A half-century later, as protests mounted during the Vietnam War, the FBI, building on the foundations of that old security structure, launched large-scale illegal counterintelligence operations to harass antiwar activists, while President Richard Nixonâs White House created its own surveillance apparatus to target its domestic enemies.
In the aftermath of those wars, however, reformers pushed back against secret surveillance. Republican privacy advocates abolished much of President Woodrow Wilsonâs security apparatus during the 1920s, and Democratic liberals in Congress created the FISA courts in the 1970s in an attempt to prevent any recurrence of President Nixonâs illegal domestic wiretapping.
Today, as Washington withdraws troops from the Greater Middle East, a sophisticated intelligence apparatus built for the pacification of Afghanistan and Iraq has come home to help create a twenty-first century surveillance state of unprecedented scope. But the past pattern that once checked the rise of a U.S. surveillance state seems to be breaking down. Despite talk about ending the war on terror one day, President Obama has left the historic pattern of partisan reforms far behind. In what has become a permanent state of âwartimeâ at home, the Obama administration is building upon the surveillance systems created in the Bush years to maintain U.S. global dominion in peace or war through a strategic, ever-widening edge in information control. The White House shows no sign -- nor does Congress -- of cutting back on construction of a powerful, global Panopticon that can surveil domestic dissidents, track terrorists, manipulate allied nations, monitor rival powers, counter hostile cyber strikes, launch preemptive cyberattacks, and protect domestic communications.
Writing for TomDispatch four years ago during Obamaâs first months in office, I suggested that the War on Terror has âproven remarkably effective in building a technological template that could be just a few tweaks away from creating a domestic surveillance state -- with omnipresent cameras, deep data-mining, nano-second biometric identification, and drone aircraft patrolling âthe homeland.â"
That prediction has become our present reality -- and with stunning speed. Americans now live under the Argus-eyed gaze of a digital surveillance state, while increasing numbers of surveillance drones fill American skies. In addition, the NSAâs net now reaches far beyond our borders, sweeping up the personal messages of many millions of people worldwide and penetrating the confidential official communications of at least 30 allied nations. The past has indeed proven prologue. The future is now.
The Coming of the Information Revolution
The origins of this emerging global surveillance state date back over a century to âAmericaâs first information revolutionâ for the management of textual, statistical, and analytical data -- a set of innovations whose synergy created the technological capacity for mass surveillance.
Hereâs a little litany of âprogressâ to ponder while on the road to todayâs every-email-all-the-time version of surveillance.
Within just a few years, the union of Thomas A. Edisonâs quadruplex telegraph with Philo Remingtonâs commercial typewriter, both inventions of 1874, allowed for the accurate transmission of textual data at the unequalled speed of 40 words per minute across America and around the world.
In the mid-1870s as well, librarian Melvil Dewey developed the âDewey decimal systemâ to catalog the Amherst College Library, thereby inventing the âsmart numberâ for the reliable encoding and rapid retrieval of limitless information.
The year after engineer Herman Hollerith patented the punch card (1889), the U.S. Census Bureau adopted his Electrical Tabulating machine to count 62,622,250 Americans within weeks -- a triumph that later led to the founding of International Business Machines, better known by its acronym IBM.
By 1900, all American cities were wired via the Gamewell Corporationâs innovative telegraphic communications, with over 900 municipal police and fire systems sending 41 million messages in a single year.
A Colonial Laboratory for the Surveillance State
On the eve of empire in 1898, however, the U.S. government was still what scholar Stephen Skowronek has termed a âpatchworkâ state with a near-zero capacity for domestic security. That, of course, left ample room for the surveillance version of modernization, and it came with surprising speed after Washington conquered and colonized the Philippines.
Facing a decade of determined Filipino resistance, the U.S. Army applied all those American information innovations -- rapid telegraphy, photographic files, alpha-numeric coding, and Gamewell police communications -- to the creation of a formidable, three-tier colonial security apparatus including the Manila Police, the Philippines Constabulary, and above all the Armyâs Division of Military Information.
