Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Communications Government Privacy United States

Congress Passes Bill Allowing Warrantless Forfeiture of Private Communications 379

Prune writes Congress has quietly passed an Intelligence Authorization Bill that includes warrantless forfeiture of private communications to local law enforcement. Representative Justin Amash unsuccessfully attempted a late bid to oppose the bill, which passed 325-100. According to Amash, the bill "grants the executive branch virtually unlimited access to the communications of every American." According to the article, a provision in the bill allows “the acquisition, retention, and dissemination” of Americans’ communications without a court order or subpoena. That type of collection is currently allowed under an executive order that dates back to former President Reagan, but the new stamp of approval from Congress was troubling, Amash said. Limits on the government’s ability to retain information in the provision did not satisfy the Michigan Republican."
This discussion has been archived. No new comments can be posted.

Congress Passes Bill Allowing Warrantless Forfeiture of Private Communications

Comments Filter:
  • by Karmashock ( 2415832 ) on Thursday December 11, 2014 @04:31PM (#48576309)

    ... mandatory. Seriously, what is the NSA going to do when the consequences of their arrogance propagate fully through our information culture? Eventually, everything of consequence is going to be held on private servers using private encryption keys that no one has access to but the users. The actual servers that push the information around are going to be shuffling around black boxes.

    • by Anonymous Coward on Thursday December 11, 2014 @04:32PM (#48576323)

      But cloud is great, right? They told me cloud is great!

      • No one with a clue believes that anymore.

        • by roc97007 ( 608802 ) on Thursday December 11, 2014 @05:04PM (#48576677) Journal

          Unfortunately, I suspect that anyone who is not a geek or privacy advocate still believes it.

          • by Anonymous Coward on Thursday December 11, 2014 @05:08PM (#48576711)

            Anyone who is a geek and/or privacy advocate never believed it.

          • The NSA: "Made in China"... Full communist cultural adoption... Next: Human sterilization lotteries...

          • by Karmashock ( 2415832 ) on Thursday December 11, 2014 @05:11PM (#48576735)

            Good thing geeks are responsible for building the entire information backbone.

            Look, decoding things client side isn't expensive. It isn't a big deal. All you have to do is retrain a copy of the decryption engine and key client side. Which means if you're running a large company network that hosts all company files on data centers in the "cloud" then all the IT guy has to do is maintain ONE tiny server client side that serves those two things to the clients. Which they download as part of their login script... etc etc etc.

            It isn't hard. And when that is in place... assuming the NSA has total control over the data center that is the cloud... what exactly do they have? Jack and shit.

            • by currently_awake ( 1248758 ) on Thursday December 11, 2014 @06:06PM (#48577321)
              A law giving the NSA authority to intercept all communications means that your corporate crypto server will be copied, giving them all your keys so they can decrypt everything. If you want security it must be done entirely at the client side, with only the client having the keys. Any central crypto means they get everything. Also you should assume Microsoft and Google are working for the NSA, so they can patch your OS to copy your client side keys to the NSA if required.
      • Not if you're standing under it and it rains down in torrents.

      • by Frobnicator ( 565869 ) on Thursday December 11, 2014 @06:55PM (#48577753) Journal

        But cloud is great, right? They told me cloud is great!

        Yes, cloud is great as a convenience for you.

        It is also great as a convenience for NSA and other agencies. The text of the bill allows that anything that was encrypted can be kept indefinitely. If your web site says HTTPS then it is fair game for permanent governmental storage.

        Also, they can retain it forever for a number of reasons:

        From the bill now on its way to the President's desk: "(3)(B) A covered communication shall not be retained in excess of 5 years unless ... (ii) the communication is reasonably believed to constitute evidence of a crime ... (iii) the communication is enciphered or reasonably believed to have a secret meaning; (iv) all parties to the communication are reasonably believed to be non-United States persons;"

        #2 should be troubling. Does your communication (which is not limited to just email, but also includes web pages and any other data) have any evidence of a crime? Evidence that you downloaded a movie or software from a warez site, or looked at porn as a minor, or violated any of the policy-made-crimes that even the federal government has declared they are not countable? [wsj.com] With an estimate of over 300,000 'regulations-turned-crime', plus laws that incorporate foreign laws (the Lacey Act's criminalization of anything done "in violation of State or foreign law"), pretty much anything you do probably violates some law somewhere in the world. Better preserve it just in case somebody eventually wants to prosecute you for that crime someday.

