This practice is actually very common. If you can't tack your legislative piece on to some 'sure bet' bill you just name it something that no person would ever vote against.
Got a piece of legislation on drilling for oil in Alaska? Call it the 'Freedom from Terrorism act' and just like that. It's approved. No one reads the entire Bill, so the name is a HUGE part of the process.
I know it's a fairly common practice, but this is like an overly hyperbolic and exaggerated example you would give when describing the practice. A bit like saying "PATRIOT Act? What's next, the 'Protect our Children from Pornography' Act?" Apparently!
The fact that they actually went this far... I don't know whether to laugh or cry.
That's actually helpful levity when considering service offerings like this[1]:
DRDL interconnects control and data sessions of protocols like FTP. During the identification process DRDL aggregates detailed traffic properties like MIME-type, filename, chat channel and SIP caller ID. This granularity enables you not only to see the Xbox Live traffic, but rather the Xbox Live users who are playing Halo 3.
It's not clear whether use of a VPN/SSH would prevent this kind of traffic analysis, but an obfuscation daemon of some kind could surely be written.
While it's kind of interesting, I've never researched how networks like Freenet, or WASTE, etc deal with those issues (or, if they even address them at all).
Got a piece of legislation on drilling for oil in Alaska? Call it the 'Freedom from Terrorism act' and just like that. It's approved. No one reads the entire Bill, so the name is a HUGE part of the process.