US surveillance state isn’t new but its scope is

Perhaps the most startling few words about the revelations related to Edward Snowden appeared in the Washington Post this week (via Glenn Greenwald):

The Washington Post this morning has… a long profile of Gen. Keith Alexander, director the… NSA, and it highlights the crux – the heart and soul – of the NSA stories, the reason Edward Snowden sacrificed his liberty to come forward, and the obvious focal point for any responsible or half-way serious journalists covering this story. It helpfully includes that crux right in the headline, in a single phrase: “For NSA chief, terrorist threat drives passion to ‘collect it all’, observers say”.

What does “collect it all” mean? Exactly what it says; the Post explains how Alexander took a “collect it all” surveillance approach originally directed at Iraqis in the middle of a war, and thereafter transferred it so that it is now directed at the US domestic population as well as the global one:

“At the time, more than 100 teams of US analysts were scouring Iraq for snippets of electronic data that might lead to the bomb-makers and their hidden factories. But the NSA director, Gen. Keith B. Alexander, wanted more than mere snippets.… He wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.

“‘Rather than look for a single needle in the haystack, his approach was,… ‘Let’s collect the whole haystack,’ said one former senior US intelligence official who tracked the plan’s implementation.… ‘Collect it all, tag it, store it. .”‰.”‰. And whatever it is you want, you go searching for it. . . . .

“It also encapsulated Alexander’s controversial approach to safeguarding Americans from what he sees as a host of imminent threats, from terrorism to devastating cyberattacks.

“In his eight years at the helm of the country’s electronic surveillance agency, Alexander, 61, has quietly presided over a revolution in the government’s ability to scoop up information in the name of national security.… And, as he did in Iraq, Alexander has pushed hard for everything he can get: tools, resources and the legal authority to collect and store vast quantities of raw information on American and foreign communications.”

But history teaches us that America is fond of talking the democracy talk while acting in ways that run counter to these ideasl. Alfred W. McCoy explains in TomDispatch:

The American surveillance state is now an omnipresent reality, but its deep history is little known and its future little grasped.…  Edward Snowden’s… leaked documents… reveal that, in a post-9/11 state of war, the National Security Agency (NSA) was able to create a surveillance system that could secretly monitor the private communications of almost every American in the name of fighting foreign terrorists. The technology used is state of the art; the impulse, it turns out, is nothing new. For well over a century, what might be called “surveillance blowback” from America’s wars has ensured the creation of an ever more massive and omnipresent internal security and surveillance apparatus.… … Its future (though not ours) looks bright indeed.

In 1898, Washington occupied the Philippines and in the years that followed pacified its rebellious people, in part by fashioning the world’s first full-scale “surveillance state” in a colonial land.…  The illiberal lessons learned there then migrated homeward, providing the basis for constructing America’s earliest internal security and surveillance apparatus during World War I.…  A half-century later, as protests mounted during the Vietnam War, the FBI, building on the foundations of that old security structure, launched large-scale illegal counterintelligence operations to harass antiwar activists, while President Richard Nixon’s White House created its own surveillance apparatus to target its domestic enemies.

In the aftermath of those wars, however, reformers pushed back against secret surveillance.…  Republican privacy advocates abolished much of President Woodrow Wilson’s security apparatus during the 1920s, and Democratic liberals in Congress created the FISA courts in the 1970s in an attempt to prevent any recurrence of President Nixon’s illegal domestic wiretapping.

Today, as Washington withdraws troops from the Greater Middle East, a sophisticated intelligence apparatus built for the pacification of Afghanistan and Iraq has come home to help create a twenty-first century surveillance state of unprecedented scope. But the past pattern that once checked the rise of a U.S. surveillance state seems to be breaking down.…  Despite talk about ending the war on terror one day, President Obama has left the historic pattern of partisan reforms far behind. In what has become a permanent state of “wartime” at home, the Obama administration is building upon the surveillance systems created in the Bush years to maintain U.S. global dominion in peace or war through a strategic, ever-widening edge in information control.…  The White House shows no sign — nor does Congress — of cutting back on construction of a powerful, global Panopticon that can surveil domestic dissidents, track terrorists, manipulate allied nations, monitor rival powers, counter hostile cyber strikes, launch preemptive cyberattacks, and protect domestic communications.

Writing for TomDispatch four years ago during Obama’s first months in office, I… suggested… that the War on Terror has “proven remarkably effective in building a technological template that could be just a few tweaks away from creating a domestic surveillance state — with omnipresent cameras, deep data-mining, nano-second biometric identification, and drone aircraft patrolling ”˜the homeland.’”

That prediction has become our present reality — and with stunning speed. Americans now live under the Argus-eyed gaze of a digital surveillance state, while increasing numbers of surveillance drones fill American skies.…  In addition, the NSA’s net now reaches far beyond our borders, sweeping up the personal messages of many millions of people worldwide and penetrating the confidential official communications of at least 30 allied nations. The past has indeed proven prologue. The future is now.

Text and images ©2024 Antony Loewenstein. All rights reserved.

Site by Common