Connect with us

Hi, what are you looking for?



No US Senate Deal, Spy Provisions Expire at Midnight: Lawmakers

The US Senate failed Sunday to reach a deal that would prevent key counterterror provisions from expiring at midnight, after Senator Rand Paul blocked the chamber from advancing a solution.

The US Senate failed Sunday to reach a deal that would prevent key counterterror provisions from expiring at midnight, after Senator Rand Paul blocked the chamber from advancing a solution.

“The Patriot Act will expire tonight,” said Paul, a 2016 presidential candidate, after hours of ultimately fruitless debate on how to get a reform bill across the finish line that would have preserved important national security provisions.

The USA Freedom Act, which has already passed the House, would end the National Security Agency’s controversial dragnet that scoops up telephone data on millions of Americans with no connection to terrorism.

But with the Senate yet to act on protecting or reforming critical counterterror elements, including the telephone metadata program as well as provisions that allow roving wiretaps on terror suspects and lone-wolf tracking, Senate Majority Leader Mitch McConnell called for a rare Sunday session to thrash out a solutions.

He came up short. While the Freedom Act advanced in the Senate on a vote of 77 to 17, Paul — who wants the entire bulk data provision scrapped and does not support the reform bill — made clear he would block any further advancement of the measure Sunday, or any extension of the Patriot Act.

“There is no way to get any type of agreement tonight — either an extension or passage of a bill,” Senate Intelligence Committee chairman Richard Burr told AFP.

“So at 8:00 o’clock (0000 GMT) tonight, NSA employees can not query the database,” he added, referring to one element of the agency’s preparations to shut down provisions of the Patriot Act that sunset at the last minute of May 31.

The lapse is likely to be only temporary, with senators and senior aides agreeing that the chamber is expected to vote on final passage of the reform bill by Tuesday or Wednesday.

Advertisement. Scroll to continue reading.

Related: US Anti-Terror Tools Set to Expire as Senate Gridlocked

Related: CIA Chief: Ending NSA Spying Would Boost Terror Threat

Written By

AFP 2023

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.


Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.


Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.


Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...


The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.


Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...


Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...