Congress kicks the can on FISA renewal, leaving surveillance powers in limbo

May 1, 20266 min read4 sources
Share:
Congress kicks the can on FISA renewal, leaving surveillance powers in limbo

Introduction

A high-stakes legislative battle over one of America’s most powerful and controversial surveillance tools has been temporarily deferred, not resolved. Facing an April 19 deadline, Congress opted to pass a short-term extension for Section 702 of the Foreign Intelligence Surveillance Act (FISA), pushing the debate to June. The move came after a long-term reauthorization bill in the House was torpedoed by an unusual, unrelated amendment banning the Federal Reserve from issuing a central bank digital currency (CBDC), a provision the Senate declared a non-starter.

This eleventh-hour maneuver highlights a deep and persistent rift in Washington over the balance between national security and individual privacy. For intelligence agencies, Section 702 is an indispensable tool for monitoring foreign adversaries. For civil liberties advocates, it represents a dangerous loophole that allows for the warrantless surveillance of Americans. The recent legislative chaos only adds another layer of complexity to an already contentious issue.

Background: The Crown jewel and its controversies

First enacted in 2008, Section 702 authorizes the U.S. government to collect the communications of non-U.S. persons located outside the country to acquire foreign intelligence. Intelligence officials have long described it as the “crown jewel” of their collection capabilities, citing its critical role in thwarting terrorist attacks, countering cyberespionage, and tracking foreign weapons proliferation. According to the Office of the Director of National Intelligence (ODNI), information gathered under Section 702 contributes to the President's Daily Brief more than any other single source.

The program’s vast scope remained largely secret until 2013, when documents leaked by former NSA contractor Edward Snowden revealed the PRISM and Upstream collection programs, both operating under Section 702 authority. These revelations ignited a global debate about government surveillance and have fueled persistent calls for reform from a bipartisan coalition of lawmakers and privacy advocates ever since.

Technical details: How Section 702 works

At its core, Section 702 allows the Attorney General and the Director of National Intelligence to jointly authorize one-year surveillance programs targeting specific foreign intelligence objectives. These programs are approved by the Foreign Intelligence Surveillance Court (FISC). Once a program is authorized, the government can issue directives to U.S.-based electronic communication service providers—companies like Google, Meta, and AT&T—compelling them to turn over the communications of targeted individuals.

Collection happens in two primary ways:

  • Downstream Collection: Also known as PRISM, this involves collecting data directly from internet service providers. The government provides a provider with a “selector,” such as an email address or phone number of a foreign target, and the provider is required to turn over communications to and from that selector.
  • Upstream Collection: This method involves collecting communications as they travel across the internet’s backbone infrastructure—the high-capacity fiber optic cables that connect networks. This allows the NSA to acquire communications that transit through, but do not necessarily start or end in, the United States.

The central controversy stems from what is known as “incidental collection.” When the government targets a foreigner abroad, it inevitably sweeps up the communications of any Americans who happen to be talking to that target. This creates a massive repository of American emails, text messages, and phone calls that were collected without a warrant. Federal law enforcement, particularly the FBI, can then search this database using Americans' names or other identifiers. Critics call this the “backdoor search loophole,” arguing it allows the government to perform a warrantless search on Americans, circumventing Fourth Amendment protections. The FBI has faced repeated criticism from the FISC for non-compliant queries of this database, further fueling calls for a strict warrant requirement.

Impact assessment: A precarious balance

The failure to pass a long-term bill has significant implications for multiple stakeholders. For the intelligence community, the short-term extension provides a temporary reprieve but prolongs operational uncertainty. National security leaders, including FBI Director Christopher Wray and Director of National Intelligence Avril Haines, have issued stark warnings that allowing Section 702 to lapse would be “devastating” and create significant intelligence gaps regarding threats from China, Russia, and terrorist organizations.

For U.S. citizens, the outcome of the reauthorization debate will directly affect their privacy. A renewal without meaningful reform would codify the FBI's ability to continue searching through incidentally collected data without a warrant. Conversely, the reforms sought by privacy advocates—chiefly a warrant requirement for U.S. person queries—could add a layer of judicial oversight but, according to intelligence agencies, would create dangerous delays in fast-moving investigations.

The legislative impasse itself is also damaging. The decision by some House members to attach the CBDC ban to the bill, described by senators as a “poison pill,” demonstrates how critical national security legislation can be held hostage by unrelated political disputes. This tactic not only prevented a substantive debate on surveillance reform but also sowed distrust between the two chambers of Congress, making a future compromise even more difficult.

How to protect yourself

While individuals cannot directly stop government surveillance programs authorized by law, they can take steps to improve their general digital privacy and reduce their data footprint. This practice, often called digital hygiene, minimizes the amount of personal information available to be collected by any party—be it corporations or government agencies.

  1. Use End-to-End Encryption: Whenever possible, use applications that offer end-to-end encryption for communications, such as Signal or WhatsApp. This ensures that only the sender and intended recipient can read the message content.
  2. Limit Data Sharing: Be mindful of the information you share with online services. Review the privacy settings on your social media accounts, web browsers, and mobile devices to limit data collection and tracking.
  3. Secure Your Connection: Your internet traffic can be monitored as it travels from your device to its destination. Using a reputable VPN service can help protect your data by creating an encrypted tunnel for your traffic, shielding it from eavesdropping on public Wi-Fi and by your internet service provider.
  4. Stay Informed and Engage: The rules governing surveillance are decided by lawmakers. Staying informed about legislation like the FISA renewal and communicating your views to your elected representatives is a fundamental way to influence public policy on privacy and security.

As Congress returns to this debate before the new June deadline, the fundamental tension remains. Lawmakers must again attempt to forge a consensus that provides intelligence agencies with the tools they say are needed to protect the nation while also upholding the constitutional privacy rights of its citizens. The outcome will shape the contours of government surveillance for years to come.

Share:

// FAQ

What is FISA Section 702?

Section 702 of the Foreign Intelligence Surveillance Act is a U.S. law that allows intelligence agencies to collect communications (emails, texts, calls) of non-U.S. persons located outside the United States for foreign intelligence purposes. It is a key tool for monitoring foreign adversaries, terrorists, and cyber threats.

Why is Section 702 controversial?

The main controversy is the "incidental collection" of communications belonging to U.S. citizens who are in contact with foreign targets. The FBI can then search this repository of data using Americans' names without obtaining a traditional warrant, which critics argue violates Fourth Amendment protections against unreasonable searches.

What is a 'backdoor search'?

A 'backdoor search' is a term used by privacy advocates to describe when the FBI queries the vast database of information collected under Section 702 using U.S. person identifiers (like a name or email address). They argue it's a way to circumvent the warrant requirement for domestic surveillance.

What happens if Section 702 expires?

If Congress fails to reauthorize Section 702, the government would lose the authority to initiate new surveillance on foreign targets under this program. Intelligence officials warn this would create a critical intelligence gap, severely hindering their ability to detect and prevent terrorist plots, cyberattacks, and foreign espionage.

Why was a digital currency ban included in the FISA bill?

The ban on a central bank digital currency (CBDC) was added as an amendment in the House of Representatives. It was an unrelated policy rider, likely intended by its supporters to force a vote on the issue or to intentionally sink the bill if they opposed the surveillance reauthorization. The Senate viewed it as a 'poison pill' and refused to consider the legislation with it attached.

// SOURCES

// RELATED

Congress kicks the can down the road on surveillance law (again)

A one-year extension of FISA Section 702 papers over deep divisions on privacy and surveillance, failing to resolve the core issue of warrantless sear

6 min readMay 1

House renews controversial spy program, but the fight for privacy is far from over

The U.S. House has reauthorized the controversial FISA Section 702 surveillance program, but a failure to add a warrant requirement leaves privacy con

6 min readApr 30

Norway's proposed social media ban for teens puts age verification tech to the test

Norway's proposed social media ban for users under 13 puts the tech industry's age verification capabilities under intense scrutiny.

7 min readApr 25

Geofence warrants on trial: The Supreme Court weighs privacy against policing

The Supreme Court is considering Chatrie v. United States, a case that will decide if geofence warrants—digital dragnets of location data—are constitu

7 min readApr 23