Codify — Article

Government Surveillance Transparency Act creates limits on sealing and requires public, machine-readable surveillance dockets

A statute-level rewrite of criminal-surveillance handling that forces courts, agencies, and providers to publish metadata, disclose unauthorized disclosures, and give targets notice — with phased deadlines and implementation grants.

The Brief

The bill creates a new chapter in Title 18 that reworks how courts manage criminal surveillance orders: it curbs indefinite sealing, requires eventual notice to targets, reforms nondisclosure orders to providers, and demands standardized public docket records for surveillance matters. It also compels inventories and return materials to report whether providers or governments exceeded court authorizations, and it layers reporting, machine-readable publication, and limited grant funding to help courts comply.

This is a structural rewrite: transparency moves from discretionary to statutory. The measure forces courts, prosecutors, and communications providers to adopt technical and procedural steps — from standardized docket metadata to inventory disclosures — that make it possible for researchers, oversight bodies, and affected individuals to learn later what surveillance occurred and whether it complied with judicial orders.

At a Glance

What It Does

Establishes Chapter 206A in Title 18 to define “criminal surveillance orders,” caps how long such orders may remain sealed, requires courts to publish structured, searchable docket metadata, and amends notice, inventory, and reporting rules so targets and the public can later learn what surveillance was sought and executed.

Who It Affects

Federal, State, and Tribal courts (their clerks and electronic dockets), prosecutors and law‑enforcement agencies that seek surveillance, communications and cloud providers that receive orders or voluntarily disclose data, and people whose devices, accounts, or locations are targeted.

Why It Matters

The bill shifts the default from secrecy to post‑hoc transparency: researchers and oversight bodies gain access to structured court datasets; targets gain a clearer path to notice and challenge; providers face new inventory and notice obligations; and courts must build or upgrade e‑docket systems to comply.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

The bill inserts a new statutory chapter that defines a broad category of “criminal surveillance orders” to include wiretaps, pen registers, delay‑of‑notice orders, device tracking, search warrants, orders for third‑party assistance, and certain military and cross‑jurisdictional tools. Once an order fits that definition, the bill attaches a suite of transparency rules to how it is filed, sealed, unsealed, and reported.

On sealing, the bill forbids indefinite seals. A government applicant can request sealing only for a finite period (the statute authorizes court sealing for limited periods tied to execution or the end of surveillance) and the default path requires courts to unseal unless the government certifies a continuing adverse result.

The measure builds a two‑tier extension regime: an initial limited extension on government certification and any later extensions only after a heightened, particularized showing (including naming the target and stating facts) or after the use of redactions. Courts get a role to demand factual support for certifications and to order redactions rather than continued secrecy.The bill requires courts to publish, on their websites, structured, machine‑readable docket records for criminal‑surveillance matters.

Those public records must be published under open‑government licensing and include standardized fields (for example: filing and entry dates, statutory authority, investigating agency, type of crime alleged, surveillance duration, whether sealing/notice was requested, and seal‑expiration date). Courts must assign a unique case number per identified target (phone, device, address, account) and use generic captions to avoid revealing details in the title.

The clerk must operate a technical mechanism for automatic unsealing when a seal expires and provide advance notice to the agency prior to unsealing.Providers and inventories: the bill amends the inventory/return rules to require inventories to disclose when a provider gave the government data that exceeded the court’s authorization, or when the government obtained dialing/routing/other signaling data beyond its authorization. It makes those inventories part of the docketing regime and ties voluntary disclosures by providers to notice obligations: if a provider voluntarily hands over customer communications or records, the government must normally notify the subscriber or customer within a short window or seek a lawful delay.The bill tightens delay‑of‑notice authority.

It narrows when courts may preclude notice, ties preclusion to sealing under the new chapter, and requires reporting of every preclusion order application, grant, denial, and extension to the Administrative Office of the U.S. Courts in a machine‑readable form. The AO must publish an annual public report analyzing trends.

