Fact-checked by Grok 2 weeks ago

Terrorist Surveillance Program

The Terrorist Surveillance Program (TSP) was a warrantless electronic surveillance operation authorized by President George W. Bush on October 4, 2001, directing the (NSA) to intercept the contents of international telephone calls and electronic communications into or out of the where a party to the communication was reasonably believed to be associated with or related terrorist organizations. This initiative bypassed the traditional warrant requirements of the (FISA) of 1978, relying instead on the President's Article II constitutional powers as and the congressional Authorization for Use of Military Force passed three days after the . The program's primary objective was to detect and disrupt terrorist plots by enabling rapid intelligence collection in the urgent environment, where delays from FISA court processes were deemed potentially catastrophic. Administration officials described it as a critical tool that contributed to by identifying threats without the procedural hurdles that could compromise operational timeliness. However, the TSP sparked intense controversy over its legality and implications for , with critics arguing it infringed on Fourth Amendment protections against unreasonable searches, while supporters emphasized its necessity in an asymmetric war against non-state actors who exploited modern communication technologies. Reauthorized periodically by the , the program operated in secrecy until its public disclosure in December 2005, prompting , legal challenges, and eventual legislative adjustments including the 2007 Protect America Act and 2008 FISA Amendments Act, which formalized similar bulk collection authorities under judicial supervision. The TSP exemplified the tension between enhanced executive surveillance powers for and safeguards against domestic overreach, influencing subsequent debates on intelligence reforms and privacy protections.

Post-9/11 Establishment

The September 11, 2001, terrorist attacks orchestrated by resulted in 2,977 deaths, marking the deadliest incident of terrorism in U.S. history excluding the perpetrators themselves. These coordinated hijackings of four commercial airliners targeted symbols of American economic, military, and political power, exposing critical vulnerabilities in . Pre-attack intelligence efforts revealed significant shortcomings, including the National Security Agency's (NSA) interception of communications that failed to connect key dots due to interagency "walls" restricting information sharing between foreign intelligence and domestic law enforcement. The highlighted systemic failures in imagination, policy, capabilities, and management that prevented anticipation of such an assault, despite warnings about 's intent to strike within U.S. borders. In response to these lapses and the urgent need to prevent further attacks, NSA Director Lieutenant General Michael V. Hayden proposed expanding surveillance authorities to monitor international communications linked to without requiring traditional (FISA) warrants for cases demanding rapid action. On October 4, 2001, President verbally authorized the initiation of what became known as the Terrorist Surveillance Program (TSP), directing the NSA to target international calls to or from the involving persons reasonably believed to be members or affiliates. This authorization aimed to establish an early-warning system against imminent threats, bypassing standard FISA procedures to enable faster intelligence collection amid heightened risks. The program represented an immediate executive adaptation to the transformed threat landscape, prioritizing operational agility over peacetime legal constraints.

Presidential Authorizations and AUMF Basis

Following the September 11, 2001, attacks, President signed the Authorization for Use of Military Force (AUMF) on September 18, 2001, which empowered him "to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons." The Bush administration maintained that this congressional authorization, interpreted alongside the President's Article II powers as , provided statutory and constitutional grounds for warrantless electronic surveillance targeting affiliates, framing such intelligence collection as an integral component of military operations against a non-state enemy rather than routine domestic . The initial presidential authorization for the Terrorist Surveillance Program (TSP) occurred on October 4, 2001, directing the (NSA) to intercept international communications involving suspects without prior (FISA) warrants. This directive was reauthorized by President more than 30 times through early 2007, typically on an approximately 45-day cycle to incorporate updated intelligence assessments of evolving threats. Each reauthorization involved review by senior executive officials, including the Attorney General and Advisor, to confirm compliance with targeting limits focused on foreign-to-foreign or foreign-to-U.S. communications linked to terrorism. Department of Justice (OLC) memoranda, including those drafted in late and reviewed in , asserted that Article II inherent authority permitted warrantless surveillance during wartime, independent of FISA's statutory framework, which the viewed as supplemental rather than restrictive for foreign intelligence in armed conflict. These opinions emphasized that the AUMF implicitly endorsed executive flexibility in to disrupt operations, overriding FISA's requirements where targets exhibited rapid adaptability in communications patterns. The argued that even FISA's emergency provision—allowing surveillance for up to 72 hours before warrant application—imposed delays incompatible with the real-time nature of terrorist plotting, necessitating immediate interception to prevent imminent attacks. This position drew on historical precedents of presidential warrantless surveillance during conflicts, such as , to underscore the program's alignment with executive war powers unbound by peacetime judicial oversight.

Program Mechanics and Operations

Targeting Criteria and Scope

The Terrorist Surveillance Program (TSP) conducted by the (NSA) focused on intercepting international communications in which the agency possessed a reasonable basis to conclude that one party was a member of , affiliated with , or a member of an organization affiliated with . This criterion derived from presidential authorizations emphasizing targeted interception of threats linked to the network, prioritizing derived from known terrorist operatives over broad data acquisition. The program's scope was confined to communications with at least one endpoint outside the , thereby excluding purely domestic calls lacking a foreign . Targeting selectors, such as specific telephone numbers or email addresses associated with suspected figures, were seeded from intelligence obtained via battlefield captures, detainee interrogations, and other counterterrorism operations in regions like . This approach limited surveillance to an estimated several hundred known or suspected terrorist-associated identifiers at inception, underscoring its directed nature against validated threats rather than mass collection of American communications. Initial operations did not encompass routine acquisition of content involving U.S. persons without a determination of linking them to , with any incidental collection subject to separate review thresholds. The emphasis remained on foreign al Qaeda-directed plots infiltrating U.S. borders, reflecting empirical prioritization of actionable intelligence from captures over speculative domestic monitoring.

Surveillance Techniques Employed

The Terrorist Surveillance Program enabled the (NSA) to conduct targeted interception of the content of international telephone and electronic communications entering or exiting the , limited to instances where there existed a reasonable basis to conclude that one party was a member of , affiliated with , or part of an organization affiliated with or supporting activities. These interceptions utilized NSA's established infrastructure to capture voice and data streams associated with specific selectors, such as telephone numbers or addresses derived from prior intelligence on terrorist operatives. Metadata collection complemented content interception through methods akin to pen registers and trap-and-trace devices, acquiring non-content details like dialed numbers, timestamps, durations, and routing information for calls involving suspected terrorists. This facilitated network analysis to detect patterns indicative of terrorist activity, such as contact chaining between known foreign targets and U.S. persons, while applying analytic filters to exclude and discard from purely domestic U.S.-to-U.S. communications lacking a probable foreign terrorist nexus. The program's technical implementation drew on NSA's access to international communication pathways, including undersea fiber-optic cables handling transoceanic traffic, to intercept signals where indicated a link to foreign terrorist entities; this upstream-style collection targeted transient international flows rather than endpoint provider queries characteristic of later programs like . Limitations inherent to these techniques included dependence on accurate selector validation to avoid overreach and challenges in decryption of encrypted , ensuring focus on feasible, intelligence-driven targets rather than indiscriminate vacuuming.

