Technology

How FISA Section 702 Surveillance Works

Section 702 of the Foreign Intelligence Surveillance Act allows US intelligence agencies to collect foreign nationals' electronic communications without individual warrants—but it routinely sweeps up Americans' data too. Here is how the system works.

R
Redakcia
4 min read
Share
How FISA Section 702 Surveillance Works

What Is Section 702?

Section 702 of the Foreign Intelligence Surveillance Act (FISA) is one of the most powerful surveillance tools in the United States intelligence arsenal. Enacted in 2008 as an amendment to the original 1978 FISA statute, it authorizes the National Security Agency, FBI, CIA, and National Counterterrorism Center to collect electronic communications—emails, texts, phone calls, and social media messages—of foreign nationals located outside the United States without obtaining individual court orders.

The law was designed to modernize intelligence gathering for the digital age. But because global communications flow through American internet infrastructure, the program routinely sweeps up the private messages of US citizens and residents—a fact that has made Section 702 one of the most fiercely debated surveillance authorities in the world.

How Collection Works: Upstream and Downstream

Section 702 surveillance operates through two distinct mechanisms.

Downstream collection, formerly known as PRISM, works by sending a specific selector—such as an email address or phone number—directly to US-based technology companies like Google, Apple, or Meta. The company is then legally compelled to hand over all communications to or from that selector. The data is captured "at rest," meaning it is retrieved from the provider's servers.

Upstream collection is broader and more controversial. The NSA taps directly into the fiber-optic cables that form the backbone of the internet, copying and filtering the vast streams of data flowing through switches and routers on US soil. This captures communications "in transit" rather than from a specific provider. Upstream collection historically gathered not only messages to or from a target, but also messages merely about a target—though this "about" collection was suspended in 2017 following compliance issues.

The FISA Court's Role

Unlike ordinary wiretaps, which require a judge to approve surveillance of a specific person, Section 702 operates under blanket annual certifications from the Foreign Intelligence Surveillance Court (FISC). The attorney general and the director of national intelligence submit broad categories of foreign intelligence targets, and the FISC reviews the government's targeting and minimization procedures—but it does not approve or even see individual targets.

Critics, including the Brennan Center for Justice, have called the FISC "notoriously deferential to the government," noting that the court operates in secret and almost never denies requests.

The Backdoor Search Problem

The most contentious aspect of Section 702 is what privacy advocates call the "backdoor search loophole." While the law prohibits directly targeting Americans, the communications of US persons are routinely collected incidentally—when an American emails, calls, or messages a foreign target. Once that data sits in government databases, intelligence agencies can query it using American identifiers such as names, phone numbers, or email addresses, all without a warrant.

The scale is staggering. According to the Brennan Center, the FBI conducted approximately five million US person queries between 2019 and 2022. A declassified FISC opinion revealed over 278,000 noncompliant searches in a single reporting period, including improper queries on 19,000 political campaign donors. The Electronic Frontier Foundation describes this as a "finders keepers" approach to Americans' private communications.

National Security Value

Supporters argue Section 702 is indispensable. The program contributed to more than 25 percent of NSA terrorism reports as of 2014, according to the Center for a New American Security. It played a key role in disrupting plots including Najibullah Zazi's planned bombing of the New York City subway and Mohamed Osman Mohamud's attempted attack in Portland, Oregon. Intelligence officials say the program provides unique visibility into foreign threats that no other tool can replicate.

The Reform Debate

Bipartisan coalitions in Congress have repeatedly pushed for reforms, most notably a warrant requirement before agencies can search Section 702 data for Americans' communications. Polling from the Brennan Center shows 76 percent of Americans support such a requirement. Proposed exceptions would allow warrantless searches in emergencies, with the subject's consent, or to identify cyberattack victims.

Yet reform efforts have repeatedly stalled, with intelligence officials warning that any additional hurdles could slow time-sensitive investigations. The tension between national security imperatives and constitutional privacy protections ensures that Section 702 remains one of the defining civil liberties debates of the digital era.

Stay updated!

Follow us on Facebook for the latest news and articles.

Follow us on Facebook

Related articles