In early 1901, Captain Ralph Van Deman, later dubbed âthe father of U.S. Military Intelligence,â assumed command of this still embryonic division, the Armyâs first field intelligence unit in its 100-year history. With a voracious appetite for raw data, Van Demanâs division compiled phenomenally detailed information on thousands of Filipino leaders, including their physical appearance, personal finances, landed property, political loyalties, and kinship networks.
Starting in 1901, the first U.S. governor-general (and future president) William Howard Taft drafted draconian sedition legislation for the islands and established a 5,000-man strong Philippines Constabulary. In the process, he created a colonial surveillance state that ruled, in part, thanks to the agile control of information, releasing damning data about enemies while suppressing scandals about allies.
When the Associated Pressâs Manila bureau chief reported critically on these policies, Taftâs allies dug up dirt on this would-be critic and dished it out to the New York press. On the other hand, the Division of Military Information compiled a scandalous report about the rising Filipino politician Manuel Quezon, alleging a premarital abortion by his future first lady. Quezon, however, served the Constabulary as a spy, so this document remained buried in U.S. files, assuring his unchecked ascent to become the first president of the Philippines in 1935.
During the U.S. conquest of the Philippines, Mark Twain wrote an imagined history of twentieth-century America. In it, he predicted that a âlust for conquestâ had already destroyed âthe Great [American] Republic,â because âtrampling upon the helpless abroad had taught her, by a natural process, to endure with apathy the like at home.â Indeed, just a decade after Twain wrote those prophetic words, colonial police methods came home to serve as a template for the creation of an American internal security apparatus in wartime.
After the U.S. entered World War I in 1917 without an intelligence service of any sort, Colonel Van Deman brought his Philippine experience to bear, creating the U.S. Armyâs Military Intelligence Division (MID) and so laying the institutional foundations for a future internal security state.
In collaboration with the FBI, he also expanded the MIDâs reach through a civilian auxiliary organization, the American Protective League, whose 350,000 citizen-operatives amassed more than a million pages of surveillance reports on German-Americans in just 14 months, arguably the worldâs most intensive feat of domestic surveillance ever.
After the Armistice in 1918, Military Intelligence joined the FBI in two years of violent repression of the American left marked by the notorious Luster raids in New York City, J. Edgar Hooverâs âPalmer Raidsâ in cities across the northeast and the suppression of union strikes from New York City to Seattle.
When President Wilson left office in 1921, incoming Republican privacy advocates condemned his internal security regime as intrusive and abusive, forcing the Army and the FBI to cut their ties to patriotic vigilantes. In 1924, Attorney General Harlan Fiske Stone, worrying that âa secret police may become a menace to free government,â announced âthe Bureau of Investigation is not concerned with political or other opinions of individuals.â Epitomizing the nationâs retreat from surveillance, Secretary of War Henry Stimson closed the Military Intelligence cipher section in 1929, saying famously, "Gentlemen do not read each other's mail."
After retiring at the rank of major general that same year, Van Deman and his wife continued from their home in San Diego to coordinate an informal intelligence exchange system, compiling files on 250,000 suspected âsubversives.â They also took reports from classified government files and slipped them to citizen anti-communist groups for blacklisting. In the 1950 elections, for instance, Representative Richard Nixon reportedly used Van Demanâs files to circulate âpink sheetsâ at rallies denouncing California Congresswoman Helen Gahagan Douglas, his opponent in a campaign for a Senate seat, launching a victorious Nixon on the path to the presidency.
From retirement, Van Deman, in league with FBI Director J. Edgar Hoover, also proved crucial at a 1940 closed-door conference that awarded the FBI control over domestic counterintelligence. The Armyâs Military Intelligence, and its successors, the CIA and NSA, were restricted to foreign espionage, a division of tasks that would hold, at least in principle, until the post-9/11 years. So armed, during World War II the FBI used warrantless wiretaps, âblack bagâ break-ins, and surreptitious mail opening to track suspects, while mobilizing more than 300,000 informers to secure defense plants against wartime threats that ultimately proved ânegligible.â
The Vietnam Years
In response to the civil rights and anti-Vietnam protests of the 1960s, the FBI deployed its COINTELPRO operation, using what Senator Frank Churchâs famous investigative committee later called "unsavory and vicious tactics... including anonymous attempts to break up marriages, disrupt meetings, ostracize persons from their professions, and provoke target groups into rivalries that might result in deaths."
