US House votes to stop NSA’s mass surveillance
USA Freedom Act passed by House of Representatives with overwhelming support


The US House of Representatives has voted to end the NSA's widespread surveillance of American citizens.
Members voted 338 to 88 to support the USA Freedom Act, a measure that amends and extends parts of 2001's much-discussed USA Patriot Act.
One of its clauses is the banning of the NSA from bulk-collecting US citizens' phone records, emails and web addresses.
According to Representative Goodlatte, the Judiciary Committee chair, one of the bill's driving forces, the NSA's blanket surveillance "has not ceased, and will not cease, unless and until Congress acts to shut it down".
This mass-scale data collection was the source of much controversy when it was revealed by Edward Snowden in 2013.
The ex-NSA contractor leaked huge amounts of info related to programmes like PRISM and MYSTIC, and fled to Russia to avoid government sanctions.
The methods and scale of these spying operations led to a federal appeals court deeming them illegal last week, and both rulings have been met with support from privacy advocate groups.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Although the bill has now been passed by the House, it must still be ratified by the Senate in order to make it onto the statute books, having already received presidential approval.
However, current Senate majority leader Mitch McConnell has previously introduced bills designed to extends the NSA's powers rather than curtail them.
There are those in the Senate in favour of the bill, though, and both Senators Rand Paul and Ron Wyden have previously threatened to filibuster extensions of Patriot Act powers.
Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.
Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.
You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.
-
Palo Alto Networks snaps up CyberArk in identity security push
News The acquisition marks the latest in a string for Palo Alto Networks
-
Stack Overflow CEO Prashanth Chandrasekar on embracing AI
Q&A The chief executive at the well-known developer resource Stack Overflow talks future strategy and how AI has forced the company to shift its focus
-
Data (Use and Access) Act comes into force
news Organizations will be required to have an effective data protection complaints procedure and fulfil new requirements for online services that children are likely to use
-
UK businesses patchy at complying with data privacy rules
News Companies need clear and well-defined data privacy strategies
-
Data privacy professionals are severely underfunded – and it’s only going to get worse
News European data privacy professionals say they're short of cash, short of skilled staff, and stressed
-
Four years on, how's UK GDPR holding up?
News While some SMBs are struggling, most have stepped up to the mark in terms of data governance policies
-
Multicloud data protection and recovery
whitepaper Data is the lifeblood of every modern business, but what happens when your data is gone?
-
Intelligent data security and management
whitepaper What will you do when ransomware hits you?
-
How to extend zero trust to your cloud workloads
Whitepaper Implement zero trust-based security across your entire ecosystem
-
The threat prevention buyer's guide
Whitepaper Find the best advanced and file-based threat protection solution for you