Data Handling and Minimization Procedures

The implemented minimization procedures in the Terrorist Surveillance Program to limit the retention and dissemination of information concerning U.S. persons, applying safeguards analogous to those under the . These rules required the destruction of communications content acquired incidentally involving U.S. persons if it lacked foreign intelligence value, ensuring such data was not stored or analyzed beyond initial processing unless pertinent to al Qaeda-related threats or other authorized purposes. associated with U.S. persons was retained only to the extent it evidenced links to foreign targets, with broader retention prohibited to prevent incidental domestic focus. Internal NSA protocols mandated pre-collection targeting reviews by agency lawyers to confirm reasonable belief in a foreign nexus, coupled with post-collection audits by the NSA and to verify and detect any deviations. The Department of Justice's conducted formal reassessments approximately every 45 days, certifying the program's adherence to presidential authorizations and constitutional limits prior to renewals. These measures aimed to constrain data handling to operational necessities, informed by historical precedents of unchecked expansion, such as the program from 1945 to 1975, where absent retention limits enabled unwarranted domestic overreach. Congressional oversight was restricted to briefings for the "Gang of Eight"—comprising the and leadership and intelligence committee heads—who received periodic updates on program parameters and safeguards, though without full operational details due to classification constraints. This layered review process balanced rapid threat response with retention boundaries, minimizing risks of data proliferation observed in prior intelligence efforts lacking comparable checks.

Public Disclosure and Immediate Aftermath

New York Times Revelation (December 2005)

On December 16, 2005, published an article by reporters and Eric Lichtblau revealing the existence of the National Security Agency's Terrorist Surveillance Program, which involved warrantless of international telephone calls and electronic communications involving persons inside the linked to or related terrorist organizations. The report detailed that President had secretly authorized the NSA shortly after the September 11, 2001, attacks to bypass the Foreign Intelligence Surveillance Act's warrant requirements for such surveillance targeting suspected terrorists. Publication of the story had been delayed for over a year from its initial reporting in , following requests from administration officials who argued that disclosure would jeopardize amid active terrorist threats. later explained the hold as resulting from extensive consultations with sources emphasizing potential harm to operations, though critics questioned the timing of the release given persistent activities and plots against the U.S. In immediate response, President Bush defended the program on December 17, 2005, stating it was a vital, lawful tool to detect and disrupt terrorist plots, and accused the New York Times of compromising national security by publicizing classified methods during wartime. Initial polls reflected significant support for the when framed as targeted at international terrorist communications, with a Washington Post-ABC News survey indicating 63% approval for NSA monitoring of calls between suspected foreign terrorists and Americans. This revelation occurred against the backdrop of intensifying debates over the and U.S. strategies, heightening partisan divisions as Democrats criticized the program while Republicans emphasized its necessity in preventing attacks. The Times, an outlet with documented left-leaning institutional bias, faced accusations of selective timing that prioritized political impact over security imperatives in an era of elevated terror risks.

Government Response and Congressional Hearings

Following the disclosure on December 16, 2005, publicly confirmed the existence of the Terrorist Surveillance Program (TSP) in a radio address on December 17, 2005, defending it as a critical tool authorized shortly after the to intercept international communications involving members or affiliates where one party was in the United States. emphasized that the program operated under his constitutional authority as and the congressional Authorization for Use of Military Force (AUMF), asserting it had saved lives by enabling rapid monitoring without the delays of traditional court warrants, and he vowed its continuation to protect against terrorist threats. The administration also released a legal from the Department of Justice on January 19, 2006, arguing the program's compliance with statutory and constitutional limits, while selectively declassifying memoranda to support claims of inherent executive wartime powers. Congressional scrutiny intensified in early 2006, with the Senate Judiciary Committee holding hearings on February 6, 2006, titled "Wartime Executive Power and the National Security Agency's Surveillance Authority," where Attorney General Alberto Gonzales testified on the program's targeted nature and internal safeguards, including oversight by the Department of Justice and congressional intelligence committees. General Michael Hayden, then principal deputy director of national intelligence and former NSA director, appeared in multiple sessions, including his May 18, 2006, confirmation hearing for CIA director, where he detailed operational protocols limiting surveillance to foreign intelligence targets linked to terrorism and affirmed the program's legality under Article II powers, rejecting claims of unchecked domestic spying. Bipartisan senators, including Arlen Specter (R-PA) and Russ Feingold (D-WI), pressed for greater transparency and FISA compliance, leading to calls for independent review, yet no legislation halted the program during these debates. The TSP exhibited operational continuity throughout 2006, with no documented interruptions despite ongoing hearings and public debate, as evidenced by continued presidential reauthorizations and administration defenses underscoring its perceived indispensability for timely threat detection in an evolving terrorist landscape. This persistence reflected a prioritization of efficacy over immediate procedural reforms, with officials citing the program's role in disrupting plots without broader erosions through minimization procedures.

Arguments for Inherent Executive Authority

The Bush administration contended that the President possesses inherent constitutional authority under Article II to conduct warrantless surveillance of international communications involving or affiliated terrorists, as part of his role as and sole organ of the nation in . This authority, derived from the Vesting Clause and Clause, enables the executive to gather foreign intelligence necessary to detect and disrupt armed attacks on the , without prior judicial approval, particularly when targeting foreign powers or their agents. Courts have recognized this in foreign intelligence contexts, distinguishing it from domestic criminal investigations by emphasizing the President's superior position and expertise in matters. The Authorization for Use of Military Force (AUMF), enacted on September 18, 2001 (Pub. L. No. 107-40, 115 Stat. 224), reinforced this inherent authority by explicitly authorizing the to use "all necessary and appropriate force" against those responsible for the and associated forces, including . Administration officials argued that the AUMF functions as a functional equivalent to a congressional , placing the at the "zenith of his powers" under the framework established in Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579, 635 (1952), where executive action aligns with express or implied congressional approval. This interpretation draws analogies to , 542 U.S. 507 (2004), where the upheld the AUMF's broad scope to authorize military detention of enemy combatants, extending similarly to intelligence operations essential to wartime force deployment. Historical precedents underscore the longstanding executive practice of warrantless surveillance during armed conflicts. President authorized intercepts of telegraph communications without warrants during the to counter Confederate threats, providing early validation for executive initiative in amid existential national peril. Similarly, President directed warrantless monitoring of foreign agents' communications prior to and during , including through No. 8985 in 1941, which facilitated collection without judicial oversight to safeguard against espionage. These actions, upheld implicitly by subsequent congressional acquiescence and judicial deference, affirm that such measures fall within the President's core war powers rather than requiring statutory warrants. Fundamentally, foreign intelligence surveillance targets threats from non-U.S. actors abroad, necessitating a standard distinct from the for crime required under domestic , as the executive must act with speed and secrecy against fluid terrorist networks like . The (FISA) of 1978 was designed to regulate peacetime intelligence gathering, not to constrain wartime operations against declared enemies, and its requirement for foreign agents—lower than criminal standards—reflects recognition of this operational divergence. The Fourth Amendment accommodates this through a "special need" exception for foreign intelligence, as affirmed in In re Sealed Case, 310 F.3d 717, 742 (FISA Ct. Rev. 2002), prioritizing collective security over individualized warrants in contexts involving foreign powers.

Challenges Under FISA and Fourth Amendment

The (FISA), enacted in 1978, established the Foreign Intelligence Surveillance Court (FISC) to authorize electronic surveillance for foreign intelligence purposes when U.S. persons or facilities were involved, requiring determinations even for targets reasonably believed to be foreign agents or powers. Critics of the Terrorist Surveillance Program (TSP), including members of and organizations, contended that the program's warrantless interception of international communications—where at least one party was reasonably believed to be linked to —violated FISA's statutory framework, as the Act was intended to serve as the exclusive means for such surveillance conducted within the . They argued that FISA's amendments, particularly after 1978, eliminated prior executive discretion for warrantless foreign agent surveillance involving U.S. communications facilities, rendering the Bush administration's bypass of FISC approvals unlawful regardless of exigencies. Under the Fourth Amendment, challengers asserted that the TSP's warrantless searches were presumptively unreasonable, lacking the neutral judicial oversight mandated for intrusions into interests in telephonic communications. In ACLU v. NSA (2006), plaintiffs including the (ACLU) and journalists claimed the program enabled dragnet-like overbreadth, capturing domestic communications incidentally and chilling First Amendment activities through fear of , thereby violating core protections against unreasonable searches. The U.S. District Court for the Eastern District of Michigan initially granted an injunction, ruling the TSP unconstitutional on Fourth Amendment grounds due to its absence of individualized warrants and potential for abuse, though the Sixth Circuit Court of Appeals reversed on standing grounds in 2007, holding plaintiffs lacked sufficient injury to sue without confirming harm. These suits highlighted allegations of systemic overreach, with critics positing that certifications by executive officials alone failed to mitigate risks of erroneous targeting or retention of U.S. person data. Empirical assessments of privacy impacts, however, revealed limited incidental collection of U.S. persons' communications, confined by targeting protocols to specific affiliates abroad and subject to internal minimization procedures that discarded non-relevant domestic content unless it demonstrated foreign intelligence value or criminal activity warranting dissemination. Government disclosures indicated the program focused on a narrow set of international calls—estimated in the low thousands of targets over its duration—rather than indiscriminate acquisition, with U.S. person intercepts occurring only incidentally and rarely disseminated, undermining claims of pervasive erosion. Such data, drawn from declassified overviews, suggested that assertions of "mass" surveillance overstated the program's scope, as safeguards like certifications and NSA compliance reviews constrained overcollection, though critics dismissed these as inadequate self-regulation prone to error.

Judicial Rulings and Legislative Adjustments

In early 2007, compliance issues with the Terrorist Surveillance Program (TSP) surfaced, including overcollection of communications, leading the (NSA) to voluntarily suspend warrantless acquisitions on January 17 and notify the Foreign Intelligence Surveillance Court (FISC). The FISC reviewed these deficiencies and issued orders directing procedural corrections, while authorizing continued surveillance under (FISA) warrants for specific targets, thereby transitioning elements of the TSP to statutory compliance without issuing a program-wide . To address gaps in legal authority as FISA orders expired and amid heightened needs, passed the Protect America Act (P.L. 110-55) on August 5, 2007, amending FISA to allow the Attorney General and to authorize warrantless of foreign targets reasonably believed to be located outside the for up to one year, subject to internal guidelines and FISC oversight of directives to providers. This temporary measure, effective for 180 days, facilitated bulk acquisition of international communications transiting U.S. facilities while mandating minimization of U.S. person data. Building on the Protect America Act, the FISA Amendments Act of 2008 (P.L. 110-261), signed into law on July 10, 2008, established Section 702 as a permanent framework for targeting non-U.S. persons abroad for foreign intelligence purposes, requiring annual certifications and FISC approval of targeting and minimization procedures but eliminating individual warrants for foreign targets. The Act also provided retroactive civil liability protection for telecommunications carriers that had assisted government surveillance efforts prior to its enactment, upon presidential determination of good-faith assistance, effectively shielding companies like from ongoing lawsuits related to TSP participation. Federal courts handling challenges to the TSP, including ACLU v. NSA (493 F.3d 644, 6th Cir. 2007), dismissed cases primarily on lack of standing or invocation of the , avoiding substantive rulings that could have enjoined the program entirely. These outcomes, coupled with legislative codifications, preserved operational continuity through targeted judicial and statutory adjustments rather than absolutist prohibitions.

Effectiveness and National Security Outcomes

Thwarted Terrorist Activities

The Terrorist Surveillance Program (TSP) played a role in detecting operative , who conspired to the in 2003 by using a to sever its suspension cables, aiming to disrupt U.S. . Intercepts of Faris's overseas communications with facilitators under the TSP prompted FBI , culminating in his arrest and guilty plea on October 28, 2003, to charges of providing material support to terrorists and plotting to destroy government property; he received a 20-year sentence. TSP intelligence similarly aided in confirming the al-Qaeda affiliations of Jose Padilla, a U.S. citizen arrested on May 8, 2002, at Chicago's O'Hare Airport for plotting to detonate a radiological "" in a U.S. city and to blow up high-rise buildings with . Warrantless intercepts of Padilla's international calls traced his operational ties to senior figures, including , enabling his designation as an and subsequent material support conviction in 2007, for which he was resentenced to 21 years in 2014. Beyond these cases, TSP-generated leads supported CIA efforts to locate and capture high-value targets, with NSA officials reporting dozens of actionable tips that advanced operations against the network in the U.S. and abroad. The program's warrantless framework enabled intercepts within minutes to hours of identifying al-Qaeda-linked numbers, in contrast to the (FISA) process, which often required 24 hours or more for approval and risked missing transient terrorist communications.

