The Government Surveillance Transparency Act of 2026 mandates public access to criminal surveillance orders, establishes strict limits on sealing records, and requires comprehensive reporting on law enforcement surveillance activities.
Ron Wyden
Senator
OR
The Government Surveillance Transparency Act of 2026 mandates greater public oversight of criminal surveillance by requiring courts to maintain searchable, online dockets for surveillance orders and limiting the government's ability to keep these records sealed. The bill establishes stricter notice requirements for individuals targeted by surveillance and mandates that courts be notified if data is collected beyond authorized limits. Additionally, it introduces comprehensive reporting requirements for government surveillance activities and provides grant funding to help state and tribal courts implement these transparency measures.
The Government Surveillance Transparency Act of 2026 is pulling back the curtain on how federal agencies track digital lives. Under this bill, the days of 'pocket warrants'—surveillance orders that stay buried in a judge’s drawer indefinitely—are numbered. The legislation sets a default rule that once a surveillance order is executed or the investigation ends, the paperwork must be unsealed. It also forces courts to move away from paper trails and into the 21st century by requiring a searchable, public online docket for every criminal surveillance case. This means if the government wants to wiretap a phone or grab a suspect's location data, there will be a digital receipt available for the public to see.
Currently, it’s not uncommon for a person to be under investigation without ever knowing their data was seized. This bill changes the math by capping initial 'sealing' orders at 180 days (Sec. 2). If the government wants to keep a search warrant secret, they have to prove to a judge that going public would actually put someone in danger or tip off a suspect to flee. Even then, they only get one easy extension. After that, the feds have to show exactly why redacting a few names wouldn't be enough to protect the case. For a regular person, this means if your service provider is forced to hand over your emails, you’ll eventually get a notification that it happened, rather than the request sitting in a legal black hole for years.
Section 2 of the bill requires courts to build a 'bulk download' friendly system that lists the dates, the agency involved (like the FBI or DEA), and the specific crime being investigated. Think of it like a public ledger for privacy. To make sure this isn't just a federal fix, Section 6 uses a 'carrot and stick' approach with state and tribal courts. If local prosecutors want to keep using federal wiretap authorities or have their warrants recognized across state lines, their local courts have to play by these same transparency rules. To help smaller jurisdictions catch up, the bill sets aside $25 million in grants to help them build the necessary IT infrastructure (Sec. 8).
We’ve all had that moment where we accidentally shared more info than we intended; this bill addresses what happens when tech companies do that with your data. Section 3 requires the government to tell the court if a service provider accidentally handed over more data than the warrant actually allowed. If the feds asked for your emails from Monday but got your entire month’s history, they have to file an 'inventory' with the court disclosing that mistake. This creates a formal record of over-collection, making it much easier for defense attorneys or privacy advocates to spot when the government is coloring outside the lines of its legal authority.