{"id":22198,"date":"2014-05-21T01:43:28","date_gmt":"2014-05-21T05:43:28","guid":{"rendered":"http:\/\/www.opensource.im\/?p=22198"},"modified":"2014-05-21T01:43:28","modified_gmt":"2014-05-21T05:43:28","slug":"nsa-spying-rep-justin-amash-renews-effort-to-gut-controversial-surveillance-tactics","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/nsa-spying-rep-justin-amash-renews-effort-to-gut-controversial-surveillance-tactics.php","title":{"rendered":"NSA spying: Rep. Justin Amash renews effort to gut controversial surveillance tactics"},"content":{"rendered":"<p><p>    WASHINGTON, D.C.  U.S. Rep. Justin Amash's latest bid to    undermine the government's domestic spying programs became    apparent this week after     warning to amend the annual defense authorization bill.  <\/p>\n<p>    Amash, R-Cascade Township, filed two amendments Monday to the    National Defense Authorization Act, intended to starve the    National Security Agency's funding to carry out controversial    domestic surveillance practices. The amendments state no amount    of funding allocated for the act may be used to carry out a    warrantless, secret court order involving any record.  <\/p>\n<p>    More: Amash's     amendment one and     amendment two (PDF files)  <\/p>\n<p>    The amendments stop short of halting the NSA's activities    completely. Instead, if a court finds records are needed, a    warrant must be issued on the suspicion of terrorist    activities. Phone call details are limited to no more than 180    days, and records must be destroyed if they are not related to    such threats.  <\/p>\n<p>    Amash's latest move is \"substantially the same\" as the    so-called     Amash Amendment narrowly defeated by the House last July,    spokesman Will Adams said in an email. Lawmakers voted that    proposal down, 217-205, after contentious debate that was    closely watched as a barometer of legislative tolerance for NSA    spying.  <\/p>\n<p>    The amendments are positioned to fire up debate on the NSA as a    more comprehensive bill garners support. Titled the \"USA    Freedom Act,\"     the standalone legislation aims to curb the agency's ability to    conduct communication sweeps and close a \"back door\" to    warrantless information already collected by requiring a court    order.  <\/p>\n<p>    \"We are offering amendments to the defense authorization bill    to shut down the NSA's bulk collection of Americans' private    information,\" Adams said. \"We prefer to move comprehensive    legislation like the USA Freedom Act, but if that legislation    isn't considered by the House this week, we'll be ready with    alternatives to force the debate.\"  <\/p>\n<p>    The Hill reported Amash's amendments, in addition to other    NSA-related items, will be     examined Tuesday afternoon as NDAA is discussed.  <\/p>\n<p>    Andrew Krietz covers breaking and general police\/fire news    for MLive | The Grand Rapids Press. Email him at <a href=\"mailto:akrietz@mlive.com\">akrietz@mlive.com<\/a> or follow him    on Twitter.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.mlive.com\/news\/grand-rapids\/index.ssf\/2014\/05\/nsa_spying_rep_justin_amash_renews_effort.html\/RK=0\/RS=N5yD9yVUvx90TqNLFzBbmSWuuNQ-\" title=\"NSA spying: Rep. Justin Amash renews effort to gut controversial surveillance tactics\">NSA spying: Rep. Justin Amash renews effort to gut controversial surveillance tactics<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> WASHINGTON, D.C. U.S. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-22198","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/22198"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=22198"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/22198\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=22198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=22198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=22198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}