Skip to main content

NSA spying powers aren’t dead yet, as the Obama administration seeks to revive bulk collection

Well, that didn’t take very long, did it?

Not more than 72-hours after the NSA’s controversial bulk phone records collection program was brought to an end on Sunday night, the Obama administration has confirmed it will seek to temporarily reinstate the operation through a provision found in the USA Freedom Act.

Recommended Videos

By exploiting a six-month transitional grace period afforded to the NSA in the freshly-passed Act, the administration says it will petition a secret surveillance court to revive the program while its data and repositories are prepped to transfer from the servers in Fort Meade to the hands of US telecoms.

Related: NSA surveillance operations come to screeching halt as Senate stalls on resolution

This time around however, the Foreign Intelligence Surveillance Court will now have the right to simply deny the administration’s request, thanks to new powers afforded by the Freedom Act. This means if they refuse to hear the case, the bulk collections program would transfer immediately to the phone companies, and the administration will have no legal grounds to gift the NSA an extra half-year with its beloved metadata mining monster.

“We are taking the appropriate steps to obtain a court order reauthorizing the program. If such an order is granted, we’ll make an appropriate announcement at that time as we have with respect to past renewal applications,” said the Justice Department’s national security spokesman Marc Raimondi.

Though Obama publicly came out on Twitter in praise of the Freedom Act’s passage yesterday afternoon, the administration says the move to reboot the program under the NSA comes as a result of the Senate’s gridlock on Sunday, which caused the program to shut down immediately, rather than tapering off over the aforementioned six months as was envisioned by the bill’s original authors.

Regardless of what the FISA court eventually decides, both privacy advocates and lawmakers on the hill agree that the proceedings should at the very least be held in the public eye, and any reasoning behind the ruling made clear to American citizens in the spirit of transparency on the road ahead.

Chris Stobing
Former Digital Trends Contributor
Self-proclaimed geek and nerd extraordinaire, Chris Stobing is a writer and blogger from the heart of Silicon Valley. Raised…
Best of Computex 2025 awards: The tech that impressed us the most
Best of Computex 2025

Although Computex 2025 is still far from over, the biggest announcements have already been dropped, and this year's event turned out to be quite exciting. From graphics cards to laptops and monitors, there's plenty of options for a tech enthusiast to dig into, and some -- if not most -- of these new innovations are already available, or will be soon.

Out of all the thrilling new tech that companies such as AMD, Asus, Acer, and MSI announced, what impressed us the most? Below, you'll find the new releases that scored our Best of Computex 2025 award.

Read more
Google IO 2025 summary: 5 big announcements you’ll want to know
Google IO 2025 logo on the surface of the earth

Google IO 2025 delivered us a huge helping of AI during the almost two-hour opening keynote.

Google's CEO, Sundar Pichai, and colleagues got through an awful lot on stage, and while some of the talk was aimed primarily at developers, there were plenty of big announcements for us - the people on the street - to explore.

Read more
How to keep your Apple devices safe from AirPlay attacks
Apple AirPlay streaming to another device.

Apple’s approach to building new features has always been rooted in safety and seamless convenience. Take, for example, AirPlay, a wireless standard created by the company that allows users to stream audio and video from one device to another.

AirPlay works not just across Apple devices, but also on TVs and speakers cleared by the company to offer the wireless streaming facility. That also makes it a ripe target for attacks, and it seems there are, in fact, vulnerabilities in the wireless lanes that could allow bad actors to seed malware and infect more connected devices. 

Read more