Feeds

Jackboot dangled over NSA's throat for US spy dragnet outrage

What part of Foreign Intelligence Surveillance Act do you not understand?

Choosing a cloud hosting partner with confidence

The US House of Representatives will vote today on axing funding for controversial eavesdropping projects run by the NSA and other spooks.

The politicians will be asked to approve an amendment that will prevent Uncle Sam's spies from snooping on Americans en masse. While the NSA is under fire for hoovering up foreigners' private data from internet giants, it also gathered phone call records on its own citizens in a wholesale manner (and still is).

The amendment [PDF] was tacked onto the end of the Defence Appropriations Bill by Michigan Republican Justin Amash, who is furious that US citizens are under surveillance even if they are not involved in a formal criminal investigation.

The text reads:

Ends authority for the blanket collection of records under the Patriot Act. Bars the NSA and other agencies from using Section 215 of the Patriot Act to collect records, including telephone call records, that pertain to persons who are not subject to an investigation under Section 215.

Meanwhile, lobby groups Demand Progress and Fight for the Future have urged people to "flood Congress with calls" supporting the bipartisan amendment.

"If you care about the Fourth Amendment to the Constitution and if you believe that privacy is critical to liberty, now is the time to act," they said on new website Defund the NSA.

Amash also said on Twitter that he had received "incredible support" from regular people backing the amendment, despite the fact that President Obama opposes it:

The White House said in a statement that it was against the effort "to hastily dismantle one of our intelligence community's counterterrorism tools".

"This blunt approach is not the product of an informed, open, or deliberative process. We urge the House to reject the Amash Amendment, and instead move forward with an approach that appropriately takes into account the need for a reasoned review of what tools can best secure the nation," it added.

But Amash flung back that domestic eavesdropping programmes aren't exactly open either:

The NSA's secret surveillance projects, enabled in part by the Foreign Intelligence Surveillance Act, were outed last month by whistleblower Edward Snowden, who handed the press a dossier on the security agency's activities. Snowden is languishing in Moscow while attempting to gain asylum in pretty much any nation to avoid extradition to the US. ®

Intelligent flash storage arrays

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.