\u003E\n              \u003Cspan class=\u0022item-listing-status open closed\u0022\u003E\n                                        closed        \u003C\/span\u003E\n      \n      \u003Cspan\u003E\n                  Supercomputer\n              \u003C\/span\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n\n              \u003C\/div\u003E\n            \u003C\/div\u003E\n                  \n      \u003C\/div\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n\u003C\/div\u003E","settings":null},{"command":"invoke","selector":".ajax-progress","method":"remove","args":[]},{"command":"invoke","selector":".nara-finding-aids-adv-boxes-filter input.button","method":"show","args":[]}]