        #3 refers back to a vague definition of "enciphered" that does not just mean encryption. The "secret meaning" could be as simple as data inside a protocol, Who is to say that the seemingly random bytes "d6 0d 9a 5f 26 71 dd a7 04 31..." used as part of a data stream are really not an encrypted message? Better record it just in case.

        And of course #4, the law has a careful wording about communications between "non-United States persons". Considering the "internet of things", all those devices talking to other devices are not communications between United States persons. It was your camera (a non-United States person) communicating with a data warehouse (a non-United States person), so better exempt that from the 5-year retention policy as well.

        • My read of #3:

          "Hi Mom, I baked a couple of really good pans of cornbread with the cornmeal you sent me" just might be code for "Hi Muhammad, received the PCX and both bombs are now ready". You can never be sure, right?

    • Re: (Score:3, Informative)

      Don't forget it is the NSA who approves what type of encryption are legal for citizens to own. In the case of AES relies solely that combining 256 random bits with 256 non random bits, sufficiently, is too difficult to decipher except for the most powerful computer systems.

      • by Karmashock ( 2415832 ) on Thursday December 11, 2014 @04:59PM (#48576601)

        They can't practically stop people from using any kind of encryption. Once the encryption procredure is handled entirely client side, how would you even know if the data was encrypted to spec unless you tried to decrypt it? And that's an awkward thing to admit to people that are assuming your service doesn't even try to do that.

        Really, the whole NSA mission against general data has a big expiration date hanging on it. The cloud concept is obviously dead in the water in the long term unless the encryption keys and engine is kept client side. And are the terrorists of the future really going to be sending their terrorist plots over email and conventional cell phone calls? I can think of hundreds of ways to send information of an extremely criminal and national security relevant nature... completely anonymously... forever.

        The only reason they're getting anything now is because our enemies are computer illiterate. That is like relying on your enemy being literally illiterate... forever. It isn't going to happen.

        The whole thing is a giant waste of time and money. IF they had half a clue, they'd do their best to convince everyone that they're not actually going to wire tap everyone secretly. I know they say that all the time but they're not very convincing at it are they? Exactly. To be convincing, they need to be subtle. Which means the giant data centers and big laws flowing through congress are the opposite of what they should be doing IF they had a clue.

        But they quite clearly don't have a clue so they're just going to spend billions of tax payer dollars to accomplish jack shit. As usual.

        • by AaronLS ( 1804210 ) on Thursday December 11, 2014 @05:13PM (#48576749)

          Not disagreeing with you, but want to clear up what it means to make cloud storage, or any type of server storage, secure and inaccesible from court orders:

          In the case of dropbox, data is stored encrypted, but the server software holds the encryption keys so it can serve the data to clients unencrypted. This means subpeanas and other legal/law enforcement actions can access the data by going to the server operators, who likely will not challenge the order.

          If you instead encrypt the data client side before you send it to the server, then everyone who accesses the data must also have the key.
          What if you want to revoke access for one person? You have to download the data client side, decrypt/re-encrypt with a new key, reupload, provide key to remaining sharers. So this technique only really works for data that you do not share, i.e. just your personal stuff, and is essentially what people do now when they encrypt data before uploading it to dropbox.

          Asymmetric techniques don't really apply here unless you're only sharing with one party. You combined your private key and their public key to encrypt the data, then only they can decrypt it. This does not work when dealing with 3 or more parties, unless some are going to share the same key for one side of the asymmetric encryption, in which case you're back to the same problem we had with sharing a symmetric key.

          • You're assuming it is either/or.

            You have per client access rules and passively encrypt everything. What is more, the encryption keys can be held on office thin clients that transparently download the decryption engine and keys from an onsite server which likewise can serve both to remote users as part of their login script.

