Last updated 1 month ago. Our resources are updated regularly but please keep in mind that links, programs, policies, and contact information do change.
- How Your Communications End Up in NSA Databases
- Documented Abuses
- Federal Court Rules Searches Unconstitutional
- Why Congressional Reform Efforts Have Failed
- 2024 Reforms and Their Limitations
- The April 20 Deadline
- What a Judicial Approval Requirement Would Change
- The Data Broker Loophole
- If Section 702 Expires
- Impact on Journalists, Activists, and Business Travelers
- The Core Question
This isn’t a leak or a scandal. It’s how Section 702 of the Foreign Intelligence Surveillance Act is designed to work.
The law expires April 20, 2026—roughly eight weeks from now. Congress will be in session for only five of those weeks. What happens in that compressed window will determine whether the government continues searching your emails, texts, and video calls with no judge’s approval. Or whether the Fourth Amendment finally applies to communications the NSA has already collected.
How Your Communications End Up in NSA Databases
A federal law called FISA lets intelligence agencies monitor foreigners outside the United States with no individual warrants. The process starts when the NSA or FBI identifies a foreign intelligence target—say, a suspected Chinese hacker or an Iranian diplomat. They select that person’s email address or phone number as a “selector,” then force American tech companies to turn over communications involving that identifier.
No judge approves the targeting of any specific person. Top officials approve the procedures with no judge’s involvement. A special court reviews the overall system, not individual cases. If approved, companies like Google, Microsoft, and Facebook must comply.
Here’s where Americans get swept in: you email a journalist in Baghdad for a story. Your business partner in Singapore sends you contract terms. You video-call your cousin studying in London. If any of those people happen to be Section 702 targets—or communicate with someone who is—your communications get captured and stored in government databases.
Collecting your communications by accident isn’t accidental. It’s inevitable. The government knows it will happen. The law requires rules limiting how long they keep and use your communications. But those procedures don’t require a judge’s approval before searching the database for your specific content.
When an FBI agent wants to see if your communications are in the system, they query it. Type in your name, email, or phone number. Hit enter. No judge involved.
Intelligence officials call these “queries.” Civil liberties advocates call them what they are: searches of Americans’ private communications conducted with no judge’s permission.
Documented Abuses
After January 6, 2021, FBI employees queried Section 702 databases for people suspected of involvement in the Capitol breach. These are documented violations that appeared in court opinions. In most cases, no one faced discipline.
Federal Court Rules Searches Unconstitutional
For years, courts consistently ruled that searching Section 702 databases didn’t trigger the constitutional rule requiring judges to approve queries. The initial collection targeted foreigners, judges reasoned, so searching the resulting database was a continuation of that operation.
Then came early 2025. A federal judge in Brooklyn ruled for the first time that the FBI’s searches violated the Fourth Amendment. The case involved Agron Hasbajrami, arrested in 2011 at JFK Airport for allegedly supporting terrorists. His emails with an individual overseas—collected under Section 702, stored in government databases, then queried again using Hasbajrami’s name as the search term—became part of the government’s prosecution.
Judge Hall distinguished between the initial collection and the subsequent search. Yes, collecting communications between a target and an American might be lawful under Section 702. But searching those communications later using American-specific search terms? That’s a separate Fourth Amendment event requiring separate justification.
The ruling didn’t throw out the evidence or bind other courts. But it gave advocates something they’d never had before: a federal judge explicitly holding that the Constitution requires what Congress has refused to mandate.
Why Congressional Reform Efforts Have Failed
Congress has tried to add requirements. Repeatedly. They keep failing by the narrowest margins.
Intelligence officials argue that requirements would cripple their work. Investigations move fast, they say. Waiting hours or days for judicial approval could mean the difference between disrupting a terrorist plot and experiencing an attack. Standards require solid evidence that a crime happened—a demanding threshold that doesn’t fit intelligence work, where agents often seek information about potential contacts or travel patterns with no evidence of criminal activity.
But the Constitution doesn’t permit searches conducted with no judge’s approval because obtaining approval would be inconvenient. The government obtained FISA approvals for decades before Section 702 existed. Those approvals use a lower standard of proof designed for intelligence gathering—solid evidence that the target is working for another government—which is substantially easier to meet than criminal probable cause.
A requirement wouldn’t have prevented any genuine emergency search. It would have prevented abuses.
2024 Reforms and Their Limitations
The 2024 reauthorization did tighten some rules. Agents can no longer query databases “solely designed to find and extract evidence of criminal activity” except in narrow circumstances. Personnel must get written approval from a supervisor before querying using U.S. person search terms. Staff must complete annual training.
But better record-keeping doesn’t fix the core issue: queries conducted with no judge’s approval. Even if the FBI now audits all queries and disciplines violators, the queries still happen with no judicial approval. The reforms improve accountability after the fact. They don’t prevent searches in the first instance.
The April 20 Deadline
April 20 falls on a Monday. Congress has eight weeks to act. But the House will be in recess for three of those weeks, leaving roughly 35 legislative days to debate, negotiate, draft compromise language, and pass legislation. The Senate faces the same compressed timeline.
