FISA Under Fire for Warrantless Spying on Americans

Dec 12, 2025
FISA Under Fire for Warrantless Spying on Americans

An intense congressional hearing has ignited a firestorm of controversy around Section 702 of the Foreign Intelligence Surveillance Act (FISA), revealing a profound and growing consensus among lawmakers and legal experts that a program intended for foreign intelligence has been dangerously repurposed for domestic surveillance. The central debate focuses on the U.S. government’s ability to search vast repositories of data for the private communications of American citizens without a warrant, a practice that critics argue has systematically eroded Fourth Amendment protections. A diverse panel of witnesses, including a former federal prosecutor and civil liberties advocates, testified that the program has strayed far from its original mandate, with failing safeguards and broken promises turning a critical national security tool into a significant threat to the privacy of every American. This escalating conflict has brought together a rare bipartisan coalition demanding fundamental reform, arguing that without a judicial check, the potential for abuse is not just a risk, but a reality.

The Backdoor Search and a Betrayal of Trust

The most glaring issue highlighted during the hearing is the practice commonly referred to as the “backdoor search” loophole, a method that allows federal agencies to circumvent traditional constitutional protections. Section 702 was enacted to permit the government to compel technology and communications companies to provide the communications of non-U.S. persons located abroad for foreign intelligence gathering. However, this large-scale collection inevitably sweeps in the emails, text messages, and phone calls of Americans who are in contact with those foreign targets. These communications are then stored in massive databases accessible to agencies like the NSA, CIA, and FBI. The “backdoor search” occurs when agents query these databases using the specific identifiers of American citizens—their names, email addresses, or phone numbers—to find and review their private conversations. This is all done without first obtaining a warrant from a court, a process that Liza Goitein of the Brennan Center for Justice described as a “bait and switch that drives a massive hole through the Fourth Amendment,” effectively turning a foreign surveillance program into a rich source of warrantless information on Americans.

This systematic use of Section 702 for domestic queries represents a profound betrayal of the assurances made to Congress when the law was first passed. Brett Tolman, a former U.S. Attorney who served as counsel for the Senate Judiciary Committee, delivered powerful testimony recalling his personal experience. He stated that intelligence officials gave lawmakers “high-stakes assurances” that the program would never be improperly used against “honest Americans.” Tolman unequivocally declared, “That was a lie.” He argued that for decades, and with increasing frequency, Section 702 has served as the “government’s permission slip for warrantless spying on Americans,” fundamentally violating the original premise upon which it was authorized. This sentiment was echoed by others who noted that while Congress initially envisioned the program as a targeted counter-terrorism tool, its application has expanded far beyond that scope over its 17-year history, evolving into a broad and intrusive surveillance mechanism that operates with minimal oversight.

Superficial Reforms and Enduring Constitutional Concerns

In defense of the program, some lawmakers pointed to recent changes implemented by the Reforming Intelligence and Securing America Act (RISAA), which extended Section 702 until April 2026. Proponents argue that these reforms, which include requiring supervisory preapproval for queries involving U.S. persons and enhanced auditing capabilities, are effectively curbing abuse. Representative Laurel Lee, who helped draft the legislation, asserted that the reforms are “demonstrably working,” citing a Department of Justice review that found a significant drop in noncompliant queries. These supporters maintain that the new internal checks and balances provide sufficient protection for Americans’ privacy while preserving a vital national security tool. However, this perspective was met with overwhelming skepticism from the panel of expert witnesses and a bipartisan group of legislators at the hearing.

The expert panel vehemently contended that the reforms enacted in RISAA are superficial and fall critically short of the constitutional standard for a search. They argued that requiring an FBI supervisor’s approval is in no way equivalent to obtaining a probable-cause warrant from an independent judge, essentially allowing the FBI to continue policing itself. Critics also dismissed the reported drop in compliance violations as misleading, pointing out that the FBI quietly altered its methodology for what it counts as a “query.” This change makes it impossible to accurately compare current search numbers to past figures or to determine the true extent of ongoing searches. As Liza Goitein testified, “We have no idea how many queries the FBI conducted in 2024. The number that appears in the annual statistical report is the number of known queries. The total remains unknown, as does the FBI’s compliance rate.” This lack of transparency undermines any claim that the program is now operating within acceptable constitutional bounds.

