{"id":24117,"date":"2014-06-21T00:41:46","date_gmt":"2014-06-21T04:41:46","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24117"},"modified":"2014-06-21T00:41:46","modified_gmt":"2014-06-21T04:41:46","slug":"house-votes-293-123-to-cut-funding-for-nsa-spying-on","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/house-votes-293-123-to-cut-funding-for-nsa-spying-on.php","title":{"rendered":"House votes 293-123 to cut funding for NSA spying on &#8230;"},"content":{"rendered":"<p><p>    In a surprising vote late Thursday night, a strong majority of    the House of Representatives voted to cut    funding to NSA operations that involve warrantless spying on    Americans or involve putting hardware or software \"backdoors\"    into various products. The    amendmentto a defense appropriations bill,    offeredby Reps. James Sensenbrenner (R-WI), Zoe Lofgren    (D-CA), and Thomas Massie (R-KY), passed 293 to 123.  <\/p>\n<p>    The amendment specifies that, with a few exceptions, none of    the funds made available by this Act may be used by an officer    or employee of the United States to query a collection of    foreign intelligence information acquired under section 702 of    the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.    1881a) using a United States person as an identifier.  <\/p>\n<p>    In addition, none of the funds made available by this Act may    be used by the National Security Agency or the Central    Intelligence Agency to mandate or request that a person...alter    its product or service to permit the electronic    surveillance...of any user of said product or service for said    agencies. Since Edward Snowden began leaking documents about    the NSA's tactics in June of last year, security experts        have worried about reports of     intentional weaknessesleft in     widely used cryptography specifications.  <\/p>\n<p>    The amendment is acontrast to the USA Freedom Act passed    last month. That bill     was initially intended to reform the NSAbut, in its    final form, still permitted the spy agency to access    itsvast trove of phone call metadata. Becausethe    item passed tonight was an amendment to an appropriations bill,    it went to the floor without being scrutinized by the    intelligence committee, which is \"basically a proxy for the    intelligence community, as Julian Sanchez of the Cato    Institute     explained to Wired.  <\/p>\n<p>    The amendment still has to beapproved by the Senate in    order     to take effect in 2015.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/arstechnica.com\/tech-policy\/2014\/06\/house-votes-293-123-to-cut-funding-for-nsa-spying-on-americans-building-backdoors\/\" title=\"House votes 293-123 to cut funding for NSA spying on ...\">House votes 293-123 to cut funding for NSA spying on ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In a surprising vote late Thursday night, a strong majority of the House of Representatives voted to cut funding to NSA operations that involve warrantless spying on Americans or involve putting hardware or software \"backdoors\" into various products. The amendmentto a defense appropriations bill, offeredby Reps. James Sensenbrenner (R-WI), Zoe Lofgren (D-CA), and Thomas Massie (R-KY), passed 293 to 123. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-24117","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24117"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24117"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24117\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}