Archive for the ‘NSA’ Category

NSA Used Porn to Break Down Detainees in Iraq and …

After arriving in Baghdad grungy and tired, the staffer would later write, he discovered that the CIA and its partner, the Defense Intelligence Agency, had moved beyond talking to locals and were now intent on looking through their computer files. Marines would bring the NSA man laptops, hard drives, CDs, phones and radios. Sometimes the devices were covered in blood and quite often they contained pornography, deemed extremely useful in humiliating and breaking down for interrogation the people who owned them.

The story of how theNational Security Agency harvested porn for use against prisoners in Iraq is just one of the revelations disclosed in the agencys internal newsletter SIDtoday during the second half of 2005.

Theres also the tale of how some intercepts would be rushed almost instantly to the president at Camp David via golf cart with virtually no oversight.

Then theres one about how the NSA declared it could find not many Arabic translators it could trust among the largest Arabic-speaking population in the United States.

Or the story of how the agency listened as the Egyptian government dictated through its communication channels the final results for an election that had barely begun.

Told in more detail below, these are highlights from some 297 SIDtoday articles published today by The Intercept as part of an ongoing project to release, after careful review, material provided by whistleblower Edward Snowden.

From the same SIDtoday release our sixth thus far we are publishing three other articles. One is an investigation into a secretive global intelligence-sharing alliance led by the NSA, comprising 18 members and known as the SIGINT Seniors. Another looks at increased surveillance in the United Kingdom following the London bombings in 2005 and discloses for the first time a secret agreement to share metadata harvested from the vast data repositories of the NSA and its counterparts in the U.K., Canada, Australia, and New Zealand.

Also today, in collaboration with the Norwegian Broadcaster NRK, we shine light on a large spy base located outside Oslo. The base was built with the NSAs help to aid Norways military and counterterrorism operations overseas. But it has also swept up Norwegian citizens phone and email records and is now at the center of a dispute over illegal surveillance.

The NSA declined to comment for this article.

U.S. Marines of the 1st Battalion 2nd Marines inspect the bedroom of a suspect, while patrolling on Oct. 8, 2004 in the insurgent stronghold of Haswah, 25 miles south of Baghdad, Iraq.

Photo: Scott Peterson/Getty Images

An NSA staffer deployed to Iraq led a counterterrorism and counterintelligence mission involving forensic investigations on computers seized in raids. The staffers Media Exploitation team found pornographic videos and photos alongside thousands of audio files of the Quran and sermons, and recruitment and training CDs with video of bombings, torture, and beheadings. The team jokingly referred to the content as the three big Ps porn, propaganda and prayer.

Reports and files were distributed to the NSA and other intelligence agencies; the staffer was detailed to the Iraq Survey Group, a joint venture between theCIA and the Defense Intelligence Agency to find weapons of mass destruction and disrupt terrorist activities. But among the customers of the material gathered by the NSA staffer were the military units interrogating captured insurgents and suspects. Special Forces interrogators found the pornography extremely useful in breaking down detainees who maintained that they were devout Muslims, but had porn on their computers, according to an account by the NSA staffer in SIDtoday. (The accountmakesno acknowledgment of the human rights abuses by staff at Abu Ghraib prison in Baghdad, which were in the news starting in April 2004, nearly four months before the account was published, and which were, at the time, still under investigation.)

As the conflict with insurgents escalated in Fallujah into Operation Phantom Fury/Al Fajr, NSA staff with top-secret clearances were deployed to the combat zone. Marines gave the NSA staff seized computers, CDs, phones, and radios directly from the battlefield, some covered in blood. This material, too, was used in interrogations that helped keep the bad guys behind bars. No smoking WMD evidence was found, according to the SIDtoday account.

A former interrogator at the U.S. detention center at Guantnamo Bay, Cuba, has said, in a statement obtained by the New Yorker, that pornography was used at the facility to reward some detainees and as a tool against others, who were forced to look at the material. The Associated Press has also reported on the use of pornography at Guantnamo as an inducement.

