Tight NSA spy vote gives hope to program critics
Privacy rights groups, others see 12-vote margin in U.S. House vote as a sign of growing opposition to domestic spy program
Computerworld - Civil rights advocates view Wednesday's narrow defeat of a bill to curtail funds for the National Security Agency's domestic spy program as a sign of the growing opposition within Congress.
The bipartisan amendment, introduced by Rep. John Conyers (D-MI) and Rep. Justin Amash (R-MI) and co-sponsored by 30 lawmakers, sought to cut funding for the controversial NSA program that collects data from telephone calls in the U.S.
The program was first revealed in documents leaked to reporters in June by NSA contract worker Edward Snowden, now a fugitive hiding in Russia.
The documents outline details of a program under which the NSA is collecting metadata records of phone calls made in the U.S. The collected data includes originating and dialed numbers, call times and duration, location data and calling card numbers.
Snowden's leaks of documents about the warrantless surveillance program sparked widespread privacy, civil rights and constitutional concerns among some members of Congress and others.
The Amash-Conyers amendment, introduced as part of the Defense Appropriations Act, sought to curb mass, warrantless collection of phone call records of Americans by the NSA. It would have allowed the agency to continue such data collection activity only from specific suspects in anti-terror investigations.
The proposal drew a sharp rebuke from the Obama Administration, which has insisted that the NSA's records collection activity is legal and vital to national security.
The proposed amendment was narrowly defeated by a vote of 205-217 in the House on Wednesday.
"The Amash amendment was a first step for Congress to express its opinion," said Mark Jaycox, a staff attorney at the Electronic Frontier Foundation, which has filed a lawsuit challenging the NSA program. "For such an amendment to garner support is a reassuring sign that privacy has no party and that a near-majority of Congressmen want to stop this program," he said.
Jaycox said the narrow margin of the defeat isn't surprising considering that a majority of American's think that the NSA's use of the Patriot Act to conduct domestic surveillance is "overreaching, invasive, and unconstitutional. Legislative efforts are being pushed in both houses of Congress. And success of legislative reform is sure to come off of this decisive vote and important vote."
The Center for Democracy and Technology, another of many rights groups that have filed lawsuits against the NSA, expressed similar sentiments.
In a blog post, the group expressed disappointment that the amendment was defeated, but added that the close, bipartisan vote "shows that the tide is turning in favor of restoring our fundamental privacy rights."
"This is only the beginning. As public opposition towards this troubling program grows, CDT will continue to press Congress to put an end to the blanket surveillance of millions of innocent Americans," CDT president Leslie Harris said in the post.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is firstname.lastname@example.org.
- Snowden leaks erode trust in Internet companies, government
- NSA phone metadata collection program renewed for 90 days
- NSA isn't evil, says noted civil libertarian
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
Read more about Privacy in Computerworld's Privacy Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts