bilateral
TopicsAbout← Back to feed
BySRSam Reyes·CMCal Morrow·EQEliza Quinn·DPDana Park
ANALYSISApril 13, 2026

Should the NSA's bulk surveillance programs continue?

Section 702 of the Foreign Intelligence Surveillance Act, which authorizes NSA bulk surveillance programs including PRISM and Upstream collection, is set to expire on April 20, 2026, following its last reauthorization via the Reforming Intelligence and Securing America Act (RISAA) on April 20, 2024. Congress faces three options: clean reauthorization without changes (favored by President Trump and intelligence agencies), a reform bill with warrant requirements (backed by a bipartisan coalition), or allowing the program to lapse. The debate has intensified after an April 2026 FISA Court finding confirmed that compliance violations involving improper searches of Americans' communications are ongoing and extend beyond the FBI.

XLinkedInFacebookThreadsWhatsAppReddit

If the government is secretly collecting data on millions of Americans who've done nothing wrong, is that the price of safety — or the definition of a police state? And who gets to decide?

Not familiar with this story? Get context →
Ongoing violations disqualify clean reauthorization
C
The FISA Court confirmed in April 2026 that compliance violations are ongoing and spreading beyond the FBI to other agencies — not historical, not corrected, ongoing. Congress passed RISAA specifically to stop these abuses, and the FBI responded by deploying a querying tool that bypassed RISAA's safeguards within months of enactment. A clean reauthorization at this moment is not a national security decision. It is a statement that documented institutional defiance carries no consequence.
L
We agree on the diagnosis completely, which is why the argument for clean reauthorization is so hard to defend. The FISA Court isn't a civil liberties advocacy group — it's the government's own specialized surveillance court, and it is telling Congress the executive branch cannot police itself. That finding doesn't just support reform; it makes clean reauthorization constitutionally incoherent.
C
The bipartisan consensus here is worth noting: when conservatives arguing limited government and liberals arguing civil liberties reach the same conclusion through different frameworks, that convergence is itself evidence. The SAFE Act isn't a left-wing wish list — it's co-sponsored by Durbin and Lee precisely because the institutional failure is visible from every angle.
L
And the vote was 212-212 on a warrant amendment in 2024, one procedural move from passing. The political will exists. The only thing missing is a speaker willing to let the majority rule.
PRISM's foreign intelligence value is irreplaceable
C
The strongest version of the pro-reauthorization case deserves a real answer: PRISM's foreign-targeting capability may generate genuine signals intelligence on state actors like China that targeted alternatives cannot replicate, and intelligence officials are not wrong that operational gaps carry real costs measured in human lives. I will not pretend that tension away. But it is an argument for the SAFE Act, not for unchecked authority — PRISM's foreign targeting is preserved under Durbin-Lee. What changes is whether the FBI can pivot to Americans' communications without a judge.
L
You're right to draw that distinction, and it's the one the intelligence community consistently blurs. PRISM's defenders conflate the program's foreign collection value with the querying of Americans caught in that collection — those are two separate legal and operational questions. The SAFE Act leaves PRISM's foreign targeting intact. The warrant requirement disciplines what happens when an analyst types an American's name into the query tool.
C
If the FBI's argument against the SAFE Act is that emergency FISA procedures are too slow for time-sensitive intercepts, they have not demonstrated that — they have only asserted it. Emergency FISA provisions exist precisely for that scenario, and Durbin-Lee preserves them.
L
The indispensability argument has also been tested empirically: PCLOB found bulk collection played a role in at most 1.8% of 225 terrorism cases since 9/11. The program that supposedly cannot be constrained without catastrophic consequence barely registers in the case record.
Executive surveillance power is structurally self-expanding
C
The FISA framework was created in 1978 because warrantless executive surveillance under COINTELPRO had been turned against civil rights leaders, anti-war activists, and political opponents. Congress built a court specifically because the lesson of that era was that unchecked surveillance power corrupts regardless of the intentions of the people who start it. We are now watching Section 702 — the statutory fix for post-9/11 warrantless wiretapping — produce the same compliance failures that justified FISA in the first place.
L
The pattern you're describing isn't a series of isolated incidents — it's the predictable behavior of an institution without adequate external constraint. The NSA's post-9/11 program operated outside FISA entirely until judicial pressure forced it back in 2007. Section 702 was the legislative correction, and it is now generating the same problems. At some point 'reform the reform' stops being a coherent answer and becomes an acknowledgment that the underlying authority needs a harder structural constraint.
C
The historical record actually strengthens the reform case rather than complicating it: every time Congress has granted surveillance authority without robust judicial oversight, the executive branch has expanded it beyond the granted scope. That isn't speculation — it's the documented cycle from COINTELPRO to warrantless wiretapping to RISAA violations.
L
Which is precisely why 'trust us to follow the new rules' is not a sufficient answer when the agency broke the last set of rules Congress passed specifically to constrain it.
Specific targets reveal political abuse pattern
C
The 3 million annual searches are not an abstraction. The documented targets include 19,000 donors to a political campaign, journalists, members of Congress, and a state court judge. This is not incidental overcollection — this is the surveillance apparatus being turned toward domestic political actors. The Fourth Amendment was not designed as a peacetime luxury to be suspended whenever the executive branch identifies a security rationale.
L
What makes that list damning isn't any single entry — it's the range. Campaign donors, journalists, a sitting senator, a state judge. Those aren't targets that emerged from foreign intelligence leads. That pattern describes a system being used to monitor domestic political life, which is precisely what COINTELPRO was condemned for and precisely what the 1978 FISA framework was built to prevent.
C
And the response from defenders of clean reauthorization has been to argue that these were compliance errors, not intentional abuse — but that defense actually makes the case for mandatory judicial oversight stronger, not weaker. If 3 million searches produce this target list through error alone, the error rate is the problem.
L
A warrant requirement doesn't slow down legitimate foreign intelligence work. It creates a moment where an independent judge asks whether this American's name belongs in a foreign intelligence query — and that question, asked in advance, is exactly what would have stopped most of the searches on that list.
SAFE Act preserves capability while adding constraint
C
The SAFE Act is not a dismantle-Section-702 bill. It requires court approval before querying Americans' communications — that is the minimum the Fourth Amendment has always contemplated for government searches of citizens' private communications. Senators Durbin and Lee reaching the same conclusion from opposite ends of the political spectrum is not a coincidence; it reflects that requiring judicial approval for targeting Americans is not ideologically contested, only institutionally inconvenient.
L
The intelligence community's objection to the SAFE Act has consistently been framed as operational — warrant delays cost lives — but they haven't demonstrated that emergency FISA procedures are inadequate for genuine time-sensitive needs. What they've demonstrated is that any external check is inconvenient, which is a different claim entirely and not one that carries constitutional weight.
C
The 212-212 House vote on warrant requirements tells you everything about where the actual political center sits on this question. That wasn't a fringe amendment — it was one vote, and one speaker's procedural intervention, away from becoming law.
L
Reform and capability are not in tension here. They are only framed as being in tension by institutions that benefit from the ambiguity.
Conservative's hardest question
The PRISM component's foreign intelligence value targeting actual foreign adversaries may be genuinely difficult to replicate through targeted alternatives, meaning a lapse or poorly-designed reform could create real intelligence gaps on threats like Chinese state actors or terrorist networks. This is not a trivial cost, and critics of reform are right that the stakes of getting it wrong fall on national security, not just civil liberties.
Liberal's hardest question
The strongest challenge to the reform position is the genuine operational uncertainty: even if bulk collection's terrorism prevention contribution is statistically small, the intelligence community's most credible argument is that PRISM's foreign-targeting value cannot be fully quantified in declassified case studies, and warrant delays — even brief ones — could matter in time-sensitive scenarios. This is difficult to dismiss entirely, because the counterfactual of what was prevented is by nature classified and unknowable.
Both sides agree: Both sides accept that PRISM's foreign-targeting capability has genuine intelligence value that carries real costs if disrupted — neither position advocates allowing Section 702 to lapse without replacement.
The real conflict: A factual and predictive conflict: the conservative and liberal positions both claim the SAFE Act's emergency provisions would preserve operational speed, but intelligence agencies contend any judicial check introduces unacceptable delay — this dispute cannot be resolved from declassified evidence alone.
What nobody has answered: If the FISA Court — the institution specifically designed to provide judicial oversight of surveillance — has confirmed ongoing violations it lacks the enforcement power to stop, what mechanism would actually make warrant requirements enforceable against agencies that have already bypassed statutory safeguards enacted months earlier?
Sources
  • Search: 'Section 702 FISA expiration April 2026 reauthorization deadline'
  • Search: 'RISAA Reforming Intelligence and Securing America Act 2024 Section 702'
  • Search: 'FBI querying tool abuse Section 702 DOJ 2024 2025'
  • Search: 'FISA Court March 2026 ruling Section 702 compliance violations'
  • Search: 'SAFE Act Durbin Lee 2026 Section 702 reform warrant requirement'
  • Search: 'Congressional Progressive Caucus Section 702 reform opposition 2026'
  • Search: 'NSA PRISM Upstream surveillance Section 702 how it works'
  • Search: 'Section 702 abuses documented FBI improper searches list'
  • Search: 'Section 702 terrorism effectiveness 1.8 percent Privacy Civil Liberties Oversight Board'
  • Search: 'YouGov poll warrant requirement Section 702 Americans survey'

More debates