In assessing COINTELPROâs 2,370 actions from 1960 to 1974, the Church Committee branded them a "sophisticated vigilante operation" that "would be intolerable in a democratic society even if all of the targets had been involved in violent activity." Significantly, even this aggressive Senate investigation did not probe Director Hooverâs notorious âprivate filesâ on the peccadilloes of leading politicians that had insulated his Bureau from any oversight for more than 30 years.
After New York Times reporter Seymour Hersh exposed illegal CIA surveillance of American antiwar activists in 1974, Senator Churchâs committee and a presidential commission under Nelson Rockefeller investigated the Agencyâs âOperation Chaos,â a program to conduct massive illegal surveillance of the antiwar protest movement, discovering a database with 300,000 names. These investigations also exposed the excesses of the FBIâs COINTELPRO, forcing the Bureau to reform.
To prevent future abuses, President Jimmy Carter signed the Foreign Intelligence Surveillance Act (FISA) in 1978, creating a special court to approve all national security wiretaps. In a bitter irony, Carterâs supposed reform ended up plunging the judiciary into the secret world of the surveillance managers where, after 9/11, it became a rubberstamp institution for every kind of state intrusion on domestic privacy.
How the Global War on Terror Came Home
As its pacification wars in Afghanistan and Iraq sank into bloody quagmires, Washington brought electronic surveillance, biometric identification, and unmanned aerial vehicles to the battlefields. This trio, which failed to decisively turn the tide in those lands, nonetheless now undergirds a global U.S. surveillance apparatus of unequalled scope and unprecedented power.
After confining the populations of Baghdad and the rebellious Sunni city of Falluja behind blast-wall cordons, the U.S. Army attempted to bring the Iraqi resistance under control in part by collecting, as of 2011, three million Iraqi fingerprints,iris, and retinal scans. These were deposited in a biometric database in West Virginia that American soldiers at checkpoints and elsewhere on distant battlefields could at any moment access by satellite link. Simultaneously, the Joint Special Operations Command under General Stanley McChrystal centralized all electronic and satellite surveillance in the Greater Middle East to identify possible al-Qaeda operatives for assassination by Predator drones or hunter-killer raids by Special Operations commandos from Somalia to Pakistan.
Domestically, post-9/11, the White House tried to create a modern version of the old state-citizen alliance for domestic surveillance. In May 2002, President Bushâs Justice Department launched Operation TIPS with "millions of American truckers, letter carriers, train conductors, ship captains, utility employees, and others" spying on fellow citizens. But there was vocal opposition from members of Congress, civil libertarians, and the media, which soon forced Justice to quietly kill the program.
In a digital iteration of the same effort, retired admiral John Poindexter began to set up an ominously titled Pentagon program called Total Information Awareness to amass a "detailed electronic dossier on millions of Americans." Again the nation recoiled, Congress banned the program, and the admiral was forced to resign.
Defeated in the public arena, the Bush administration retreated into the shadows, where it launched secret FBI and NSA domestic surveillance programs. Here, Congress proved far more amenable and pliable. In 2002, Congress erased the bright line that had long barred the CIA from domestic spying, granting the agency the power to access U.S. financial records and audit electronic communications routed through the country.
Defying the FISA law, in October 2001 President Bush ordered the NSA to commence covert monitoring of private communications through the nation's telephone companies without the requisite warrants. According to the Associated Press, he also âsecretly authorized the NSA to plug into the fiber optic cables that enter and leave the United Statesâ carrying the worldâs âemails, telephone calls, video chats, websites, bank transactions, and more.â Since his administration had already conveniently decided that âmetadata was not constitutionally protected,â the NSA began an open-ended program, Operation Stellar Wind, âto collect bulk telephony and Internet metadata.â
By 2004, the Bush White House was so wedded to Internet metadata collection that top aides barged into Attorney General John Ashcroftâs hospital room to extract a reauthorization signature for the program. They were blocked by Justice Department officials led by Deputy Attorney General James Comey, forcing a two-month suspension until that FISA court, brought into existence in the Carter years, put its first rubber-stamp on this mass surveillance regime.