Empirical Assessments of Program Value

The 9/11 Commission Report highlighted pre-9/11 legal barriers that constrained NSA surveillance, including FISA's requirement for probable cause warrants even when targeting foreign powers if U.S. persons might be incidentally involved, and "wall" policies that impeded information sharing between intelligence and law enforcement agencies. These restrictions, rooted in 1990s court rulings and executive orders emphasizing domestic privacy protections, limited the agency's ability to monitor al Qaeda's international communications proactively, contributing to missed opportunities before the September 11 attacks. The TSP addressed this by authorizing warrantless interception of international calls involving suspected terrorists, enabling faster collection against time-sensitive threats without the delays of FISA applications, which averaged 200 applications per year pre-9/11 for similar targets. Official evaluations, including Department of Justice reviews and congressional testimonies, assessed the TSP as generating actionable leads disseminated to partners, with NSA reporting contributions to broader tip flows that supported ongoing operations against networks. Declassified ODNI analyses of program efficacy note that like the TSP facilitated early detection in asymmetric conflicts, where adversaries employ encrypted and routed communications to evade traditional predicates, yielding metrics such as validated foreign reports that informed tactical responses. While exact attribution remains challenging due to operational secrecy, these assessments counter claims of by linking the program's structure to enhanced tip generation and reduced collection lags compared to pre-9/11 baselines. Oversight findings on compliance underscore low misuse rates under the TSP's internal safeguards, including NSA minimization procedures and recertifications every 45 days, with no documented instances of widespread domestic targeting beyond authorized foreign links. Successor programs under FISA amendments, reviewed by the PCLOB, report analogous low error rates—such as NSA compliance incidents below 0.1% in targeting procedures—affirming that structured warrantless foreign maintains high operational value with circumscribed risks to U.S. persons' . In an environment of persistent, low-signature threats, such metrics support the program's net contribution to deterrence, as reactive regimes alone prove insufficient for preempting decentralized networks operating across borders.

Comparisons to Pre- and Post-Program Threats

Prior to the initiation of the Terrorist Surveillance Program (TSP) in the immediate aftermath of the , 2001, attacks, U.S. intelligence agencies suffered from significant silos that hindered the detection of plots, as documented in the , which detailed failures in information sharing between the CIA, FBI, and NSA regarding hijacker activities and prior warnings. These lapses contributed to 's successful execution of the 9/11 attacks, resulting in 2,977 fatalities, the deadliest terrorist incident in U.S. history. Earlier operations, such as the (6 deaths) and the 2000 USS Cole attack (17 U.S. deaths), highlighted a pattern of escalating threats that pre-TSP structures failed to preempt comprehensively. During the TSP's operation from 2001 to 2007, 's operational tempo against U.S. targets declined markedly, with no successful large-scale attacks on U.S. soil matching 9/11's scope, correlating with enhanced NSA monitoring of international communications linked to suspected terrorists. Data from the (GTD) indicate a sharp drop in U.S.-based terrorist incidents and fatalities post-2001 compared to the pre-9/11 era's vulnerabilities, though multifaceted efforts, including military operations, contributed to al-Qaeda core's weakening in the mid-2000s. For instance, GTD records fewer than 100 domestic terrorist attacks annually in the U.S. through the mid-2000s, with jihadist fatalities totaling under 50 excluding 9/11, reflecting disrupted plots rather than unchecked escalation. Following TSP's termination in January 2007 and the transition to Foreign Intelligence Surveillance Act (FISA) warrant requirements—later eased by the 2008 FISA Amendments Act—threat levels from al-Qaeda affiliates persisted at a subdued level, with GTD showing continued low U.S. incident rates but a rise in smaller-scale or inspired attacks by the 2010s, such as the 2013 Boston Marathon bombing (3 deaths). NSA Director Michael Hayden testified that FISA's pre-TSP procedural delays, often spanning days for warrants, risked operational lags in fast-moving threats, a concern echoed in post-shift compliance challenges under Section 702 that occasionally hampered timely collections despite overall efficacy. Empirical assessments, including reduced al-Qaeda spectaculars globally by the late 2000s, suggest TSP-era surveillance bolstered a baseline of threat mitigation that FISA frameworks sustained amid evolving procedural burdens.

Criticisms and Defenses

Civil Liberties Objections

Civil liberties advocates, including the (ACLU), argued that the Terrorist Surveillance Program (TSP), initiated in 2001, unlawfully circumvented the (FISA) by authorizing warrantless interception of international communications where at least one party was reasonably believed to be affiliated with . The ACLU contended in federal lawsuits that this approach violated the Fourth Amendment's prohibition on unreasonable searches, as it lacked prior judicial approval for surveillance implicating U.S. persons, even in cases of incidental collection. Critics highlighted the program's potential for overreach, asserting that warrantless surveillance eroded privacy protections and risked a slippery slope to unchecked domestic monitoring, drawing parallels to intelligence agency excesses exposed by the in 1975, such as warrantless of anti-war activists. Under TSP protocols, communications of U.S. persons were incidentally captured without individualized warrants or notification, raising concerns over minimized but unconsented and querying by analysts. Despite these claims, Department of Justice assessments of the program's four-year operation through 2005 identified no verified abuses, with safeguards like internal reviews intended to prevent misuse. Judicial challenges, including ACLU v. NSA, were dismissed on standing grounds, as plaintiffs could not demonstrate they were directly targeted, limiting evidentiary findings of harm. Subsequent FISA Court oversight after TSP's partial integration in 2007 revealed isolated procedural errors, such as improper querying, but no systemic violations attributable to the original program's design.

