bilateral
TopicsAbout← Back to feed
BySRSam Reyes·CMCal Morrow·EQEliza Quinn·DPDana Park
ANALYSISApril 13, 2026

Is government surveillance for national security worth the privacy cost?

FISA Section 702, the primary legal authority permitting the NSA to conduct warrantless surveillance of foreigners' international communications — which incidentally sweeps in Americans' calls, texts, and emails — is set to expire on April 20, 2026. Congress last reauthorized it via the Reforming Intelligence and Securing America Act (RISAA) on April 20, 2024, but has not yet voted on renewal or reform for 2026. The Trump administration has not publicly declared a position, and the FBI has privately warned against allowing the law to lapse.

XLinkedInFacebookThreadsWhatsAppReddit

When the government reads your metadata, it may stop a terrorist — or it may build a database of every dissident, journalist, and ordinary American who ever searched the wrong thing. How much of your privacy are you willing to hand over for a security guarantee that nobody can actually quantify?

Not familiar with this story? Get context →
Warrant requirement vs. operational necessity
C
The Durbin-Lee warrant requirement solves the abuse problem but leaves the unknown-unknown problem unanswered. Salt Typhoon wasn't discovered by querying a known suspect — it was an unknown intrusion pathway surfaced through bulk signals that no predicated warrant application could have anticipated. A warrant requirement assumes you already know who to ask about.
L
That argument proves too much. By that logic, any judicial constraint on any surveillance program is disqualifying, because threats are always unknown until they aren't. The actual claim being made is that obtaining court approval for queries touching Americans' communications would introduce gaps that bulk warrantless access uniquely fills — and that operational edge outweighs tens of thousands of documented unauthorized domestic queries. That is an extraordinary thing to assert in secret.
C
I'm not arguing against judicial constraints in general — I'm arguing that Durbin-Lee's specific mechanism, a warrant before querying Americans' communications, may introduce latency precisely in the scenario where speed matters most: the unknown contact chain. That's a narrower objection than 'courts are bad,' and it hasn't been answered.
L
Congress accepted the same 'trust us on the operational details' argument about Section 215 metadata collection, and when that program ended in 2015, the predicted intelligence collapse didn't happen. At some point, classified assurances that can't be tested publicly stop being evidence.
FBI abuse as design, not deviation
C
The FISA Court — not a civil liberties organization, an institution built to authorize surveillance — issued compliance rulings against the FBI's querying practices. When your own secret court rules against you repeatedly, the problem isn't rogue agents. It's a structural absence of friction between a database of foreign-collected communications and a domestic criminal investigation.
L
Exactly right, and that structural absence is the point conservatives who support clean reauthorization keep skating past. The tens of thousands of unauthorized queries on January 6 suspects, racial justice protesters, and a sitting congressman weren't bugs — they were what happens when you build a database with no warrant requirement and tell agents it's technically available. The architecture produced the abuse.
C
We agree on the diagnosis. The disagreement is whether Durbin-Lee's warrant requirement is the right structural fix or whether the intelligence community's operational objections require a different constraint mechanism. But the conservative case for clean reauthorization — no structural reform at all — is indefensible on Fourth Amendment grounds regardless.
L
A conservative who has spent a decade warning about executive overreach and then votes for warrantless database access to Americans' communications because this particular executive says it's necessary has abandoned the principle, not applied it.
DOGE consolidation amplifies 702 risk
C
The DOGE episode isn't a separate issue — it sharpens what's at stake with Section 702's RISAA provision in a specific way. Whistleblowers estimated 35 to 65 percent probability of catastrophic breach from consolidated federal database access. The RISAA provision allows the NSA to conscript nearly any American business, router included, into its collection apparatus. You are expanding the attack surface while simultaneously demonstrating you cannot secure what you already hold.
L
And a federal judge found a real possibility that Treasury data had already been shared unlawfully — this isn't a hypothetical risk. The conservative framing of 'limited government' should recognize that surveillance infrastructure built without structural judicial constraints doesn't stay aimed at foreign adversaries. It becomes available to whatever political operation controls the executive branch next, including this one.
C
The DOGE parallel cuts against the progressive instinct to trust executive discretion on national security too. Surveillance infrastructure built for one administration's enemies is the next administration's weapon — that's Madison's argument, not a partisan one, and it applies equally to whoever is currently in power.
L
Right, which is why the warrant requirement in Durbin-Lee is a structural constraint on the institution, not a favor to any particular party — the whole point is that it operates regardless of who controls the White House.
PCLOB finding and targeted surveillance adequacy
C
The PCLOB concluded — after classified review — that bulk collection wasn't essential to preventing terrorist attacks and that targeted surveillance could achieve equivalent results. The intelligence community disputes this, but they dispute it without being able to show their work publicly. That asymmetry of accountability is itself the structural problem: Congress keeps accepting classified assurances, and the public can never audit whether they were true.
L
The PCLOB finding is the load-bearing claim for the reform argument, and I'll grant it has an evidentiary problem: the Board may not have had full visibility into the operational inference chains that 702 enables. But notice what the intelligence community's counter-argument requires — that there exists at least one threat scenario where the absence of a warrant requirement was operationally decisive, and that this justifies the documented pattern of tens of thousands of unauthorized domestic queries. That tradeoff should be made explicitly in public, not assumed in classification.
C
The Section 215 precedent is actually decisive here: that program ended in 2015, the intelligence community predicted catastrophe, and the catastrophe didn't come. The burden of proof for 'trust us, warrants will cost lives' has been spent.
L
If the intelligence community wants Congress to accept that Durbin-Lee's warrant requirement creates unacceptable operational risk, they need to show that the Section 215 outcome was an exception, not a pattern — and they haven't.
Fourth Amendment's original purpose
C
The Fourth Amendment was written in direct response to British general warrants — writs of assistance authorizing broad searches without specifying targets or locations. What Section 702's backdoor query authority permits, stripped of classification markings, is a database of private communications searchable without judicial approval. The Founders didn't enumerate that protection abstractly. They had lived under exactly this kind of authority.
L
The historical point is sound, but it exposes a tension in the conservative position that goes beyond 702: if the warrant requirement is a foundational constitutional principle and not a policy preference, why did it take two decades of documented abuse — a congressman, civil rights protesters, January 6 suspects — for this argument to gain traction on the right? The principle was always there. The political will to apply it wasn't.
C
Fair. But the fact that conservatives were slow to apply a correct principle doesn't make the principle wrong — it makes the belated application more urgent, not less. Durbin-Lee is the right answer twenty years late.
L
Agreed, which is why the vote on Durbin-Lee is the accountability moment: it's the first time Congress has had a bipartisan reform vehicle that preserves the foreign intelligence function while restoring the constitutional baseline, and voting it down in favor of clean reauthorization is a choice that can't be dressed up as national security necessity.
Conservative's hardest question
The most serious challenge to this argument is the operational one: if the intelligence community is correct that Section 702 provides unique, irreplaceable value against threats like Salt Typhoon that targeted surveillance cannot replicate, then insisting on a warrant requirement before every American-touching query could introduce latency or gaps that cost lives. This is not a hypothetical the Durbin-Lee framework has fully answered, and I cannot dismiss it.
Liberal's hardest question
The PCLOB finding that targeted surveillance can substitute for bulk collection is the analytical load-bearing wall of the reform argument, but the intelligence community disputes it with access to classified operational details the Board may not have fully weighted. If even one major attack was disrupted by a query pattern that targeted surveillance would have missed, the civil liberties calculus becomes genuinely harder — and that counterfactual cannot be resolved in public.
Both sides agree: Both sides accept that the Durbin-Lee bipartisan reform bill — preserving Section 702's foreign intelligence function while requiring court approval before querying Americans' communications — is a more defensible position than either clean reauthorization or outright expiration.
The real conflict: A genuine factual and predictive conflict: the conservative rebuttal argues Salt Typhoon-style threats are discovered through bulk contact-pattern analysis that no predicated warrant could have anticipated, while the liberal rebuttal argues this 'unknown-unknown' justification is an unfalsifiable classified assertion of the same type that failed to hold up when Section 215 metadata collection ended in 2015.
What nobody has answered: If the intelligence community's classified operational rationale for warrantless querying is structurally immune from public adjudication — as both sides effectively concede — then what mechanism, if any, could actually discipline executive surveillance power before the next documented abuse cycle rather than after it?
Sources
  • Search results provided: comprehensive summary of FISA Section 702 reauthorization status, RISAA provisions, 2025 YouGov polling data, Privacy and Civil Liberties Oversight Board findings, Durbin-Lee bipartisan reform bill, coalition opposition letters, DOGE database access reporting, Salt Typhoon cyberespionage reporting, CDT AI surveillance statement, and former national security officials' letter to Congress.

More debates