Armed with expansive FISA court orders allowing the collection of data sets rather than information from specific targets, the FBIâs âInvestigative Data Warehouseâ acquired more than a billion documents within five years, including intelligence reports, social security files, driversâ licenses, and private financial information. All of this was accessible to 13,000 analysts making a million queries monthly. In 2006, as the flood of data surging through fiber optic cables strained NSA computers, the Bush administration launched the Intelligence Advanced Research Projects Activity to develop supercomputing searches powerful enough to process this torrent of Internet information.
In 2005, a New York Times investigative report exposed the administrationâs illegal surveillance for the first time. A year later, USA Today reported that the NSA was âsecretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon, and Bell South.â One expert called it "the largest database ever assembled in the world," adding presciently that the Agency's goal was "to create a database of every call ever made."
In August 2007, in response to these revelations, Congress capitulated. It passed a new law, the Protect America Act, which retrospectively legalized this illegal White House-inspired set of programs by requiring greater oversight by the FISA court. This secret tribunal -- acting almost as a âparallel Supreme Courtâ that rules on fundamental constitutional rights without adversarial proceedings or higher review -- has removed any real restraint on the National Security Agencyâs bulk collection of Internet metadata and regularly rubberstamps almost 100% of the governmentâs thousands of surveillance requests. Armed with expanded powers, the National Security Agency promptly launched its PRISM program (recently revealed by Edward Snowden). To feed its hungry search engines, the NSA has compelled nine Internet giants, including Microsoft, Yahoo, Google, Facebook, AOL, and Skype, to transfer what became billions of emails to its massive data farms.
Obamaâs Expanding Surveillance Universe
Instead of curtailing his predecessorâs wartime surveillance, as Republicans did in the 1920s and Democrats in the 1970s, President Obama has overseen the expansion of the NSAâs wartime digital operations into a permanent weapon for the exercise of U.S. global power.
The Obama administration continued a Bush-era NSA program of âbulk email records collectionâ until 2011 when two senators protested that the agencyâs âstatements to both Congress and the Court... significantly exaggerated this programâs effectiveness.â Eventually, the administration was forced to curtail this particular operation. Nonetheless, the NSA has continued to collect the personal communications of Americans by the billions under its PRISM and other programs.
In the Obama years as well, the NSA began cooperating with its long-time British counterpart, the Government Communications Headquarters (GCHQ), to tap into the dense cluster of Trans-Atlantic Telecommunication fiber optic cables that transit the United Kingdom. During a visit to a GCHQ facility for high-altitude intercepts at Menwith Hill in June 2008, NSA Director General Keith Alexander asked, âWhy canât we collect all the signals all the time? Sounds like a good summer project for Menwith.â
In the process, GCHQâs Operation Tempora achieved the âbiggest Internet accessâ of any partner in a âFive Eyesâ signals-intercept coalition that, in addition to Great Britain and the U.S., includes Australia, Canada, and New Zealand. When the project went online in 2011, the GCHQ sank probes into 200 Internet cables and was soon collecting 600 million telephone messages daily, which were, in turn, made accessible to 850,000 NSA employees.
The historic alliance between the NSA and GCHQ dates back to the dawn of the Cold War. In deference to it, the NSA has, since 2007, exempted its â2nd partyâ Five Eyes allies from surveillance under its âBoundless Informantâ operation. According to another recently leaked NSA document, however, âwe can, and often do, target the signals of most 3rd party foreign partners.â This is clearly a reference to close allies like Germany, France, and Italy.
On a busy day in January 2013, for instance, the NSA collected 60 million phone calls and emails from Germany -- some 500 million German messages are reportedly collected annually -- with lesser but still hefty numbers from France, Italy, and non-European allies like Brazil. To gain operational intelligence on such allies, the NSA taps phones at the European Council headquarters in Brussels, bugs the European Union (EU) delegation at the U.N., has planted a âDropmireâ monitor âon the Cryptofax at the EU embassy DC,â and eavesdrops on 38 allied embassies worldwide.
