Feeds

Who gives a F about privacy? New scorecard rates US pols on spying

Dramatically increasing mass surveillance? See me after class

Gartner critical capabilities for enterprise endpoint backup

Civil-rights groups and other campaigners have built a website that tracks US politicians' voting records on privacy laws.

Members of the bipartisan outfit Stand Against Spying say their scorecard database will publish an overview and tracker of how senators and representatives in Congress vote for or against key issues on privacy and mass surveillance by intelligence agencies.

The scorecard keeps track of votes on key issues such as the USA Freedom Act and the Massie-Lofgren amendment. Congresscritters are then scored on how they voted, and are given a numerical score and corresponding letter grade.

An early tally of the scorecard found that 45 per cent of Congress qualified for an "A" grade – meaning they voted against laws to increase surveillance – while 5 per cent got an "F" and 14 per cent did not show up to enough votes to even qualify for a grade in the study.

Perhaps most interesting about the Stand Against Spying effort is its diverse group of backers. Along with usual suspects such as the Electronic Frontier Foundation and Sunlight Foundation, the project has won the backing of the conservative FreedomWorks PAC and the US Libertarian Party.

"We have different missions, different goals, different communities that we represent," the group declared.

"However, we all agree that mass surveillance is contrary to freedom and democracy. It must be stopped."

In addition to monitoring how Congress votes on key privacy issues, the site will also back a grassroots effort to push President Obama with an open letter calling on the administration to take further action on privacy matters.

"We recognize that Congress has an important role to play in passing legislation to ban of mass surveillance," the letter reads.

"However, you are not obligated to wait for Congress to act. The Executive branch started mass surveillance and can end it now. We also urge you to embrace new levels of transparency around America's surveillance activities."

To help tout the site, the group launched a publicity stunt targeting an NSA facility in Utah. A Greenpeace-owned airship carrying the site's URL was flown over the NSA datacenter in an effort to raise awareness about the campaign. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
Apple tried to get a ban on Galaxy, judge said: NO, NO, NO
Judge Koh refuses Samsung ban for the third time
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.