            Non-technical people won't even know it is happening. Technical people will of course. If you want to keep things just a bit more secure, you can have remote clients RDP into a Terminal s

            • "What is more, the encryption keys can be held on office thin clients that transparently download the decryption engine and keys from an onsite server which likewise can serve both to remote users as part of their login script."

              This would be a great architecture for a business when talking only about accessing data that is shared among employees.

              However, if they want to share certain files with another business to remotely access the encrypted data, then you have to also share the encryption key to support

              • Not really, if you want to give another company access to your data, are you intending to give them total access to ALL your data or specific access to specific files?

                If only specific files, then simply decrypt those and host them separately with either a key you are willing to share or no key at all.

                This is not rocket science.

                As to individuals sharing with other individuals... same thing. Decrypt, host separately... done.

            • Someone could probably make a business of exactly the architecture you describe, providing a small onsite appliance that does this orchestration. So you use their cloud storage solution, and they provide an architecture that guarantees only your onsite appliance has the keys capable of decrypting the data.

              • If you want to sell people an appliance they don't need.... sure. You could host something like this on pretty much anything. Grab a raspberry pi for whatever they're selling for now... or one of their more powerful competitors that are about the same price... and that is all you need. Or simply host the files on a file server that is already resident on your network. Pretty much any office network is going to have a file server of some description. Any of them can handle this operation. The work of bringin

          • Re: (Score:3, Interesting)

            by Anonymous Coward

            Why not use the protocol that PGP uses? The data is encrypted with one symmetric key that is unique to each packet or archive. Then copies of that symmetric key are encrypted with each party's public key. So, the sender sends to nine others, there are ten public keys attached that can decrypt the data's volume key, assuming the sender wants to retain the ability to read the contents.

            The hard part is making sure the keys belong to the right people. However, this isn't that difficult. That is what keysig

        • by currently_awake ( 1248758 ) on Thursday December 11, 2014 @06:15PM (#48577405)
          Private spying gets you information, public spying gets you intimidation. Possibly they have changed their goals.
      • >In the case of AES relies solely that combining 256 random bits with 256 non random bits

        In the case of AES relies solely that combining 128, 192 or 256 random bits with 128 non random bits

        There, fixed that for you.

        • Thanks TechyImmigrant! Lost track of the block size for a moment. Over the last three years, I've been developing a block cypher. I was surprised to see that AES sole security is XORing the key with mono-substitution translations of the plain text. The 128 bit version can be broken on my laptop...

          • >The 128 bit version can be broken on my laptop...

            That's rather exciting. How does the attack work?

            • It doesn't. As far as I can tell from his vague description of XOR'ing "random bits" with "nonrandom bits", he's talking about a very specific mode of using AES, which is OFB or CTR. In both cases it is clearly documented that reusing the key stream would destroy security. As long as you follow the specification for these modes it is secure.

        • You forgot N number of hashings. For added delight, pass it over again with another key. Or do it several times, so long as you remember your sequence. Forgot it? Oh dear.

      • Don't forget it is the NSA who approves what type of encryption are legal for citizens to own.

        There is no illegal encryption — not in the US. You can use anything you can get your hands on.

        Now, getting your hands on something, the NSA can't break, may be difficult — because they have sabotaged efforts to develop strong crypto [techdirt.com]. But not because it is illegal.

        That said, the existing freely available software — including OpenSSL — can be used properly to defeat would-be spooks. We know [washingtonmonthly.com] this — and the observation is confirmed by occasional stories on how the government leans on companies to reveal the private keys [cnet.com]. If they could break the encryption itself, they wouldn't be demanding keys...

      • by mlts ( 1038732 )

        Incorrect. The NSA/NIST produce official, standardized versions of crypto libraries (which is a good thing because there are a lot of people who are clueless about the math principles behind crypto, and would use something braindead like ECB, or if hashing passwords, not bother with a salt.)

        In the early 1990s, there was the Clipper chip that would have Skipjack loaded onto it on a secure site. This was something cryptographers were worried about because once that chip became common, the other shoe would d

    • Don't worry, the encryption problem will be handled by the Terrorist Encryption Prevention Act. Since we all* know that only terrorists use encryption, obviously banning it or allowing law enforcement backdoors is the sensible thing to do.