Security Necessity and Overstated Privacy Risks

The initiation of the Terrorist Surveillance Program (TSP) responded directly to the , 2001, attacks, which killed 2,977 people and demonstrated al-Qaeda's capacity for coordinated mass-casualty operations on U.S. soil, necessitating rapid adaptations in to address non-state actors' decentralized tactics. Pre-9/11 intelligence failures, including siloed data and slow interagency sharing, had contributed to the attacks' success, underscoring the need for streamlined surveillance against imminent threats where traditional processes lagged. The Foreign Intelligence Surveillance Act's (FISA) requirement for individualized warrants, often involving determinations and court reviews that could span days amid voluminous international traffic, proved cumbersome for intercepting fleeting terrorist communications in a environment of heightened global jihadist activity. NSA officials contended that TSP's targeted, warrantless monitoring of overseas links reasonably believed to involve affiliates enabled proactive disruption, bypassing bureaucratic delays that risked missing time-sensitive plots in an era when adversaries exploited disposable technology and couriers. Proponents highlighted TSP's role in broader NSA efforts that officials credited with disrupting over 50 potential terrorist attacks worldwide since , including plots against U.S. financial targets, by providing actionable on foreign operatives' networks. While some assessments questioned direct attributions to specific bulk tools, the program's focus on , terrorism-specific intercepts aligned with empirical imperatives to prioritize prevention over procedural hurdles, given the state's core obligation to mitigate existential risks to civilian populations. Privacy concerns were overstated, as TSP applied minimization rules to discard or mask incidentally collected U.S. persons' unless foreign value warranted retention, with no declassified of systematic hoarding of domestic content or deviation into non-terrorism . The program's scope—limited to calls with one endpoint abroad and a reasonable basis for linkage—contrasted sharply with narratives of unfettered mass collection, and former NSA Director Michael Hayden affirmed the absence of abuse or unlawfulness in its execution. Absent verified domestic harms, such risks paled against the tangible costs of shortfalls, as by 9/11's death toll and subsequent thwarted attempts that underscored 's deterrent value in a threat landscape where inaction invited repetition.

Political and Media Influences on Perception

The revelation of the Terrorist Surveillance Program by on December 16, 2005, followed a delay of over a year from initial reporting in late 2004, during which Bush administration officials repeatedly urged the newspaper to withhold publication on grounds. Executive Editor later stated that the paper weighed assurances of presidential legal authority and potential risks to methods before proceeding, a decision critics attributed to prioritizing journalistic impact over ongoing efficacy, as the disclosure prompted affiliates to modify communication tactics. polls immediately after the story reflected framing effects: a January 2006 survey found 53 percent of Americans approved of warrantless wiretaps when described as a measure "in order to reduce the threat of ," yet support eroded in polls emphasizing "warrantless" aspects without context, with 56 percent favoring warrants in an AP-Ipsos poll. Partisan political responses diverged sharply post-revelation, despite prior bipartisan briefings to the Gang of Eight congressional leaders—comprising both Republicans and Democrats such as and —on the program's existence and operations starting in 2002, with at least a dozen such sessions documented by administration records. , vice chairman of the , privately conveyed concerns in a 2003 handwritten to Cheney, questioning the program's scope and while noting his inability to consult colleagues or act due to classification rules, yet he did not publicly dissent at the time. Following the Times disclosure, Democratic leaders amplified calls for mandatory FISA warrants and , framing the program as executive overreach, which contrasted with their earlier silence during briefings and aligned with broader war authorizations they had supported. Media and political narratives, predominantly from left-leaning outlets, emphasized violations under the "warrantless " label, correlating temporally with peaking anti-Iraq War sentiment and declining approval ratings rather than substantiated findings of program misuse; leaks yielded no empirical evidence of widespread abuses, as subsequent investigations confirmed the program's targeting adhered to linkages, yet coverage often minimized disclosed security benefits like thwarted plots in favor of privacy alarmism. This selective framing, amplified by outlets with documented institutional biases toward critiquing Republican-led security measures, fostered perceptions prioritizing theoretical risks over causal trade-offs in terrorism prevention, where empirical assessments later validated the program's role in disrupting threats without domestic overreach.

Termination and Broader Legacy

Transition to FISA Amendments Act

In early 2007, amid ongoing legal and internal challenges exposed during congressional briefings by , the Terrorist Surveillance Program (TSP) underwent a significant operational shift. The last presidential authorization for the TSP expired on February 1, 2007, prompting a brief pause in certain warrantless activities as the (NSA) transitioned select collection efforts to oversight by the Foreign Intelligence Surveillance Court (FISC) under existing FISA provisions. This change followed revelations of prior internal dissent, including the 2004 hospital bedside confrontation involving then-Acting and , where officials refused to reauthorize unmodified aspects of the program, leading to modifications to secure Justice Department approval. To resolve perceived limitations in FISC procedures for targeting foreign threats, enacted the Protect America Act (PAA) on August 5, 2007, as a temporary six-month measure authorizing warrantless of foreign targets reasonably believed to be outside the . The PAA effectively resumed core TSP-like capabilities by directing intelligence agencies to acquire foreign intelligence without individual warrants, while requiring high-level certifications of compliance and targeting procedures. This interim legislation bridged the gap until the more permanent FISA Amendments Act (FAA), signed into law on July 10, 2008, which codified warrantless acquisition of communications to and from foreign targets, including provisions for bulk collection under Section 702. The FAA's framework phased out the TSP's executive-only authorizations but preserved operational continuity in NSA practices, such as targeting international terrorism-related communications, by integrating them into statutory processes with and approvals rather than solely presidential directives. It also provided retroactive to telecommunications providers that had assisted the government, shielding them from civil for prior TSP-related cooperation and incentivizing future participation. This evolution addressed constitutional and statutory concerns raised by Justice Department officials and courts—without substantially curtailing surveillance efficacy against overseas threats—by formalizing executive actions into legislative authority tailored to intelligence needs.

Influence on Section 702 and Subsequent Surveillance

The Terrorist Surveillance Program (TSP), initiated in 2001, provided a foundational operational model for warrantless electronic surveillance of international communications linked to terrorism, influencing the development of statutory authorities under the Foreign Intelligence Surveillance Act (FISA). Following legal challenges and congressional scrutiny, TSP's practices informed the Protect America Act of 2007 and, subsequently, Section 702 of the FISA Amendments Act (FAA) enacted on July 10, 2008, which authorized the targeting of non-U.S. persons reasonably believed to be located abroad for foreign intelligence purposes, including counterterrorism. This framework institutionalized TSP-like upstream collection from communication infrastructure and downstream acquisition from providers, while imposing targeting procedures, minimization rules to protect U.S. persons, and annual certifications reviewed by the Foreign Intelligence Surveillance Court (FISC). Section 702 has been reauthorized three times since 2008—in 2012 for six years, in 2018 for six years, and most recently on , 2024, for two years via the Reforming Intelligence and Securing America Act—despite ongoing debates over requiring s for queries of incidentally collected U.S. persons' data (known as "backdoor searches"). Proponents, including officials, argued that requirements would hinder timely foreign gathering, citing the program's role in disrupting terrorist plots without significant privacy intrusions on Americans. The 2024 reauthorization incorporated reforms like enhanced penalties for FISA misuse and expanded reporting on compliance incidents, but rejected broader mandates pushed by advocates. Revelations from Edward Snowden's 2013 leaks highlighted Section 702's implementation through programs like (downstream collection from U.S. tech firms) and Upstream (direct taps on cables), positioning TSP as a conceptual precursor that normalized such bulk foreign targeting despite incidental U.S. data capture. Empirical assessments from oversight bodies affirm Section 702's value for , with of the (ODNI) statistics showing U.S. persons are never directly targeted and represent a minimal fraction of collections— for instance, in 2016, NSA and CIA queried Section 702 repositories using only about 5,288 U.S. person identifiers amid vast foreign-targeted volumes. Annual transparency reports indicate that disseminations of incidentally acquired U.S. person information remain tightly controlled, with compliance reviews documenting rare incidents relative to the scale of operations, underscoring the program's targeted efficacy over broad domestic impact.