New Threats From Expanding Surveillance Authority

Beyond the long-standing problem of backdoor searches, the hearing identified new and significant threats to privacy stemming from expanded surveillance authorities codified in RISAA. The legislation included a major expansion of the definition of an “electronic communication service provider” (ECSP). The new language is so broad that it can be interpreted to include any service provider with access to equipment that might be used to transmit or store communications. Liza Goitein warned this could encompass “pretty much every American business,” including commercial landlords, data centers, and other entities far removed from traditional telecommunications. Unlike major tech companies that have sophisticated technical capabilities, these newly defined ECSPs may be unable to isolate specific communications, meaning they could be forced to provide the NSA with direct access to their entire communications infrastructure. This would inevitably expose purely domestic communications to government surveillance, a consequence that James Czerniawski, a policy analyst, called “way too expansive,” noting it has “scripted a whole host of businesses into this surveillance apparatus that had no intention of ever being in there.”

Another alarming practice discussed at length was the “data broker loophole,” which allows the government to bypass warrant requirements altogether. Witnesses explained that numerous federal agencies, including the FBI, DEA, and Department of Homeland Security, purchase vast amounts of commercially available data on Americans. This sensitive information can include cell phone location data, web browsing history, and other personal details that would otherwise require a warrant to obtain directly from a service provider. For instance, while the Supreme Court has ruled that law enforcement needs a warrant to compel a company to provide historical cell-site location information, agencies claim they are free to simply buy the exact same data from a private data broker without any judicial review. This “data broker loophole” operates in the shadows, with little to no transparency, making it extremely difficult for Congress or the courts to impose meaningful limits on a practice that effectively renders constitutional protections moot.

A Bipartisan Coalition and the Path Forward

The debate over Section 702 is unfolding within a highly charged political environment, amplifying concerns that an unchecked surveillance tool could be weaponized against domestic political opponents. Lawmakers from both sides of the aisle cited the installation of loyalists in key law enforcement and intelligence positions and directives that appear to target groups based on political ideology as reasons for heightened alarm. These fears have fueled a sense of urgency to implement robust, legally binding constraints on the government’s surveillance powers. Despite the intense partisan climate in Washington, opposition to the current state of Section 702 has forged a rare and powerful bipartisan, cross-ideological coalition. Liberal Democrats, deeply skeptical of domestic intelligence activities, have found common cause with conservative Republicans who have long criticized what they see as abuses by a “deep state.” This alliance was underscored by Representative Pramila Jayapal, who stated, “We have taken on our own parties, in power and out of power, because the Constitution doesn’t change depending on who is in the White House.”

The main finding from the hearing was the existence of a broad and undeniable consensus among legal scholars, privacy advocates, and a significant faction of Congress that Section 702, in its current form, enables unconstitutional surveillance of Americans. The primary and most forcefully articulated solution was to impose a strict warrant requirement for any search of the database targeting the communications of U.S. persons. Witnesses and lawmakers repeatedly argued that the only way to safeguard constitutional rights is to require the government to go to a separate and equal branch of government—the judiciary—and obtain a warrant based on probable cause. The committee’s Republican chairman, Jim Jordan, concluded with a simple yet powerful assessment: “The tried and true method—going to a separate and equal branch of government, getting a probable-cause warrant—is the answer. It doesn’t take a genius to figure this stuff out.” The hearing ultimately served as a clear warning that without such a fundamental reform, the program would continue what Brett Tolman described as its “clear record of systemic failure, constitutional betrayal, and disregard for the rule of law.”

Trending

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later