The intelligence community has also used seized pornography as a form of propaganda. In November 2017, the CIA released files recovered from the fatal raid of Osama bin Ladens hideaway in Abbottabad, Pakistan in an effort to further enhance public understanding of al-Qaida. The agency noted that the overall trove recovered from the compound contained pornography that it was not releasing with the other files. The discovery of pornography on bin Ladens computers in 2011 was leaked to the media within days of the raid, and a New York Times story focused on the porn reported that the adult material will be welcomed by counterterrorism officials because it could tarnish his legacy and erode the appeal of his brand of religious extremism.

Egypts jailed opposition leader Ayman Nur sits in the dock behind bars during his trial at a court in Cairo on Jan. 23, 2007.

Photo: Khaled Desouki/AFP/Getty Images

The NSA used signals intelligence to uncover apparent fraud in a referendum on how Egypts presidential elections would be run.

Rules supported by Egyptian President Hosni Mubarak would allow direct election of the president, abolishing the old system, in which the parliament forwarded a single candidate to voters for approval. But the rules also imposed major barriers to appearing on the ballot, including a requirement that independent candidates win support from 65 of 444 members of parliament and that other candidates come from a party with at least 5 percent representation in parliament which at the time no opposition party held. These requirements engendered significant opposition, including a callto boycott the referendum.

The agency apparently intercepted government communications early on election day, instructing underlings to report a yes vote of about 80 percent and turnout of 40 to 50 percent. Official results then showed a yes vote of 83 percent and turnout of 54 percent, pretty much in line with the instructions. Most foreign observers on the scene described actual voter turnout as very light, nowhere near 50 percent, SIDtoday reported.

The referendum was followed by Egypts historic first multi-candidate presidential election, on September 7, 2005. Although the winner, Mubarak, was a foregone conclusion, there was much interest about whether this vote count would be honest. With only 23 percent voter turnout, Mubarak won 88.6 percent of the vote. The NSAs analysis? SIGINT provided good evidence that there was no massive fraud in the vote count, according to the same senior reporter/subject matter expert who described the suspicious referendum. Local vote totals reported on the day of the election by Egyptian authorities conformed closely to the final results. Also, the runner-up, Ayman Nour, with 7.6 percent of votes, was a surprise to top Egyptian officials who had wanted a different candidate to come in second, the NSA staffer added. The opposition claimed there were irregularities, but Egypts electoral commission was satisfied with the process.

Just three months after the election, surprise favorite Nour was jailed on charges of election fraud and imprisoned for the next five years.

Samuel Chahrour is illuminated by a shaft of light at while praying at the the Islamic Center of America mosque in Dearborn, Mich., Sept. 30, 2005. The Detroit suburb of Dearborn is arguably the capital of Arab America and anchors an estimated 300,000-strong Arab-American community in southeastern Michigan.

Photo: Paul Sancya/AP

As the NSA swept up Arabic communications from Iraq and other hotspots in the global war on terror, it found its translation capabilities severely lacking. This shortcoming must be rectified, an NSA senior language authority wrote in 2004. In September 2005, the agency convened a career invitational in Detroit, hoping to draw on the high proportion of Arabic-speaking residents in the area and recruit them as linguists for a language center on nearby Selfridge Army National Guard Base.

But the invitational may not yield many hires due to unspecified agency concerns about the candidates, an NSA assistant deputy directory wrote in SIDtoday. After gathering 750 resumes, the NSA homed in on 145 potential candidates through preliminary processing, and of these, at least 43 passed two placement exams. These finalists were subjected to special source checks; other documents throughout the Snowden archive use the phrase special source in connection with surveillance operations, including by the agencys Special Source Operations unit, which at one point was said to be responsible for 80 percent of NSA collection, including its notorious PRISM program implying that signals intelligence may have been used to vet the candidates. The special source checks caused eight individuals to be removed from the applicant pool and led to plans for significant and lengthy investigation[s] into at least some of the remaining candidates investigations that may not sufficiently resolve the identified issues, SIDtoday noted. Although the language center on the Selfridge base could accommodate 85 linguists across four daily shifts, the assistant deputy director made clear that filling the seats was far from imminent and wrote, We will continue to review other sites to fill the need for linguists.

The NSAs aggressive probing of Americans of Middle Eastern descent was not confined to job applicants or to Detroit; earlier Intercept reporting on documents supplied by Snowden revealed that the agency used the Foreign Intelligence Surveillance Act to monitor the communications of prominent Muslim-American community leaders and politicians. Internally, the intelligence community continues to lag in employee diversity, with a 2015 report from the Office of the Director of National Intelligence showing that racial and ethnic minorities comprise less than a quarter of the agencies staff.

U.S. President Bill Clinton, center, speaks during a morning meeting with Israeli Prime Minister Ehud Barak, left, and Palestinian Chair Yasser Arafat on July 25, 2000 at Camp David in Maryland.

Photo: Ralph Alswang/Newsmakers

In the course of arguing for more new hires, the deputy chief of the NSAs Middle East and North Africa line told an interviewer in SIDtoday that intelligence provided by the unit had shaped history. One way this occurred was through golf cart reporting. During the 2000 peace talks between the Israelis and Palestinians at Camp David, the NSA intercepted communications on the stances of participating diplomats in near real-time, the deputy chief said, and would stamp draft on it and fax it to a CIA liaison officer up in Thurmont, Maryland who in his own golf cart would race across the grounds to give it directly to the President or Secretary of State. Imagine the thrill and the responsibility of providing with virtually no oversight intelligence going directly to the President!

U.S. negotiators would know the Israeli and Palestinians positions prior to the teams arrival.

The deputy chief further credits his units reporting as the basis for the U.S.s refusal to negotiate with Palestinian Liberation Organization leader Yasser Arafat, stating the division had smoking-gun evidence that Arafat was still supporting terrorism. Its unclear to which precise chapter of Middle East peace talks this claim refers, but President George W. Bush formally refused to accept Arafat as a negotiation partner in 2002, amid speculation that the Palestinian leader was implicated in the 2000 outbreak of the second Intifada.

The Camp David talks were hardly the first instance of NSA diplomatic spying, a key activity for the agency. Previously published documents have shown the agency spying on heads of state, U.N. headquarters, and representatives to a climate change summit.

Mirek Topolanek, chair of Czech opposition Civic Democratic Party, known as ODS, watches a general elections exit poll in the party election headquarters in Prague, Saturday, June 3, 2006.

Photo: Michal Kamaryt/AP

In 2006, then-U.S. Ambassador William J. Cabaniss was worried and unburdened himself to Czech Prime Minister Mirek Topolnek, saying he hoped intelligence-sharing between the two nations would not be adversely affected by structural changes in how Czech intelligence was managed. Topolnek assured the ambassador that things would be fine, despite a transition of a key spy agency to parliamentary control. As described in a State Department cable published by WikiLeaks, the Prime Minister said that UZSI, the foreign intelligence branch, has been effective and we dont want to change that.

U.S. concern over changes at UZSI was understandable, as at least one element of the American intelligence community had spent the prior year gushing over the benefits of newly secured access to UZSI intel. The NSA, as previously reported, was essentially let inside UZSIs SIGINT vault in early 2005. By late 2005, the U.S. and Czech Republic appeared to have officially solidified their Third Party signals intelligence-sharing partnership and UZSI, over the course of at least three visits in six months, presented their American counterparts with a slew of information, largely about Russian government and business interests according to two articles in SIDtoday. These files included information about the communications of Russian and Belarusian arms dealers, banking networks, and counterintelligence targets. They also gave the Americans a program designed to identify Russian words in voice communications. Our ability to jointly produce valuable SIGINT while enjoying each others company and learning about our cultural differences may indeed make this the start of a beautiful friendship, wrote a staffer from the central European branch of the NSAs foreign affairs directorate.

(One of the SIDtoday articles alleged that the Belarus company, BELTECHEXPORT, was involved in weapons proliferation. The U.S. State Department in 2011 imposed, but in 2013 lifted, sanctions against the company for weapons proliferation.)