References

  1. [1]
    [PDF] Report on the President's Surveillance Program - ACLU
    Jul 10, 2009 · 17 December 2005 (commonly known as the Terrorist Surveillance Program). ... The PSP came into existence on 4 October 2001, when President Bush ...
  2. [2]
    [PDF] The NSA Program to Detect and Prevent Terrorist Attacks
    Jan 27, 2006 · Reality: The President's authority to authorize the terrorist surveillance program is firmly based both in his constitutional authority as ...
  3. [3]
    Statement on the Terrorist Surveillance Program
    Aug 17, 2006 · The Terrorist Surveillance Program has proven to be one of our most critical and effective tools in the war against terrorism, and we look ...
  4. [4]
    [PDF] report on the surveillance program operated pursuant to section 702
    Sep 28, 2023 · was later referred to as the Terrorist Surveillance Program (TSP). Under this authorization,. 9 See THOMAS H. KEAN & HAMILTON H. LEE, THE 9 ...
  5. [5]
    The Department of Justice Releases Additional Documents ...
    Dec 12, 2014 · The collection of communications content under what has come to be known as the Terrorist Surveillance Program (“TSP”) and presidential ...
  6. [6]
  7. [7]
    National Commission on Terrorist Attacks Upon the United States
    Across the government, there were failures of imagination, policy, capabilities, and management. Imagination The most important failure was one of imagination.
  8. [8]
    [PDF] top secretiistlw//comint/orconinoforn - st-09-0002 working draft - ACLU
    Oct 4, 2001 · This includes the program described by the President in a. 17 December 2005 radio address as the Terrorist Surveillance Program, which was ...Missing: post- | Show results with:post-
  9. [9]
    [PDF] NSA White Paper - Department of Justice
    Jan 19, 2006 · establish an early warning system to detect and prevent another catastrophic terrorist attack on ... security—such as domestic terrorism—it ...
  10. [10]
    [PDF] Public Law 107–40 107th Congress Joint Resolution
    To authorize the use of United States Armed Forces against those responsible for the recent attacks launched against the United States. Whereas, on September 11 ...Missing: Program | Show results with:Program
  11. [11]
    President's Radio Address - George W. Bush White House Archives
    Dec 17, 2005 · The activities I authorized are reviewed approximately every 45 days. Each review is based on a fresh intelligence assessment of terrorist ...
  12. [12]
    Prepared Statement of Hon. Alberto R. Gonzales, Attorney General ...
    Feb 6, 2006 · This program is reviewed and reauthorized by the President approximately every 45 days. The Congressional leadership, including the leaders ...
  13. [13]
    [PDF] Status of Certain OLC Opinions Issued in the Aftermath of the ...
    Jan 15, 2009 · Deputy Assistant Attorney General, Office of Legal Counsel. Re: October 23. 2001 OLC Opinion Addressing the. Domestic Use of Military Force to ...
  14. [14]
    Democrats Continue to Attack Terrorist Surveillance Program
    Jan 22, 2006 · Scott McClellan: The NSA's terrorist surveillance program is targeted at al Qaeda communications coming into or going out of the United ...
  15. [15]
    [PDF] Report on the Telephone Records Program Conducted under ...
    Jan 23, 2014 · 1 The article described an NSA program to collect millions of telephone records, including records about purely domestic calls. Over the course ...<|separator|>
  16. [16]
    [PDF] JULY 2, 2014 - National Security Agency
    Jul 2, 2014 · Under one program, implemented under Section 215 of the USA PATRIOT Act, the NSA collects domestic telephone metadata (i.e., call records) in ...
  17. [17]
    [PDF] top secret//stlw//hcs/comint/orcon/noforn - DNI.gov
    Mar 19, 2004 · NSA briefs Chair, SSCI TSP Subcommittee ... Compliance and Minimization Procedures. Evaluation of dual FISA and PSP content collection.
  18. [18]
    [PDF] US Department of Justice Office of Legislative Affairs
    Jan 11, 2007 · there is a "reasonable basis" to conclude that one party is a member of al Qaeda, ... Under the Terrorist. Surveillance Program ...
  19. [19]
    Bush Lets U.S. Spy on Callers Without Courts - The New York Times
    Bush Lets U.S. Spy on Callers Without Courts. Share full article. By James Risen and Eric Lichtblau. Dec. 16, 2005. Correction Appended. WASHINGTON, Dec.
  20. [20]
    Behind the Eavesdropping Story, a Loud Silence - The New York ...
    Jan 1, 2006 · THE New York Times's explanation of its decision to report, after what it said was a one-year delay, that the National Security Agency is ...
  21. [21]
    Behind the 'Times' Publication of U.S. Spying Story - NPR
    Dec 20, 2005 · The New York Times scored a major journalistic coup last Friday with a front-page story about how President Bush had authorized the National Security Agency to ...
  22. [22]
    Bush says he signed NSA wiretap order - Dec 17, 2005 - CNN
    Dec 17, 2005 · President Bush took aim at the messenger Saturday, saying that a newspaper jeopardized national security by revealing that he authorized wiretaps on US ...Missing: George W
  23. [23]
    Bush Says He Ordered Domestic Spying - The New York Times
    Dec 18, 2005 · President Bush acknowledged on Saturday that he had ordered the National Security Agency to conduct an electronic eavesdropping program in ...Missing: response | Show results with:response
  24. [24]
    New York Times Admits Reason For Delay In Delivering NSA ... - NPR
    May 14, 2014 · The New York Times did with sensitive government information back in 2004 and '05. The information had to do with the NSA secret program to eavesdrop on ...
  25. [25]
    Bush Defends Domestic Spying Program - NPR
    Dec 17, 2005 · President GEORGE W. BUSH: In the weeks following the terrorist attacks on our nation I authorized the National Security Agency, consistent with ...
  26. [26]
    Intelligence: Congress: 2006 Hearings
    Wartime Executive Power and the NSA's Surveillance Authority 06 February 2006 - Senate Judiciary Committee · Full Hearing Transcript · Letter from ...
  27. [27]
    Hayden Tells Senate Panel NSA Monitoring Is Legal - NPR
    May 18, 2006 · In Senate confirmation hearings, Air Force Gen. Michael Hayden faces tough questions over his role in the Bush administration's warrantless ...Missing: Judiciary | Show results with:Judiciary
