US House votes to stop NSA’s mass surveillance
USA Freedom Act passed by House of Representatives with overwhelming support


The US House of Representatives has voted to end the NSA's widespread surveillance of American citizens.
Members voted 338 to 88 to support the USA Freedom Act, a measure that amends and extends parts of 2001's much-discussed USA Patriot Act.
One of its clauses is the banning of the NSA from bulk-collecting US citizens' phone records, emails and web addresses.
According to Representative Goodlatte, the Judiciary Committee chair, one of the bill's driving forces, the NSA's blanket surveillance "has not ceased, and will not cease, unless and until Congress acts to shut it down".
This mass-scale data collection was the source of much controversy when it was revealed by Edward Snowden in 2013.
The ex-NSA contractor leaked huge amounts of info related to programmes like PRISM and MYSTIC, and fled to Russia to avoid government sanctions.
The methods and scale of these spying operations led to a federal appeals court deeming them illegal last week, and both rulings have been met with support from privacy advocate groups.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Although the bill has now been passed by the House, it must still be ratified by the Senate in order to make it onto the statute books, having already received presidential approval.
However, current Senate majority leader Mitch McConnell has previously introduced bills designed to extends the NSA's powers rather than curtail them.
There are those in the Senate in favour of the bill, though, and both Senators Rand Paul and Ron Wyden have previously threatened to filibuster extensions of Patriot Act powers.
Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.
Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.
You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.
-
Businesses are taking their eye off the ball with vulnerability patching
News Security leaders are overconfident in their organization’s security posture while allowing vulnerability patching to fall by the wayside.
By Jane McCallion Published
-
Global cybersecurity spending is set to rise 12% in 2025 – here are the industries ramping up investment
News Global cybersecurity spending is expected to surge this year, fueled by escalating state-sponsored threats and the rise of generative AI, according to new analysis from IDC.
By Ross Kelly Published
-
UK businesses patchy at complying with data privacy rules
News Companies need clear and well-defined data privacy strategies
By Emma Woollacott Published
-
Data privacy professionals are severely underfunded – and it’s only going to get worse
News European data privacy professionals say they're short of cash, short of skilled staff, and stressed
By Emma Woollacott Published
-
Four years on, how's UK GDPR holding up?
News While some SMBs are struggling, most have stepped up to the mark in terms of data governance policies
By Emma Woollacott Published
-
Multicloud data protection and recovery
whitepaper Data is the lifeblood of every modern business, but what happens when your data is gone?
By ITPro Published
-
Intelligent data security and management
whitepaper What will you do when ransomware hits you?
By ITPro Published
-
How to extend zero trust to your cloud workloads
Whitepaper Implement zero trust-based security across your entire ecosystem
By ITPro Published
-
The threat prevention buyer's guide
Whitepaper Find the best advanced and file-based threat protection solution for you
By ITPro Published
-
Hackers are lying low in networks to wage critical infrastructure attacks - here’s how they do it
News Hackers are researching key IT workers in their bid to gain access to vital systems
By Steve Ranger Published