Finally, the measure conditions certain Federal‑State comity benefits on State courts’ compliance with the chapter, sets aside modest federal grants to help State and Tribal court systems upgrade e‑docketing and accessibility, and phases in the requirements with multiple delayed‑applicability triggers tied to courts’ electronic capabilities and security certifications.

The Five Things You Need to Know

1

The bill bars indefinite sealing: initial sealing is time‑limited, and the statute builds an explicit single extension path plus a heightened, particularized standard for any subsequent extension that requires naming the target and detailing facts that justify continued secrecy.

2

Courts must publish surveillance docket metadata as open, machine‑readable data with required fields including filing/entry/return dates, statutory authority, investigating agency, alleged crime type, requested surveillance duration, sealing/deferred‑notice requests, and the seal‑expiration date.

3

Inventories and Rule 41 returns must state if a provider disclosed electronic data not authorized by the court or if the government searched accounts/devices or collected dialing/routing/signaling data beyond the court’s authorization, with detailed disclosures required.

4

The bill requires notice to the person whose property or communications are searched or seized in accordance with warrant execution rules, mandates provider‑triggered notice within a short window when voluntary disclosures occur (or a court‑authorized delay), and prohibits using delayed‑notice authority for certain compelled disclosures.

5

Implementation is phased: baseline federal requirements kick in after a multi‑year delay, courts lacking e‑docketing get extra time, the Administrative Office and courts get $1M (AO) + a $25M grants pool for State/Tribal court upgrades, and the AO must publish machine‑readable reporting formats for compliance.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

Section 1

Short title

Names the measure the Government Surveillance Transparency Act of 2026. This is the formal caption that anchors the bill’s identity for citations and implementing regulations.

Section 2 (Chapter 206A — §§3131–3133)

Definitions; sealing limits; docketing and unsealing mechanisms

Establishes a defined statutory category, “criminal surveillance order,” that bundles many wiretap, pen register, tracking, third‑party assistance, delayed‑notice, and warrant authorities under one transparency framework. It limits sealing after execution or the end of surveillance, authorizes time‑limited sealing requests, and mandates a two‑step process for extensions (an initial, routine extension on certification and higher judicial scrutiny for later extensions). The section also requires courts to create public, machine‑readable docket records with specific metadata, to issue unique case numbers for each identified target, to caption cases generically, and to operate technical mechanisms for automatic unsealing and advance notice to the agency before unsealing.

Section 3

Inventory returns and disclosure of unauthorized searches

Amends the stored‑communications and pen‑register statutes to require inventories and Rule 41 returns to disclose breaches of judicial limits: whether a provider handed over data beyond the court’s authorization or whether the government collected dialing/routing/signaling data or searched accounts/devices outside authorized bounds. Practically, this forces agencies and providers to document over‑collection and gives courts and later reviewers a factual trail to evaluate compliance or misconduct.

5 more sections
Section 4

Notice rules tied to execution and service

Revises notice provisions to require service of warrants and orders to the person whose property or communications were searched or seized and to align notice timing with warrant execution procedures. The bill also creates a short window rule for providers’ voluntary disclosures—if a provider gives data voluntarily the government generally must notify the affected subscriber or customer within a specified period unless a lawful delay is ordered—closing a gap that previously left voluntary disclosures outside the standard notice framework.

Section 5

Limits on delaying notice and transparency reporting for preclusion orders

Overhauls 2705 (delay‑of‑notice) by tying the authority to sealing under the new chapter, restricting when subpoenas and emergency requests may trigger delayed notice, and requiring judges to report applications, grants, denials, and extensions to the Administrative Office. The AO must publish annual summaries and provide a machine‑readable reporting form; judges must file standardized, periodic reports on preclusion orders they issued or refused.

Section 6

Incentives and conditioning for State and Tribal compliance

Conditions certain procedural benefits (for example, some state pen‑register and stored‑communications authorities and full‑faith recognition of surveillance orders) on State courts’ compliance with Chapter 206A. This section is designed to nudge State and Tribal courts toward the bill’s e‑docket and publication standards without entirely preempting State procedure, while recognizing phased implementation timelines.

Section 7

Modernized public reporting across surveillance categories

Expands and standardizes reporting obligations for orders that obtain communications, contents in electronic storage, and pen registers/trap‑and‑trace devices. Judges must report factual case metrics to the AO annually; the AO must publish aggregated, public reports and machine‑readable templates. The clause gives the AO regulatory authority over form and content and mandates consultation with NIST and court stakeholders on technical standards.

Sections 8–9

Implementation grants and appropriations

Authorizes a federal grants program (capped at the statutory total) to help State and Tribal courts upgrade electronic docketing and public access, and provides a modest AO implementation appropriation. The grants are explicitly time‑limited and intended to defray the costs of machine‑readable publishing, accessibility compliance, and secure e‑filing upgrades.

At scale

This bill is one of many.

Codify tracks hundreds of bills on Privacy across all five countries.

Explore Privacy in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • People targeted by surveillance: They gain a statutory path to notice and the ability to challenge redactions or closures later, improving the chances to learn about and litigate allegedly unlawful government surveillance.
  • Civil‑liberties organizations and researchers: The requirement for machine‑readable public docket metadata enables empirical oversight, pattern detection, and systemic research into how surveillance tools are used and where safeguards fail.
  • State and Tribal court users and accessibility advocates: The bill requires public records to meet accessibility standards (section 508 compliance) and to be machine‑readable, improving access for researchers and persons with disabilities.

Who Bears the Cost

  • Federal, State, and Tribal courts: Clerks and IT shops must build or upgrade e‑docketing, implement automated unsealing workflows, produce machine‑readable exports, and ensure 508 compliance; smaller jurisdictions may need grants to comply.
  • Prosecutors and law‑enforcement agencies: Must justify extended secrecy with greater factual specificity, produce inventories that admit over‑collection, and adjust practices so routine requests do not trigger avoidable public disclosure rules.
  • Communications and cloud providers: Face new obligations to include subpoenas in dockets when nondisclosure is sought, to produce inventories disclosing unauthorized disclosures, and to cooperate with more frequent post‑hoc notice and service obligations.

Key Issues

The Core Tension

The central dilemma is transparency versus operational secrecy: the bill advances public‑access and after‑the‑fact accountability by defaulting to disclosure, but doing so risks revealing operational details that can harm active investigations or compromise privacy if publication is not tightly calibrated — judges and technologists must balance the public interest in oversight against concrete risks to safety and investigation integrity.

The bill packs a lot of transparency into a tight operational frame but leaves several implementation and legal questions open. First, requiring unique case numbers for each identified target (including device, account, phone number, or address) will improve traceability but raises privacy management questions for courts: published metadata could be re‑aggregated to infer sensitive information about investigations unless courts and AO strictly control which data elements remain masked in the public feed.

Second, the heightened showing for subsequent seal extensions demands that prosecutors disclose the target’s identity and detailed facts to the court; that increases judicial review fidelity but also risks forcing disclosure of investigative leads in contested proceedings or on‑going multijurisdictional probes unless redaction regimes are robust and consistently applied. Third, technical execution challenges are real: many State and Tribal courts lack interoperable e‑filing platforms, and the bill’s phased timelines and grant pool are modest relative to the likely aggregate upgrade costs.

Finally, the inventory disclosure rules create a stronger factual trail for litigation and accountability, but they also create a new set of disputes about what exactly constitutes an “exceedance” of authorization — e.g., whether unanticipated metadata obtained in the course of a lawful query triggers an inventory disclosure and how to reconcile real‑time operational needs with the duty to preserve a clean judicial record.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.