  28. [28]
    - WARTIME EXECUTIVE POWER AND THE NATIONAL SECURITY ...
    General Michael Hayden, former head of NSA, has said that if this program had been legal back before 9/11, it might have prevented those attacks, but FISA ...
  29. [29]
    [PDF] General Michael V. Hayden - Senate Judiciary Committee
    Jul 26, 2006 · Testimony to the Judiciary Committee of the US Senate. By General Michael V. Hayden,. Director, CIA. 26 July 2006.Missing: hearings | Show results with:hearings
  30. [30]
    FISA - The Federalist Society
    Dec 11, 2007 · Lincoln authorized warrantless intercepts of telegraph messages during the Civil War, and Wilson and Roosevelt ordered warrantless monitoring ...
  31. [31]
    Was Gonzales's Historical Defense of Eavesdropping Convincing?
    Feb 20, 2006 · The attorney general next cited a Civil War precedent. President Abraham Lincoln received valuable intelligence intercepted without warrants ...
  32. [32]
    [PDF] top ten myths about the illegal nsa spying on americans - ACLU
    Dec 23, 2005 · MYTH: This is merely a “terrorist surveillance program.” REALITY: When there is evidence a person may be a terrorist, both the criminal code.
  33. [33]
    [PDF] The Bush Administration's Terrorist Surveillance Program and the ...
    The Bush Administration insists that the Fourth Amendment's warrant requirement does not apply to the Terrorist Surveillance Program. (“TSP”) conducted by the ...
  34. [34]
    Testimony of Gregory T. Nojeim, Associate Director of the ACLU ...
    Mar 9, 2007 · ... Fourth Amendment, due process and civil rights implications related to the Bush Administration's Terrorist Surveillance Program (TSP). The ...
  35. [35]
    [PDF] ACLU v. NSA - UNITED STATES COURT OF APPEALS
    Jul 6, 2007 · AMERICAN CIVIL LIBERTIES UNION, et al.,. Plaintiffs-Appellees/. Cross-Appellants, v. NATIONAL SECURITY AGENCY, et al.,. Defendants-Appellants/.
  36. [36]
    American Civil Liberties Union v. National Security Agency/Central ...
    Jan 1, 2009 · This highly anticipated decision, based on First and Fourth Amendment issues, was the first to address the legality of the secret program.
  37. [37]
    [PDF] U.S. Department of Justice Office of Legislative Affairs The ...
    Terrorist Surveillance Program during the 15-day period after a declaration of war, and that the Force Resolution would authorize the Program thereafter. 24 ...
  38. [38]
    NSA spying now done under secret court order - SCOTUSblog
    Jan 18, 2007 · These are orders that comply with the terms and requirements of the FISA statute, just like other orders issued by the FISA Court.” The ...
  39. [39]
    [PDF] FISA Reform - Scholarship @ GEORGETOWN LAW
    series on NSA surveillance under FISA. For Part 1, see Laura K. Donohue, Bulk Metadata. Collection: Statutory and Constitutional Considerations, HARV. J. L. & ...
  40. [40]
    S.1927 - Protect America Act of 2007 110th Congress (2007-2008)
    Aug 3, 2007 · Protect America Act of 2007 - Amends the Foreign Intelligence Surveillance Act of 1978 (FISA) to state that nothing under its definition of electronic ...
  41. [41]
    Fact Sheet: The Protect America Act of 2007
    Aug 6, 2007 · The Protect America Act modernizes the Foreign Intelligence Surveillance Act (FISA) to give intelligence professionals the tools they urgently need to gather ...
  42. [42]
    H.R.6304 - 110th Congress (2007-2008): FISA Amendments Act of ...
    Amends the Foreign Intelligence Surveillance Act of 1978 (FISA) to add a new title concerning additional procedures for acquiring the communications of certain ...
  43. [43]
    Retroactive Immunity Provided by the FISA Amendments Act of 2008
    Jul 25, 2008 · This report discusses the various retroactive immunity mechanisms that were proposed to be included in the FISA Amendments Act, ...
  44. [44]
    ACLU v. NSA - Opposition | United States Department of Justice
    v. NATIONAL SECURITY AGENCY, ET AL. ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT.
  45. [45]
    #589: 10-28-03 IYMAN FARIS SENTENCED FOR PROVIDING ...
    Oct 28, 2003 · WASHINGTON, D.C. - Attorney General John Ashcroft, Assistant Attorney General Christopher A. Wray of the Criminal Division, and U.S. ...Missing: Surveillance | Show results with:Surveillance
  46. [46]
    [PDF] Mr. Gabriel Schoenfeld - Senate Judiciary Committee
    The NSA terrorist surveillance program aimed to cover that gap. The ... Iyman Faris, a terrorist operative, who was apprehended and sentenced to 20 ...
  47. [47]
    Jose Padilla Re-Sentenced To 21 Years In Prison For Conspiracy ...
    ... terrorists; and providing material support to terrorists. The U.S. Eleventh ... National Security Division Trial Attorney Bridget Behling. A copy of ...
  48. [48]
    [PDF] NSA Alexander 2007 Declassified Verizon Declaration.pdf - INTEL.gov
    Toe National Security Agency. B. September 11, 2001 and tbe Continuing al Qaeda Threat. Information Protected by Privilege. Description oflnformation Subject to ...
  49. [49]
    [PDF] THE 9/11 COMMISSION REPORT - GovInfo
    ... 9/11. COMMISSION. REPORT. Final Report of the. National Commission on Terrorist. Attacks Upon the United States official government edition. For sale by the ...
  50. [50]
    [PDF] Processes for Assessing the Efficacy and Value of Intelligence ...
    Feb 8, 2016 · ” While a program might provide intelligence to thwart a terrorist plot, the Report acknowledged that “the number of. 'plots thwarted' … is ...
  51. [51]
    The Global War on Terrorism: The First 100 Days - state.gov
    196 countries support the financial war on terror; 142 countries have acted to freeze terrorist assets; in the U.S. alone, the assets of 153 known terrorists, ...<|separator|>
  52. [52]
    [PDF] Terrorist Attacks in the U.S. Between 1970 and 2013
    Background. START's Global Terrorism Database (GTD) contains information on more than. 125,000 domestic and international terrorist attacks* that occurred ...
  53. [53]
    [PDF] FACT SHEET American Deaths in Terrorist Attacks - START.umd.edu
    Of those 80 Americans killed, 36 were killed in attacks that occurred in the United States. ▫ More broadly, 3,066 Americans have been killed in terrorist ...
  54. [54]
    Historic Timeline | National Counterterrorism Center - DNI.gov
    Contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on ...
  55. [55]
    The State of al-Qa`ida Central - Combating Terrorism Center
    Apr 4, 2024 · After having lost its franchises in Iraq and Syria and after having seen its hegemony on the global jihadi scene hollowed out, the organization ...Missing: tempo | Show results with:tempo
  56. [56]
    ACLU Slams Senate Judiciary Committee's Approval of NSA Spying ...
    Sep 13, 2006 · Senator Mike DeWine's (R-OH) "Terrorist Surveillance Program Act of 2006" (S. 2455) was approved by a vote of 10 to 8. This bill would ...Missing: EFF | Show results with:EFF
  57. [57]
    [PDF] Govt Opposition to the ACLU Motion for Release of FISA Court ...
    Aug 31, 2007 · There is, as the ACLU notes, significant and legitimate public interest in the ongoing debate over Government surveillance of foreign terrorist ...
  58. [58]
    Life and Liberty Archive - Department of Justice
    The Patriot Act is vital to the war on terror and defending our citizens against a ruthless enemy. This bill will allow our law enforcement officials to ...<|separator|>
  59. [59]
    - CONTINUED OVERSIGHT OF THE FOREIGN INTELLIGENCE ...
    They show no evidence of any intentional spying on Americans or abuse of ... NSA employees intentionally or willfully abusing their surveillance authority.<|separator|>
  60. [60]
    Analysis - Can Fisa Keep Up With The Terrorism Threat? - PBS
    May 15, 2007 · ... FISA court regarding the terrorist surveillance program. The ... FISA moves too slow; it's too cumbersome." You deal with it day in and ...
  61. [61]
    Listening For Terrorists: Surveillance Programs?Lessons Learned ...
    And to be even more perverse in terms of the War on Terrorism, under FISA we could intercept all of the communications going from Afghanistan to other countries ...
  62. [62]
    NSA chief says surveillance programs helped thwart dozens of plots
    Jun 27, 2013 · Alexander said that because of the surveillance programs, 42 terrorist plots were disrupted and 12 individuals were identified as having provided material ...Missing: necessity | Show results with:necessity<|separator|>
  63. [63]
  64. [64]
    Administration Concedes Open Secret: NSA Spying Broader Than ...
    Jul 31, 2007 · Time and again, the Administration has described the blatantly illegal TSP as a "narrow" and "targeted" program, and it's playing a similar game ...
  65. [65]
    Hayden: NSA programs not abused - POLITICO
    Dec 15, 2013 · “There is no abuse and, by the way, I don't see any unlawfulness, either. This is all done according to the Madisonian formula: The president ...Missing: TSP political
  66. [66]
    N.Y. Times statement defends NSA reporting - Dec 16, 2005 - CNN
    Dec 16, 2005 · The Times story said the White House had asked the paper not to publish the article, and that the paper had delayed its publication for a ...
  67. [67]
    Poll finds 53% in U.S. accept wiretaps to fight terror
    Jan 26, 2006 · The poll found that 53 percent of Americans approved of Bush authorizing warrantless wiretaps "in order to reduce the threat of terrorism." ...
  68. [68]
    Poll finds opposition to wiretaps without court warrant
    Jan 8, 2006 · Yet 56 percent of respondents in an AP-Ipsos poll said the National Security Agency (NSA) should be required to first obtain a court warrant to ...
  69. [69]
    [PDF] This unclassified record draws on interviews, press statements, floor ...
    This unclassified record draws on interviews, press statements, floor speeches, legislation, articles, op-eds, and public and private.
  70. [70]
    The New York Times' Nsa Wiretapping Story | News War | FRONTLINE
    Feb 13, 2007 · The New York Times disclosed the existence of the National Security Agency enemy eavesdropping program on Dec. 16, 2005, and I read it that ...
  71. [71]
    "The National Security Agency's Domestic Spying Program: Framing ...
    ... terrorist activity.' The Times report was based on leaks of classified information, presumably by NSA officials concerned about the legality of the program ...Missing: declassified | Show results with:declassified
  72. [72]
    Aide: Sick Ashcroft pressed to approve domestic spying - CNN.com
    May 16, 2007 · Comey also said he had considered resigning after disagreements about the surveillance program. ... [Terrorist Surveillance Program] is now being ...
  73. [73]
    Bush Intervened in Dispute Over N.S.A. Eavesdropping
    May 16, 2007 · Comey said he shelved his resignation plans that day when terrorists set off bombs on commuter trains in Madrid. Mr. Comey left the Justice ...
  74. [74]
    What is the Protect America Act? - Department of Justice
    The Protect America Act modernized the Foreign Intelligence Surveillance Act (FISA) to provide our intelligence community essential tools to acquire important ...
  75. [75]
    S. Rept. 110-258 - FOREIGN INTELLIGENCE SURVEILLANCE ACT ...
    It moderates the new authorities that Congress granted on a short-term basis in the Protect America Act (PAA), but the bill as reported by the Senate Select ...
  76. [76]
    [PDF] Section 702 Basics - DNI.gov
    minimization procedures may see the collection. ... Using the name of a U.S. person hostage to cull through communications of the terrorist network that kidnapped ...
  77. [77]
    Biden signs reauthorization of surveillance program into law despite ...
    Apr 20, 2024 · The legislation extends for two years the program known as Section 702 of the Foreign Intelligence Surveillance Act, or FISA.
  78. [78]
    FISA Section 702 Reauthorized for Two Years | Lawfare
    Apr 30, 2024 · To secure House passage, House Speaker Mike Johnson (R-La.) agreed to shorten the original five-year reauthorization window to two years. This ...Missing: details | Show results with:details
  79. [79]
    Section 702 - National Security Division - Department of Justice
    Letter from Attorney General Garland to Senate Leaders In Support of Reauthorization of Section 702, April 18, 2024Missing: details | Show results with:details
  80. [80]
    [PDF] Annual Statistical Transparency Report - INTEL.gov
    May 2, 2025 · available U.S. person information acquired from Section 702 collection on non-U.S. person targets, consistent with the needs of each agency ...