This time pressure creates a paradox. The urgency might force a compromise that wouldn’t otherwise emerge. Or it might pressure lawmakers toward a clean reauthorization—which requires no negotiation, only votes—or a last-minute deal assembled too hastily for thorough debate.
Some lawmakers remain insistent. Senator Mike Lee of Utah says Congress “has no business” reauthorizing Section 702 with no requirements. Senator Dick Durbin plans to revive a bipartisan bill with Lee that would extend Section 702 while adding protections.
What a Judicial Approval Requirement Would Change
Currently, an agent can query Section 702 databases within seconds of deciding a person’s communications might be relevant. With a requirement, the agent would need to apply to the court, provide justification, wait for judicial review, and receive approval before proceeding. Even fast-tracked requests could take hours or days.
Intelligence officials argue this delay matters profoundly. If agencies learn a terrorist overseas is communicating with a potential recruit in the United States, and that recruit’s name appears in Section 702 databases, requirements would introduce delay before the government could search for those communications. During that delay, the operational opportunity might be lost.
Privacy advocates counter that proposed legislation includes exceptions for genuine emergencies—cases involving imminent threats to life. Agents could search and immediately seek judicial approval afterward. The FISA Court already handles fast-tracked requests when circumstances require. Most documented abuses involved no time urgency whatsoever.
A requirement would have prevented abuses while still allowing legitimate emergency searches. As Judge Hall wrote in Hasbajrami, “the Court does not hold that all querying requires a judge’s approval, but it likewise cannot hold that all instances of querying are of such extreme importance to public safety as to never require one.”
The Data Broker Loophole
There’s a related problem Congress might address: the government buying Americans’ personal data from commercial brokers instead of obtaining judicial approval.
Intelligence agencies have purchased massive volumes of location data, financial records, and other personal information from private companies that harvest and sell such data. The Fourth Amendment Is Not For Sale Act, which has bipartisan support, would require approval before the government purchases data from commercial sellers.
If Section 702 gets protections but agencies can simply buy the same information from data brokers, the constitutional protection becomes meaningless.
If Section 702 Expires
If Congress fails to reauthorize before April 20, the government couldn’t force tech companies to hand over communications from targets overseas. Intelligence officials warn this would represent significant intelligence loss—potentially depriving the government of information about terrorism plots, cyberattacks, weapons proliferation, and other threats.
The government conducted surveillance before Section 702 existed and could do so again using other authorities. But Section 702 is extensively used and powerful.
Republicans control the House, Senate, and White House. If Section 702 lapses, they bear primary responsibility. This creates incentives for Republican leadership to reach some resolution before April 20.
The deadline will force action—whether through clean reauthorization, compromise, or some procedural workaround.
Impact on Journalists, Activists, and Business Travelers
The impact of Section 702 extends beyond abstract constitutional principles. It affects specific groups of Americans whose work or personal lives regularly involve international contact.
Journalists communicating with sources overseas face particular risk. If a reporter exchanges emails with a Syrian activist, an Iranian dissident, or a Chinese whistleblower—any of whom might be Section 702 targets—those communications enter government databases. Agents can then query those databases using the journalist’s name or email address. No judicial approval. No notification. The reporter never knows their source communications were accessed.
This discourages investigative journalism because sources fear exposure. Sources become reluctant to communicate with American reporters if they know those communications might be stored in NSA databases and searched by law enforcement.
Activists and advocacy organizations face similar exposure. Human rights groups, civil liberties organizations, and political movements frequently communicate with international partners. Those communications become searchable government records if any contact happens to be a Section 702 target.
Business travelers and international companies deal with this daily. If you negotiate contracts with overseas partners, coordinate with offices abroad, or communicate with international clients, your business correspondence might be sitting in government databases. Agents have queried Section 702 data using the names of defense contractors and other businesses despite having no specific information suggesting targeting.
Academic researchers collaborating with colleagues abroad, lawyers representing international clients, and Americans with family overseas all face the same vulnerability. Your private communications are accessible to government agents who need only type your name into a search field.
The Core Question
Section 702 represents a choice about what balance to strike between government surveillance capabilities and constitutional protection for Americans’ communications. For eighteen years, Congress has permitted the government to search Americans’ content with no judicial approval, relying on statutory restrictions and executive self-restraint rather than constitutional requirements.
The documented pattern of abuse has made clear that statutory restrictions aren’t sufficient. Internal compliance procedures aren’t sufficient. Audits and training aren’t sufficient.
The January 2025 court decision represents a turning point. For the first time, a federal judge has found that the Constitution itself requires protection for the kind of searching the government conducts routinely under Section 702.
But at the same moment constitutional doctrine appears to be shifting, time pressure from the deadline is pushing Congress toward rapid reauthorization or hastily assembled compromise.
The question is whether Americans’ Fourth Amendment right to privacy in their communications can be suspended simply because collecting those communications wasn’t the government’s primary target. The answer Congress provides in the next five weeks will shape government surveillance authority for years.
Your emails are already in the database. The question is whether agents need a judge’s approval before reading them.
Our articles make government information more accessible. Please consult a qualified professional for financial, legal, or health advice specific to your circumstances.