An anti-imperialist activist sets a tent in front of the Italian Foreign Ministry building in Rome, Thursday, Sept. 1, 2005.

Photo: Gregorio Borgia/AP

A previous SIDtoday release noted the NSAs interest in a European leftist group called the Anti-Imperialist Camp. The NSA had accused the group of toeing a line between legitimate political activity and abetting terrorism. In a later SIDtoday article,titled Terrorism or Political Action? The Anti-Imperialist Camp Crosses the Line, a member of the NSAs indigenous European terrorism branch describes the AIC as a duplicitous organization and touts the NSAs interception of Anti-Imperialist Camps communications as a pathway into [an] expansive network of extremists and terrorists. The article alleged that the organization maintained contacts with such individuals, and said that insights into [this] expansive network led to the identification of a Jordanian extremist with extensive links to other extremists, a new organization that calls itself the Resistant Arab Peoples Alliance, and several other individuals and groups.

Longtime Anti-Imperialist Camp member and spokesperson Wilhelm Langthaler told The Intercept that he could not identify one single activity, participant, or interlocutor from this list of what SIDtoday strongly implied were contacts of the group.

The SIDtoday article further stated that the U.S. government had recent[ly], as of August 2005, approached the Italian government and demanded the arrest of individuals involved with the Italian wing of the AIC. Several individuals associated with the AIC had been arrested in April 2004 as part of a multinational effort against the Turkish militant organization, DHKP-C. The three AIC members, initially charged with conspiracy or subversive association with an alleged member of the terrorist group, were released and ultimately absolved of all charges in September 2010. In her decision, Judge Beatrice Cristiani observed that if the AIC did indeed help the DHPK-C, it was because they intended to assist a dissident and not a terrorist essentially verifying the groups legitimate political intent, which the NSA so adamantly decried.

NSA analysts can often identify and track particular mobile phones by monitoring cellular networks for 15-digit handset identifiers called the International Mobile Subscriber Identities. Events on the network, like making a call, receiving an SMS text message, or connecting to a new cell tower, are normally tagged with such numbers.

But starting in the 1990s, NSA analysts had struggled whenever cellular networks implemented Temporary Mobile Subscriber Identities (TMSIs), according to a July 2005 SIDtoday article. TMSIs obscure the true identities of the cellular subscribers being referenced in call records, location events, and SMS, the author wrote, because TMSIs can change every few hours or even with every phone call. And, to make matters worse, two cellular networks in Iraq had just implemented TMSIs, obscuring the NSAs collection efforts there.

The ASSOCIATION program solved this problem. With advances in metadata collection, processing, and storage, the NSA discovered thatit could use individual metadata records to work backward from a TMSI to obtain the original IMSI and thus, associate cellphone events with the exact phone that made them.

A guest uses Skype and Microsoft automatic translation software to live-chat with a man in China during the Microsoft Innovation and Policy Centers TechFair, June 10, 2015 in Washington, D.C.

Photo: Chip Somodevilla/Getty Images

At the end of 2005, the NSA faced serious new challenges in spying on Skype calls. At the time, Skype was a 2-year-old service that was growing in popularity. At this time, SIGINT targets have a method to freely obscure their communications on the global Internet, an analyst wrote in SIDtoday, thus hindering our ability to collect vital communications intelligence.

Unlike traditional phone calls, anyone with internet access anywhere in the world could make a free, anonymous Skype account, identified only by a username. And unlike the phone network,in which calls get routed through (and eavesdropped on) at central offices, Skype calls were peer-to-peer, making central eavesdropping impossible. On top of all this, Skype calls were also encrypted, and the NSA did not yet know how to decrypt them.

A reader wrote a letter to the editor pointing out that internet calling systems like Skype also complicate the NSAs ability to comply with USSID-18, an NSA policy through which the agency attempts to not spy on Americans. Anyone with any brains will register a U.S. phone number for their account, they wrote, even though this phone number can be used from anywhere in the world.