      * Where "we all know" should be read as "Congress members know".

      • Never going to happen. The banks at the very least wouldn't allow it.

      • Today on CNN, the commentators after the Brennan press conference said that the CIA was correct in saying that no non-bad-guys were killed by drone strikes. That's because the CIA redefined bad-guys to be any human of fighting age (13-60). So, that means that Grandma and your kid brother are free to use encryption, because they definitely aren't terrorists. They get to keep their shoes on at the airport, so there you go!

    • Obligatory http://xkcd.com/538/ [xkcd.com]

      • Sure, but they're not going to beat me with a wrench without a warrant.

        • Sure, but they're not going to beat me with a wrench without a warrant.

          They'll do that and much more. Haven you been living in a cave (like a terrorist)?

    • by Bob9113 ( 14996 )

      Seriously, what is the NSA going to do when the consequences of their arrogance propagate fully through our information culture?

      One thing they'll do is get their oligarch friends to deny services to people who use encryption to keep the government from knowing their identities, like they've been doing with banks and TOR [slashdot.org], by implying that people who use privacy protecting encryption are criminals.

    • PRIVATE encryption of everything just became mandatory.

      Go look back at the bill, start at page 22.

      Observe that unencrypted communications can be retained for five years. But any encrypted communications can be kept indefinitely.

      Also note that the law doesn't say anything about who enciphered it nor about if they are able to decipher it. If it was encrypted at any point along the journey it qualifies for unlimited retention.

  • by Tokolosh ( 1256448 ) on Thursday December 11, 2014 @04:32PM (#48576315)

    If you do not declare this unconstitutional, immediately and unambiguously, then you have failed The People.

    Your credibility is already hanging by a hair.

    • Re: (Score:3, Informative)

      by Anonymous Coward

      The same SCOTUS that just said your employer can order you to do 25 minutes of security checks without compensation? The copyright extension SCOTUS? The fascism rubber-stampers in black robes? Good-luck.

      • by BarbaraHudson ( 3785311 ) <barbara.jane.hud ... minus physicist> on Thursday December 11, 2014 @04:43PM (#48576427) Journal
        What if those communications are contained in your phone, tablet, laptop or home computer. Sounds like they can seize all that without a warrant as well ...
      • by mythosaz ( 572040 ) on Thursday December 11, 2014 @05:45PM (#48577121)

        While I disagree with the 25-minute screenings, I'm not paid for walking through security, taking the elevator and logging into my workstation either.

        SCOTUS merely maintained what was already in the Portal to Portal act: that things relevant to the job itself (e.g. butchers sharpening their knives) got paid, and that security searches were analog to time spent driving to work or taking the a long flight of stairs to your office.

        Integrity Staffing Solutions, Inc. are, unquestionably, a bunch of shit-bags who should move the time-clocks to the other side of the sometimes up-to 25 minute screening machines, but it's not exactly like SCOTUS is out to screw people on this one. Someone in risk management there realized that they'd still be more profitable with the tiny bit of bad press and some legal fees than to pay overtime.

        Eat a bag of dicks Integrity Staffing Solutions, Inc. -- but I don't blame SCOTUS.

        • by jedidiah ( 1196 )

          Oh. I will blame SCOTUS.

          This isn't something that's an inherent part of getting to work. This is an extra burden specifically put in place by the employer. It is a REQUIREMENT demanded of employees. It doesn't matter if it is "relevant" to the job or not.

          If your employer says you have to stand on one leg for 25 minutes before and after a shift, that's time that they owe you in compensation. They are stealing your time and the gatekeepers are allowing it.

    • Don't worry, I'm sure President Obama won't sign this bill [salon.com].
      • He doesn't have to for it to become law anyways, 325-100 is a veto-proof margin.

        • by fnj ( 64210 )

          But he controls NSA. He tells them what to do and what not to do. Hell, a President (Truman) created NSA without any say-so from Congress. That's why they call him the Chief Executive. Congress could arguably ban the NSA completely, but in the absence of something it will never do, its participation in setting up the NSA was never required, and its participation in the NSA's continuing existence is not required now.

          As for the Supreme Court, how many legions of law enforcement and, in the ultimate rubber-mee

        • He wouldn't have voteoed it regardless of the margin. He's basically Dubya II.

    • by Sycraft-fu ( 314770 ) on Thursday December 11, 2014 @04:42PM (#48576401)

      The court can't just jump up and say "We don't like that, it goes out." They have to follow procedure which means a challenge has to appear in front of them. That challenge can also only be brought by someone with standing, meaning that this law had a negative impact on you somehow.

      That's one of the reasons the government loves the secret gathering so much, makes it harder for it to get challenged. If you can't show this harmed you, then you can't fight it in court.

      So someone has to be impacted by this, challenge it, and it has to be appealed up to the SC. Then and only then do they rule on it.

    • by rwa2 ( 4391 ) *

      Still looking for a political solution? Look for the silver lining... if everyone KNOWS that the government is mining your communications for whatever ends they see fit, then that's all the more reason to apply technical solutions to the problem. We've been trying forever to get people to start encrypting their emails and stuff, this might be the thing that finally gets everyone to accept real technological measures for achieving encryption and anonymization on the internet.

      I, for one, am kinda glad that

    • Actually, the SCOTUS isn't the final arbiter, the people are. The DoI clearly sets forth a framework where tyrannical government can be overthrown.

      I define Tyranny as any government serving its own interest (the interest of the Government itself) over that of the people. Yes, we have an elected tyranny, not because of the elected officials (which we change) , but because the bureaucracy that powers the real "government" isn't elected.

      This is the police state that serves itself.

      • by fnj ( 64210 )

        The Declaration of Independence is an apologia in the true and noble sense of the word, but it does not convey any legal framework. The Constitution does that. So yes, the people are the source of power and the recourse when the government has gone rogue, but note well that they then act extra-Constitutionally and absent any legal foundation - just as the agents of the Revolution did. And they are subject to perfectly legal prosecution for treason - just as the agents of the Revolution were. It takes a hell

    • Don't worry, the Roberts Court will be fine with this.
    • To quote TFA:
      "Hidden in the law is âoea troubling new provision that for the first time statutorily authorizes spying on U.S. citizens without legal process,â Amash told other lawmakers. That provision allows âoethe acquisition, retention, and disseminationâ of Americansâ(TM) communications without a court order or subpoena."

      I really hope someone can tell me that isn't as bad or as pervasive as that sounds. I wasn't surprised the USA Freedom Act didn't pass, but I didn't think we we

  • Ok Justin (Score:5, Insightful)

    by Anonymous Coward on Thursday December 11, 2014 @04:33PM (#48576331)

    I have actually met this guy in person, I have nothing against him, but holy shit. Before he actually cared and I would have backed him up 100% opposing this without question. But he seems to have gone for the republican kool aid and somehow wants to blame this on.... the executive branch.

    Look man, the executive branch doesn't make laws and the law enforcement agencies that report to it already had this power. This is congress who isn't part of the executive branch passing the law. Don't go in there a decent guy and come out a soulless husk spewing what you hear on Fox News. Don't try to shift blame on that 'Obama' fictional character everyone seems to want to. You're better than that.

  • by Anonymous Coward on Thursday December 11, 2014 @04:37PM (#48576361)

    Dear Colleague:

    The intelligence reauthorization bill, which the House will vote on today, contains a troubling new provision that for the first time statutorily authorizes spying on U.S. citizens without legal process.

    Last night, the Senate passed an amended version of the intelligence reauthorization bill with a new Sec. 309—one the House never has considered. Sec. 309 authorizes “the acquisition, retention, and dissemination” of nonpublic communications, including those to and from U.S. persons. The section contemplates that those private communications of Americans, obtained without a court order, may be transferred to domestic law enforcement for criminal investigations.

    To be clear, Sec. 309 provides the first statutory authority for the acquisition, retention, and dissemination of U.S. persons’ private communications obtained without legal process such as a court order or a subpoena. The administration currently may conduct such surveillance under a claim of executive authority, such as E.O. 12333. However, Congress never has approved of using executive authority in that way to capture and use Americans’ private telephone records, electronic communications, or cloud data.

    Supporters of Sec. 309 claim that the provision actually reins in the executive branch’s power to retain Americans’ private communications. It is true that Sec. 309 includes exceedingly weak limits on the executive’s retention of Americans’ communications. With many exceptions, the provision requires the executive to dispose of Americans’ communications within five years of acquiring them—although, as HPSCI admits, the executive branch already follows procedures along these lines.

    In exchange for the data retention requirements that the executive already follows, Sec. 309 provides a novel statutory basis for the executive branch’s capture and use of Americans’ private communications. The Senate inserted the provision into the intelligence reauthorization bill late last night. That is no way for Congress to address the sensitive, private information of our constituents—especially when we are asked to expand our government’s surveillance powers.

    I urge you to join me in voting “no” on H.R. 4681, the intelligence reauthorization bill, when it comes before the House today. /s/

    Justin Amash
    Member of Congress

    • by Qzukk ( 229616 ) on Thursday December 11, 2014 @04:54PM (#48576561) Journal

      I urge you to join me in voting “no” on H.R. 4681, the intelligence reauthorization bill, when it comes before the House today.

      Thank you for posting the bill number, since neither slashdot nor the hill thought we should be able to look it up and see who voted for this bullshit [govtrack.us].

      It appears in the Senate it was passed by voice vote [govtrack.us] by a bunch of cowards that did not want their name attached to the bill.

      • My Tea Party representative voted against the bill, although I cannot be sure why. In the past he has supported civil forfeiture. I made a point of writing him a thank you note to balance my previous rap on the knuckles. My thank you noted my assumption that his vote was in support of Amash.

        OTOH, my state's only Democrat voted yea.

      • Re: (Score:2, Insightful)

        by Anonymous Coward

        I hope that most of the congress voted in favor of this out of ignorance. It appears to have passed through both the house and senate under the guise of a routine reauthorization of existing process.

        My hope is that the statutory authorization of warrantless wiretapping was surreptitiously added in the hope that no one would notice. Much like the banking giveaway, the massive increase in individual campaign donations, and the de-legalization of marijuana in DC have been added to the big spending bill. I s

      • by fnj ( 64210 )

        Ban the fucking voice vote, goddammit. It's only a rule of the Senate that allows it. The term does not occur in the Constitution.

    • Thanks for providing this, AC. I don't know what Mr. Amash is talking about. Section 309 [view-source] doesn't grant any blessing of Executive Order 12333, or any other mechanism of collection. It just states that if any collection takes place without a court order, then it must be disposed of within 5 years with a few very-specific exceptions. The sky is not falling people. Do your research before you freak out based on alarmist stuff like this.
  • by Kazoo the Clown ( 644526 ) on Thursday December 11, 2014 @04:40PM (#48576391)
    No pretense they have any respect for the Constitution, due process or the privacy of citizens. There's no doubt everyone will have to take matters into their own hands now. No doubt they'll make that illegal too, at which point only criminals will have any privacy.
  • by C. Mattix ( 32747 ) <cmattix AT gmail DOT com> on Thursday December 11, 2014 @04:42PM (#48576415) Homepage

    I get to break this out again:

            As the Americans learned so painfully in Earth's final century, free flow of information is the only safeguard against tyranny. The once-chained people whose leaders at last lose their grip on information flow will soon burst with freedom and vitality, but the free nation gradually constricting its grip on public discourse has begun its rapid slide into despotism. Beware of he who would deny you access to information, for in his heart he dreams himself your master.
                    Commissioner Pravin Lal, "U.N. Declaration of Rights"
                    Accompanies the Secret Project "The Planetary Datalinks"

    • Unfortunately for us, it's not just denying access to information, but mandating access to our own information. What has yet to be tested is what legally happens when you generate a random file and send it to someone. If asked, how can you prove it's not an encrypted file? There is no key that can be used to unlock it!

      • In the UK that could get you an infinite prison sentence.

