Tight NSA spy vote gives hope to program critics

Privacy rights groups, others see 12-vote margin in U.S. House vote as a sign of growing opposition to domestic spy program

Civil rights advocates view Wednesday's narrow defeat of a bill to curtail funds for the National Security Agency's domestic spy program as a sign of the growing opposition within Congress.

The bipartisan amendment, introduced by Rep. John Conyers (D-MI) and Rep. Justin Amash (R-MI) and co-sponsored by 30 lawmakers, sought to cut funding for the controversial NSA program that collects data from telephone calls in the U.S.

The program was first revealed in documents leaked to reporters in June by NSA contract worker Edward Snowden, now a fugitive hiding in Russia.

The documents outline details of a program under which the NSA is collecting metadata records of phone calls made in the U.S. The collected data includes originating and dialed numbers, call times and duration, location data and calling card numbers.

Snowden's leaks of documents about the warrantless surveillance program sparked widespread privacy, civil rights and constitutional concerns among some members of Congress and others.

The Amash-Conyers amendment, introduced as part of the Defense Appropriations Act, sought to curb mass, warrantless collection of phone call records of Americans by the NSA. It would have allowed the agency to continue such data collection activity only from specific suspects in anti-terror investigations.

The proposal drew a sharp rebuke from the Obama Administration, which has insisted that the NSA's records collection activity is legal and vital to national security.

The proposed amendment was narrowly defeated by a vote of 205-217 in the House on Wednesday.

"The Amash amendment was a first step for Congress to express its opinion," said Mark Jaycox, a staff attorney at the Electronic Frontier Foundation, which has filed a lawsuit challenging the NSA program. "For such an amendment to garner support is a reassuring sign that privacy has no party and that a near-majority of Congressmen want to stop this program," he said.

Jaycox said the narrow margin of the defeat isn't surprising considering that a majority of American's think that the NSA's use of the Patriot Act to conduct domestic surveillance is "overreaching, invasive, and unconstitutional. Legislative efforts are being pushed in both houses of Congress. And success of legislative reform is sure to come off of this decisive vote and important vote."

The Center for Democracy and Technology, another of many rights groups that have filed lawsuits against the NSA, expressed similar sentiments.

In a blog post, the group expressed disappointment that the amendment was defeated, but added that the close, bipartisan vote "shows that the tide is turning in favor of restoring our fundamental privacy rights."

"This is only the beginning. As public opposition towards this troubling program grows, CDT will continue to press Congress to put an end to the blanket surveillance of millions of innocent Americans," CDT president Leslie Harris said in the post.

Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is jvijayan@computerworld.com.

Read more about privacy in Computerworld's Privacy Topic Center.

Join the CSO newsletter!

Error: Please check your email address.

Tags Gov't Legislation/RegulationNational Security Agencysecurityregulationnsagovernmentprivacy

More about CDTElectronic Frontier FoundationNational Security AgencyNSATechnologyTopic

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jaikumar Vijayan

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts