WASHINGTON, June 20, 2014 (AFP) – The US House of Representatives approved late Thursday a bill that would restrict the electronic surveillance powers of the National Security Agency (NSA).
The margin was wide, 293 to 123, for the bill attached to the defense budget for 2015, which begins October 1.
For now, however, the bill will have no effect on the NSA as it has not been debated by the Senate.
But the message from the lower house is clear.
It wants to embrace a court ruling and bar the National Security Agency from using personal electronic information from US citizens without a prior court order.
As it currently stands, under the so-called Prism program, the NSA focuses on foreign targets on the Internet via Facebook, Gmail and other services.
But the NSA has acknowledged it used information taken from the servers of such companies, without approval from a judge.
The Constitution and US laws require that the government obtain a court order before searching among data of US citizens.
Thursday’s amendment would bar the NSA from carrying out any search without a court order, including information from Americans, even if their communications were picked up inadvertently.
The bill would bar the NSA and the CIA from including secret “back doors” allowing the NSA to skirt coded gateways and gain access to users’ personal data. The NSA is accused of having done this for several years.
A year after the revelations made by former NSA contractor Edward Snowden, Congress is still debating how to reform US surveillance programs.

More from AFP
- France Punishes Clearview AI For Failing To Pay Fine
- Twitter Celebrity Hacker Pleads Guilty in US
- Pro-Russian Hackers Claim Downing of French Senate Website
- Microsoft Expands AI Access to Public
- Hackers Promise AI, Install Malware Instead
- Australian Finance Company Refuses Hackers’ Ransom Demand
- Tesla Sued Over Workers’ Alleged Access to Car Video Imagery
- Secret US Documents on Ukraine War Plan Spill Onto Internet: Report
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