The NSAs troubles with spying on Skype calls were eventually resolved. New York Times reporting, based on Snowden documents, revealed that in 2008, Skype began its own secret program, Project Chess, to explore the legal and technical issues in making Skype calls readily available to intelligence agencies and law enforcement officials.

Archive of thefacebook.com at Feb. 12, 2004.

Image: Facebook

Social networking is truly the wave of the future, Eric Mesa, a young software engineer at the NSA wrote in a December 2005 letter to the editor of SIDtoday. A lot of you may not know this, but college students (of which I finally ceased to be in May 2005) have been voluntarily assembling their own social networks online!

He went on to describe a service known as The Facebook and explained how it worked, including that through the link visualize my social network they can see a diagram similar to the ones we use to map terrorist networks.

Top photo: U.S. Marines escort nine detainees captured in Fallujah, half of them from other countries such as Yemen, Saudi Arabia, and Gulf states, to a local prison as other U.S. Marines of the 1st Battalion 3rd Marines, Alpha company engage four insurgents during house searches on Nov. 23, 2004 in Fallujah, Iraq.

Read more:
NSA Used Porn to Break Down Detainees in Iraq and ...

NSA shooting: Officer injured at Fort Meade security gate …

Three people were injured at Fort Meade early Wednesday when the driver of an SUV attempted to enter the National Security Agency compound, authorities said.

Thursday update: 1 suspect transferred, 2 released

The driver and two passengers in the black SUV were taken into custody after the incident shortly before 7 a.m. at Gate 1 on Canine Road off Maryland Route 32. A spokesman for the FBIs Baltimore field office said late Wednesday that investigators are examining the possibility that the driver might have made a wrong turn into the complex, but it is not the only theory they are considering.

Injured were an NSA police officer, the driver of the SUV and a civilian bystander, said Gordon B. Johnson, special agent in charge for the FBIs Baltimore office. He said the SUV had three occupants.

Johnson described the encounter as an isolated incident."

I cannot emphasize enough that we believe there is no indication that this has a nexus to terrorism, Johnson said.

The FBI is taking the lead in the investigation. Johnson told reporters Wednesday that only limited information was available to be shared.

He said shots were fired during the incident, but did not believe any of the injuries were caused by gunfire. He would not say who opened fire, but said it appeared the gunfire was directed at the vehicle.

Authorities had not released the names of the people in the SUV Wednesday evening.

Johnson said all were male but he did not know their ages. Two occupants of the vehicle were in custody of the NSA. The driver was hospitalized.

We are trying to talk to them to understand why they were here, Johnson said.

The injuries to the police officer and civilian onlooker were not considered life-threatening, he said. He said he did not have information on the condition of the driver.

Johnson said the driver of the SUV attempted to enter the NSA campus at about 6:55 a.m. The vehicle had New York plates. Investigators believe it was a rental.

This vehicle did come onto the NSAs compound unauthorized, Johnson said. NSA police responded accordingly.

Television footage showed the vehicle with bullet holes in the window, stopped against a white concrete barrier bearing the letters NSA.

Authorities shut Route 32 down in both directions at Canine Road during the morning rush hour. Anne Arundel County fire personnel assisted the Fort Meade Fire Department in clearing the scene around 8:45 a.m. The Maryland State Highway Administration reopened the road before 9 a.m.

Anne Arundel County school officials said operations at nearby Meade Senior High School were not affected.

President Donald J. Trump was briefed on the shooting, spokeswoman Lindsay Walters said, and the White House offered thoughts and prayers with those who have been affected.

In March 2015, an NSA police officer shot and killed the driver of an SUV at an entrance to the agencys campus.

In that case, authorities said the driver ignored orders to turn around and then accelerated toward an officer.

The officer shot at the vehicle, killing the driver and wounding a passenger.

Baltimore Sun Media Group reporters Kevin Rector, Ian Duncan, Sean Welsh, Ellen Fishel and Rachael Pacella and The Associated Press contributed to this article.

Go here to see the original:
NSA shooting: Officer injured at Fort Meade security gate ...

Shots fired as unauthorized vehicle tried to enter NSA …

Shots were fired Wednesday morning as an unauthorized vehicle tried to enter the secure campus of the National Security Agency's headquarters in Fort Meade, Md. authorities said.

The incident happened shortly after 7 a.m. ET and "weapons were discharged in the course of the incident, which remained under investigation at this time," NSA spokesman Tommy Groves said in a statement.

"The situation is under control and there is no ongoing security or safety threat," Groves added. "The FBI is presently leading the investigation."

Three men, including the driver, were inside the unauthorized vehicle at the time of the incident, and investigators believe the car was a rental, according to Gordon Johnson, special agent in charge of the FBI's Baltimore field Office. The FBI is investigating why shots were fired, Johnson said, but preliminary information indicates the gunfire was directed at the vehicle.

"Thats part of the investigation, to determine exactly what happened here," Johnson said at a news conference Wednesday afternoon. "This vehicle did come onto the NSA compound unauthorized and NSA has a series of protocols that they respond to these types of events, so that is part of our investigation and one of the questions were trying to answer."

NSA police took three people into custody, Groves said, adding that the incident is not terrorism-related.

The driver of the car, an NSA police officer and a civilian onlooker were injured during the incident and transported to a local hospital, according to Johnson. While he didn't know the status of the wounded driver, Johnson said the injuries sustained by the officer and the civilian were described as not life-threatening.

Groves, the NSA spokesman, said earlier that preliminary reports indicate the injuries were not from gunfire.

Sources told ABC News the injuries were vehicle-related.

An earlier statement from the NSA said the incident took place "at one of NSAs secure vehicle entry gates."

FBI agents responded to the scene, working in collaboration with NSA police, sources told ABC News.

The investigation is ongoing.

ABC News' Becky Perlow and Morgan Winsor contributed to this report.

See the original post:
Shots fired as unauthorized vehicle tried to enter NSA ...

Welcome to NSA 2018! | 2018 Annual Conference & Exhibition

Join us in New Orleans, LA on June 15-19, 2018, for the Annual Education and Technology Expo!

The NSA Annual Conference and Exhibition is one of the largest of its kind and displays products and equipment relevant to every facet of police work, jails, prisoner transport, and courtroom security. Exhibitors, therefore, contribute in large measure to the overall success of the conference. There are also over 60 seminars and workshops covering all aspects of the duties and responsibilities for sheriffs offices, including, but not limited to law enforcement, jail operations, service of process, transportation of prisoners, and court & judicial security.

Save money by registering early!

EARLY BIRD(PRIOR TO 1/13/2018)

ADVANCE(PRIOR TO 5/15/2018)

LATE(ON OR AFTER 5/15/2018)

NSA 2018 NEWS

Rental Car Discount

Delta DiscountWe have arranged a special discount with Delta Airlines to provide specially priced fares to our Annual Conference in New Orleans, based on the Delta Booking Classes listed below:

Reservations and ticketing is available via http://www.delta.com/meetings or by calling the Delta Meeting Network Reservations at 800-328-1111. When booking online at http://www.delta.com/meetings, select 'Book Your Flight' and enter your Meeting Code [NMQKJ] in the box provided.

Stay ConnectedJoin the social media conversation by including the hashtag #Sheriffs2018in all of yourTwitter,Facebook,LinkedIn, andInstagramposts!

Questions?

NOTICE: Unauthorized Companies Soliciting Services for NSA Conferences

We understand that our exhibitors and sponsors have been inundated with phone calls and emails from fraudulent companies claiming to represent the National Sheriffs Association. We are making changes to the way we publish our exhibiting companies information to help reduce those unwanted contacts. Please be assured that the following are the only currently approved vendors with regard to our annual conferences. If you are contacted by any other company claiming to represent the National Sheriffs Association, please check with us before doing business with them.

Tradeshow Logic Exhibit SalesThe YGS Group Advertising, Sponsorship & Corporate PartnershipVoice Hive Registration ContractorOrchid Event Solutions Housing ContractorBrede Exposition Service General Service ContractorConvention Strategy Group Lead Retrieval ContractorLiberty CFS NV, Inc. Official Freight Carrier CEAVCO Audio Visual Company Official Audio Visual ContractorConvention Plant Designs Official Plant-Flower ContractorRainprotection Insurance Exhibitor Liability Insurance (for those who dont already have it)

View post:
Welcome to NSA 2018! | 2018 Annual Conference & Exhibition

House Fails to Protect Americans from Unconstitutional NSA …

UPDATE, January 12, 2018: The Senate could vote Tuesday on a disastrous NSA surveillance extension bill that violates the Fourth Amendment. Click the link at the bottom of the page to email your Senator today and tell them to oppose bill S. 139.

The House of Representatives cast a deeply disappointing vote today to extend NSA spying powers for the next six years by a 256-164 margin. In a related vote, the House also failed to adopt meaningful reforms on how the government sweeps up large swaths of data that predictably include Americans communications.

Because of these votes, broad NSA surveillance of the Internet will likely continue, and the government will still have access to Americans emails, chat logs, and browsing history without a warrant. Because of these votes, this surveillance will continue to operate in a dark corner, routinely violating the Fourth Amendment and other core constitutional protections.

This is a disappointment to EFF and all our supporters who, for weeks, have spoken to defend privacy. And this is a disappointment for the dozens of Congress members who have tried to rein NSA surveillance in, asking that the intelligence community merely follow the Constitution.

Todays House vote concerned S. 139, a bill to extend Section 702 of the Foreign Intelligence Surveillance Act (FISA), a powerful surveillance authority the NSA relies on to sweep up countless Americans electronic communications. EFF vehemently opposed S. 139 for its failure to enact true reform of Section 702.

As passed by the House today, the bill:

You can read more about the bill here.

Sadly, the Houses approval of S. 139 was its second failure today. The first was in the Houses inability to pass an amendmentthrough a 183-233 votethat would have replaced the text of S. 139 with the text of the USA Rights Act, a bill that EFF is proud to support. You can read about that bill here.

The amendment to replace the text of S. 139 with the USA Rights Act was introduced by Reps. Justin Amash (R-MI) and Zoe Lofgren (D-CA) and included more than 40 cosponsors from sides of the aisle. Its defeat came from both Republicans and Democrats.

S. 139 now heads to the Senate, which we expect to vote by January 19. The Senate has already considered stronger bills to rein in NSA surveillance, and we call on the Senate to reject this terrible bill coming out of the House.

We thank every supporter who lent their voice to defend the Constitution. And we thank every legislator who championed civil liberties in this months-long fight. The debate around surveillance reform has evolvedand will continue to evolvefor years. We thank those who have come to understand that privacy does not come at the price of security. Indeed, we can have both.

Thank you to the scores of representatives who sponsored and co-sponsored the USA Rights Act amendment, or voiced support on the House floor today, including Reps. Amash, Lofgren, Jerrold Nadler, Ted Poe, Jared Polis, Mark Meadows, Tulsi Gabbard, Jim Sensenbrenner, Walter Jones Jr., Thomas Massie, Andy Biggs, Warren Davidson, Mark Sanford, Steve Pearce, Scott Perry, Sheila Jackson Lee, Alex Mooney, Paul Gosar, David Schweikert, Louie Gohmert, Ted Yoho, Joe Barton, Dave Brat, Keith Ellison, Lloyd Doggett, Rod Blum, Tom Garrett Jr., Morgan Griffith, Jim Jordan, Earl Blumenauer, Ro Khanna, Beto ORourke, Todd Rokita, Hank Johnson, Blake Farenthold, Mark Pocan, Dana Rohrabacher, Ral Grijalva, Ral Labrador, Peter Welch, Tom McClintock, Salud Carbajal, Ted Lieu, Bobby Scott, Pramila Jayapal, and Jody Hice.

Email your Senator today and tell them to uphold your constitutional rights by rejecting S. 139.

Take Action

Tell Your Senator to Reject S. 139

More here:
House Fails to Protect Americans from Unconstitutional NSA ...