Skip to content
Search

Latest Stories

Welcome! Log in to stay connected and make the most of your experience.

Input clean

In Defense of Tapping the Internet to Keep You Safe

In Defense of Tapping the Internet to Keep You Safe

In one month, the authorities provided under Section 702 of the Foreign Intelligence and Surveillance Act (FISA) are due to expire unless reauthorized by Congress. Lawmakers are expected to renew FISA, but may put another expiration deadline on the bill, and also may add limitations on how the government is allowed to use the information it collects, according to the experts that attended The Cipher Brief’s Cyber Advisory Board meeting on Tuesday.

  • Section 702 allows the U.S. government, primarily the National Security Agency, to monitor the communications of non-U.S. persons who are reasonably believed to be located outside of the United States, by accessing data provided by U.S.-based technology companies. Proponents said the authorities have proven integral to the intelligence community’s core missions of combating international terrorism, transnational crime, foreign espionage, weapons proliferation and cyber insecurity.
  • Current and former practitioners contend that even a short lag in the authorities could disrupt ongoing intelligence operations, prompting discussion among policymakers for providing a short fix by extending the provisions as is temporarily, potentially linked to other bills.
  • There are currently three separate bills in the works vying to reauthorize different versions of the controversial authorities: the FISA Amendments Act of 2017 has been introduced in the Senate and the most likely candidate; the USA Liberty Act and USA Rights Act have been introduced into the House of Representatives.
  • Collection under 702 takes place on internet exchange points and server farms within U.S. borders, due to a variety of technical reasons as a result of how data transits the globe on a borderless internet, and the fact that foreigners, including terrorists, often use U.S.-based communications platforms such as Google, Yahoo, AOL, Hotmail, Microsoft and Apple to communicate from countries such as Afghanistan, Syria, or even Russia.
  • This is accomplished through two methods: downstream and upstream collection. Downstream collection is the collection of stored communications data, both metadata and content, using “selectors”– such as email addresses, names and phone numbers – tasked to internet communications platforms who report back related communications data. Upstream collection, however, is the tasked collection of data in transit – often at data centers and from fiber optic cable landing sites – from internet service providers using specific selectors designed to capture communications of interest from a deluge of internet traffic in motion.

The intelligence collection enabled by the authorities under FISA 702 has been determined to be one of the most productive sources of intelligence ever afforded to the NSA, former officials on the Cyber Advisory Board said.

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Related Articles

Can President Trump Get a "Big, Beautiful" Deal in the Middle East?

Can President Trump Get a "Big, Beautiful" Deal in the Middle East?

CIPHER BRIEF REPORTING – When Benjamin Netanyahu and Donald Trump meet at the White House Monday, they will bring different ideas for resolving two [...] More

To Counter China, Reform U.S. Intelligence for the Digital Age

EXPERT PERSPECTIVE / OPINION -- The United States is facing a quiet and rapidly growing threat across the digital landscape, an unseen mathematical [...] More

Report for Friday, July 4, 2025

8:27 America/Chicago Friday, July 4 [...] More

Dead Drop: July 4

IN THIS WEEK’S EDITION: We’re wishing the U.S. a very happy birthday and sending our gratitude to those who are working overseas to help keep the [...] More

Expert Q&A: Former CENTCOM Commander on U.S. Troops in the Middle East

EXPERT Q&A — The American force posture in the Middle East — some 40,000 troops spread across the region — came into focus following the 12-day war [...] More

The U.S. Has 40,000 Troops in the Middle East

The U.S. Has 40,000 Troops in the Middle East

CIPHER BRIEF REPORTING -- Recent U.S. strikes against Iran’s nuclear facilities propelled the 40,000 American forces in the region into the spotlight [...] More

The Peacewalkers: How the West Went to War in 2022

“The protagonists of 1914 were sleepwalkers, watchful but unseeing, haunted by dreams, yet blind to the reality of the horror they were about to [...] More

Report for Thursday, July 3, 2025

8:25 America/Chicago Thursday, July 3 [...] More

Iran is a Terrorist State

OPINION — Since 1984, Iran has been designated a state sponsor of terrorism. The designation is justified, given Iran’s continued support of proxies [...] More