{"id":24169,"date":"2014-06-21T16:41:38","date_gmt":"2014-06-21T20:41:38","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24169"},"modified":"2014-06-21T16:41:38","modified_gmt":"2014-06-21T20:41:38","slug":"house-votes-to-cut-key-pursestrings-for-nsa-surveillance","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/house-votes-to-cut-key-pursestrings-for-nsa-surveillance.php","title":{"rendered":"House Votes To Cut Key Pursestrings For NSA Surveillance &#8230;"},"content":{"rendered":"<p><p>    The House of Representatives may    have only passed a puny attempt    to reform the NSAs surveillance activities last month. But    on Thursday evening it swung back with a surprising attack on a    key element of the agencys spying programs: their    funding.  <\/p>\n<p>    In a late night session, the House    of Representatives voted 293 to 123 to pass an amendment to a    Department of Defense appropriations bill that would cut off    all funds for two of the agencys most embattled activities:    First, using the 702 provision of the Foreign Intelligence    Surveillance Act to perform searches of collected surveillance    data that target Americans, and second, asking hardware markers    and software developers to build backdoors into their tools    designed to give the agency access to users communications. On    that second count, the amendment specifically forbids funding    for any agency attempt to mandate or request that a person    redesign its product or service to facilitateelectronic    surveillance.  <\/p>\n<p>    Both of those funding bans    represent a clear reaction against behavior revealed from the    leaks of Edward Snowden, which have shown over the past year    that the NSA subverted cryptography standards, diverted    hardware shipments to plant bugs in products, and found other    ways to gather raw communication data from Silicon Valley firms    like Google, Facebook, Microsoft, Apple, and others.  <\/p>\n<p>    Though the amendments bans still    havent been mirrored in the Senate, the House vote nonetheless    sends an unambiguous statement that theres political will to    do something about the issue of unchecked NSA spying, says    Parker Higgins, an activist at the Electronic Frontier    Foundation, which supported a campaign to persuade citizens to    call their congressman in support of the amendment. This is    not a trivial thing. These surveillance programs need money to    survive. Without it there are hard questions ahead for the    NSA.  <\/p>\n<p>    The bill also represents a    striking shift from the USA Freedom bill, intended to reform    NSA mass surveillance, that passed the house last month in a    watered-down    form that disappointed privacy advocates. In part, the    contrast is a result of political procedure: Much of the    Freedom bills weakening took place in the Judiciary and    Intelligence committees, says Julian Sanchez, a fellow at the    Cato Institute who follows surveillance policy. As an amendment    to an appropriations bill, he says, the defunding legislation    instead escaped thatdouble gauntlet of lobbying. In    particular, it didnt have to go through the Intelligence    Committee, which is basically a proxy for the intelligence    community, says Sanchez.  <\/p>\n<p>    In fact, the toothless    surveillance reform bill may have directly inspired Thursday    nights landslide vote by not going far enough to satisfy    legislators seeking to curtail the NSAs most controversial    activities. Due to the weakening of that bills anti-spying    provisions in committee, many House members never had a chance    to show their intention to more drastically limit the NSAs    spying.  <\/p>\n<p>    Even if the amendment becomes law,    it still wouldnt necessarily end all federally-mandated    backdoors in hardware and software, cautions Matt Blaze, a    computer science professor and cryptographer at the University    of Pennsylvania. According to his reading of the amendment, it    wouldnt cover the FBI, for instance. The goal is clearly    important. I worry that the scopeis limited, he says. Even    when the NSA and CIA dont request or put pressure on vendors    to incorporate backdoors, other agencies, like FBI, may be in    the same business.  <\/p>\n<p>    Still, the passage of the    amendment marks a serious shift in the political landscape    following a year of Snowdens spying disclosures. A similar    amendment put to a vote last year came up seven votes short of    passing. The lopsided tally this year shows that reining in the    NSA has become a popular political cause that crosses party    lines, says the EFFs Higgins. Last year, legislators who    voted in favor of this amendment were sticking their necks    out, he says. Now the status quo has changed. Theres a sense    that if youre not doing something about this problem, its    going to be a black mark on your record.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.wired.com\/2014\/06\/house-votes-to-cut-key-pursestrings-for-nsa-surveillance\/\" title=\"House Votes To Cut Key Pursestrings For NSA Surveillance ...\">House Votes To Cut Key Pursestrings For NSA Surveillance ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The House of Representatives may have only passed a puny attempt to reform the NSAs surveillance activities last month. But on Thursday evening it swung back with a surprising attack on a key element of the agencys spying programs: their funding. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-24169","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24169"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24169"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24169\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}