        You can be locked up for 2 years for not revealing an encrption key.

        Then another 2 years if you don't reveal it after that.

        Ad infinitum.

  • by FlyHelicopters ( 1540845 ) on Thursday December 11, 2014 @04:44PM (#48576445)

    Obama is just as bad... that doesn't excuse Bush from his errors, and he had many...

    But frankly, if Obama doesn't Veto this, then he is the same scum of the Earth and frankly both sides need to be tossed out on their bums...

    Voting third party may not bring in "better", but it will at least do SOMETHING different than the Repubs and Dems who are different sides of the same coin...

    • by jmyers ( 208878 )

      Unfortunately the vast majority people do not think (or vote) rationally when it comes to politics. The same people that hated Bush and ridiculed him will continue to love Obama and rationalize a reason to support policies they previously despised. People who loved Bush will rationalize ways to hate Obama for the exact same policies that they loved under Bush. I have given in to the fact this will not change. Allegiance to political party is similar to sports teams i.e. Caroline fans hate Duke no matter wha

    • But frankly, if Obama doesn't Veto this, then he is the same scum of the Earth and frankly both sides need to be tossed out on their bums...

      It doesn't matter, he can't veto it. 325-100 is a veto-proof passage.

      • It doesn't matter, he can't veto it. 325-100 is a veto-proof passage.

        My understanding is that he can. Congress could then override the veto with a 2/3 majority of both the House and the Senate, but at least the President would be on record that he refused to approve the bill.

  • That's the solution create an interconnected web of wlan and lan routes - also long ranges - freenet has some nice routing algorithms, and tons of encryption, now it just must be ported away from java.

    It won't be that fast, but I think fast enough.

  • by Verdatum ( 1257828 ) on Thursday December 11, 2014 @05:04PM (#48576675)
    Here's the important part: "That type of collection is currently allowed under an executive order that dates back to former President Reagan, but the new stamp of approval from Congress was troubling, Amash said."

    In other words, the only issue he has with this bill is that it acknowledges an Executive Order is in place. It doesn't even particularly bless it. Nothing is changing other than a slightly-less tacet approval of an order that has been around for decades. It's not a terribly long bill, check it out yourself [congress.gov]

  • by azav ( 469988 ) on Thursday December 11, 2014 @05:17PM (#48576801) Homepage Journal

    When everything you say or do is recorded by the authorities, do you really want to be part of that world?

  • All your papers are belong to us.
  • No, it's not "currently allowed under an Exec Order".

    Neither the constitution, nor the laws bound by it, nor the orders bound by the law are "bigger on the inside"... They're not TARDISes. They may not exceed their legal limits.
    Laws must not exceed the authority routed to them by the constitution. Orders must not exceed the authority routed to them by law. That's how the system is designed.
  • Congress just declared war on America,,,,

  • by hackshack ( 218460 ) on Thursday December 11, 2014 @05:41PM (#48577061)

    So they can't settle on a decent healthcare system for us, but when it comes to spying on us... push it right through!

  • by MinamataHG ( 2621917 ) on Thursday December 11, 2014 @05:57PM (#48577235)

    https://www.govtrack.us/congre... [govtrack.us]

    If your congressman voted YEA and you don't agree, write to him/her.
    They are representing you.

  • by rickb928 ( 945187 ) on Thursday December 11, 2014 @06:43PM (#48577649) Homepage Journal

    We really do have to throw them all out...

  • by sconeu ( 64226 ) on Thursday December 11, 2014 @06:52PM (#48577731) Homepage Journal

    What part of

    The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

    does Congress not understand?

  • by Loki_1929 ( 550940 ) on Thursday December 11, 2014 @07:56PM (#48578153) Journal

    But fuck these assholes. Fuck all of them; every one of them who voted for this shit. Fuck them regardless of their party or their stances on other issues, or their charity work, or their stupid kids, or their veteran status. Fuck 'em. Burn in Hell you pieces of shit.

"In my opinion, Richard Stallman wouldn't recognise terrorism if it came up and bit him on his Internet." -- Ross M. Greenberg

Working...