Such secret intelligence about its allies gives Washington an immense diplomatic advantage, says NSA expert James Bamford. âItâs the equivalent of going to a poker game and wanting to know what everyoneâs hand is before you place your bet.â And who knows what scurrilous bits of scandal about world leaders American surveillance systems might scoop up to strengthen Washingtonâs hand in that global poker game called diplomacy.
This sort of digital surveillance was soon supplemented by actual Internet warfare. Between 2006 and 2010, Washington launched the planetâs first cyberwar, with Obama ordering devastating cyberattacks against Iran's nuclear facilities. In 2009, the Pentagon formed the U.S. Cyber Command (CYBERCOM), with a cybercombat center at Lackland Air Base initially staffed by 7,000 Air Force employees. Over the next two years, by appointing NSA chief Alexander as CYBERCOMâs concurrent commander, it created an enormous concentration of power in the digital shadows. The Pentagon has also declared cyberspace an âoperational domainâ for both offensive and defensive warfare.
Controlling the Future
By leaking a handful of NSA documents, Edward Snowden has given us a glimpse of future U.S. global policy and the changing architecture of power on this planet. At the broadest level, this digital shift complements Obamaâs new defense strategy, announced in 2012, of reducing costs (cutting, for example, infantry troops by 14%), while conserving Washingtonâs overall power by developing a capacity for âa combined arms campaign across all domains -- land, air, maritime, space, and cyberspace.â
While cutting conventional armaments, Obama is investing billions in constructing a new architecture for global information control. To store and process the billions of messages sucked up by its worldwide surveillance network (totaling 97 billion items for March alone), the NSA is employing 11,000 workers to build a $1.6 billion data center in Bluffdale, Utah, whose storage capacity is measured in âyottabytes,â each the equivalent of a trillion terabytes. Thatâs almost unimaginable once you realize that just 15 terabytes could store every publication in the Library of Congress.
From its new $1.8 billion headquarters, the third-biggest building in the Washington area, the National Geospatial-Intelligence Agency deploys 16,000 employees and a $5 billion budget to coordinate a rising torrent of surveillance data from Predators, Reapers, U-2 spy planes, Global Hawks, X-37B space drones, Google Earth, Space Surveillance Telescopes, and orbiting satellites.
To protect those critical orbiting satellites, which transmit most U.S. military communications, the Pentagon is building an aerospace shield of pilotless drones. In the exosphere, the Air Force has since April 2010 been successfully testing the X-37B space drone that can carry missiles to strike rival satellite networks such as the one the Chinese are currently creating.
For more extensive and precise surveillance from space, the Pentagon has been replacing its costly, school-bus-sized spy satellites with a new generation of light, low cost models such as the ATK-A200. Successfully launched in May 2011, this module is orbiting 250 miles above the Earth with remote-controlled, U-2 quality cameras that now provide the âU.S. Central Command an assured ISR (Intelligence, Surveillance, and Reconnaissance) capability.â
In the stratosphere, close enough to Earth for audiovisual surveillance, the Pentagon is planning to launch an armada of 99 Global Hawk drones -- each equipped with high-resolution cameras to surveil all terrain within a 100-mile radius, electronic sensors to intercept communications, and efficient engines for continuous 24-hour flight.
Within a decade, the U.S. will likely deploy this aerospace shield, advanced cyberwarfare capabilities, and even vaster, more omnipresent digital surveillance networks that will envelop the Earth in an electronic grid capable of blinding entire armies on the battlefield, atomizing a single suspected terrorist, or monitoring millions of private lives at home and abroad.
Sadly, Mark Twain was right when he warned us just over 100 years ago that America could not have both empire abroad and democracy at home. To paraphrase his prescient words, by âtrampling upon the helpless abroadâ with unchecked surveillance, Americans have learned, âby a natural process, to endure with apathy the like at home.â
*** Alfred W. McCoy is the J.R.W. Smail Professor of History at the University of Wisconsin-Madison. A TomDispatch regular, he is the author Policing America's Empire: The United States, the Philippines, and the Rise of the Surveillance State (University of Wisconsin), which is the source for much of the material in this essay.
Copyright 2013 Alfred W. McCoy