Katana VentraIP

Mass surveillance in the United States

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

For broader coverage of this topic, see Mass surveillance.

The formation of the international UKUSA surveillance agreement of 1946 evolved into the ECHELON collaboration by 1955[1] of five English-speaking nations, also known as the Five Eyes, and focused on interception of electronic communications, with substantial increases in domestic surveillance capabilities.[2]


Following the September 11th attacks of 2001, domestic and international mass surveillance capabilities grew immensely. Contemporary mass surveillance relies upon annual presidential executive orders declaring a continued State of National Emergency, first signed by George W. Bush on September 14, 2001 and then continued on an annual basis by President Barack Obama.[3] Mass surveillance is also based on several subsequent national security Acts including the USA PATRIOT Act and FISA Amendment Act's PRISM surveillance program. Critics and political dissenters currently describe the effects of these acts, orders, and resulting database network of fusion centers as forming a veritable American police state that simply institutionalized the illegal COINTELPRO tactics used to assassinate dissenters and leaders from the 1950s onwards.[4][5][6]


Additional surveillance agencies, such as the DHS and the position of Director of National Intelligence, have greatly escalated mass surveillance since 2001. A series of media reports in 2013 revealed more recent programs and techniques employed by the US intelligence community.[7][8] Advances in computer and information technology allow the creation of huge national databases that facilitate mass surveillance in the United States[7] by DHS managed fusion centers, the CIA's Terrorist Threat Integration Center (TTIC) program, and the FBI's Terrorist Screening Database (TSDB).


Mass surveillance databases are also cited as responsible for profiling Latino Americans and contributing to "self-deportation" techniques, or physical deportations by way of the DHS's ICEGang national database.[9]


After World War I, the US Army and State Department established the Black Chamber, also known as the Cipher Bureau, which began operations in 1919.[10] The Black Chamber was headed by Herbert O. Yardley, who had been a leader in the Army's Military Intelligence program. Regarded as a precursor to the National Security Agency, it conducted peacetime decryption of material including diplomatic communications until 1929.[11][12]


In the advent of World War II, the Office of Censorship was established. The wartime agency monitored "communications by mail, cable, radio, or other means of transmission passing between the United States and any foreign country".[13] This included the 350,000 overseas cables and telegrams and 25,000 international telephone calls made each week.[14]: 144  "Every letter that crossed international or U.S. territorial borders from December 1941 to August 1945 was subject to being opened and scoured for details."[13]


With the end of World War II, Project SHAMROCK was established in 1945. The organization was created to accumulate telegraphic data entering and exiting from the United States.[11][15] Major communication companies such as Western Union, RCA Global and ITT World Communications actively aided the project, allowing American intelligence officials to gain access to international message traffic.[16] Under the project, and many subsequent programs, no precedent had been established for judicial authorization, and no warrants were issued for surveillance activities. The project was terminated in 1975.[11]


President Harry S. Truman established the National Security Agency (NSA) in 1952 for the purposes of collecting, processing, and monitoring intelligence data.[17] The existence of NSA was not known to people as the memorandum by President Truman was classified.[18]


When the Citizens' Commission to Investigate the FBI published stolen FBI documents revealing abuse of intelligence programs in 1971, Senator Frank Church began an investigation into the programs that become known as the Church Committee. The committee sought to investigate intelligence abuses throughout the 1970s. Following a report provided by the committee outlining egregious abuse, in 1976 Congress established the Senate Select Committee on Intelligence. It would later be joined by the Foreign Intelligence Surveillance Court in 1978.[11] The institutions worked to limit the power of the agencies, ensuring that surveillance activities remained within the rule of law.[19]


Following the attacks of September 11, 2001, Congress passed The Patriot Act to strengthen security and intelligence efforts. The act granted the President broad powers on the war against terror, including the power to bypass the FISA Court for surveillance orders in cases of national security. Additionally, mass surveillance activities were conducted alongside various other surveillance programs under the head of President's Surveillance Program.[20] Under pressure from the public, the warrantless wiretapping program was allegedly ended in January 2007.[21]


Many details about the surveillance activities conducted in the United States were revealed in the disclosure by Edward Snowden in June 2013.[22][23] Regarded as one of the biggest media leaks in the United States, it presented extensive details about the surveillance programs of the NSA, that involved interception of Internet data and telephonic calls from over a billion users, across various countries.[24][23]

First Lady – A vocal critic of Hoover who likened the FBI to an 'American Gestapo' for its Index lists.[32] Roosevelt also spoke out against anti-Japanese prejudice during the second world war, and was later a delegate to the United Nations and instrumental in creating the Universal Declaration of Human Rights. The 3,000-page FBI dossier on Eleanor Roosevelt reveals Hoover's close monitoring of her activities and writings, and contains retaliatory charges against her for suspected Communist activities.[33][34]

Eleanor Roosevelt

– His 1,300 page FBI dossier, dating from 1943, contains allegations about Sinatra's possible ties to the American Communist Party. The FBI spent several decades tracking Sinatra and his associates.[35][36]

Frank Sinatra

– Her FBI dossier begins in 1955 and continues up until the months before her death. It focuses mostly on her travels and associations, searching for signs of leftist views and possible ties to communism.[37] Her ex-husband, Arthur Miller, was also monitored. Monroe's FBI dossier is "heavily censored", but a "reprocessed" version has been released by the FBI to the public.[37]

Marilyn Monroe

– In 1971, shortly after Lennon arrived in the United States on a visa to meet up with anti-war activists, the FBI placed Lennon under surveillance, and the U.S. government tried to deport him from the country.[38] At that time, opposition to the Vietnam War had reached a peak and Lennon often showed up at political rallies to sing his anti-war anthem "Give Peace a Chance".[38] The U.S. government argued that Lennon's 300 page FBI dossier was particularly sensitive because its release may "lead to foreign diplomatic, economic and military retaliation against the United States",[39] and therefore only approved a "heavily censored" version.[40]

John Lennon

, of which John Lennon was a member, had a separate FBI dossier.

The Beatles

Institutional domestic surveillance was founded in 1896 with the National Bureau of Criminal Identification, which evolved by 1908 into the Bureau of Investigation, operated under the authority of the Department of Justice. In 1935, the FBI had grown into an independent agency under the direction of J. Edgar Hoover whose staff, through the use of wire taps, cable taps, mail tampering, garbage filtering and infiltrators, prepared secret FBI Index Lists on more than 10 million people by 1939.[30]


Purported to be chasing 'communists' and other alleged subversives, the FBI used public and private pressure to destroy the lives of those it targeted during McCarthyism, including those lives of the Hollywood 10 with the Hollywood blacklist. The FBI's surveillance and investigation roles expanded in the 1950s while using the collected information to facilitate political assassinations, including the murders of Fred Hampton and Mark Clark in 1969. FBI is also directly connected to the bombings, assassinations, and deaths of other people including Malcolm X in 1963, Viola Liuzzo in 1965, Dr. Martin Luther King Jr. in 1968, Anna Mae Pictou Aquash in 1976, and Judi Bari in 1990.[31]


As the extent of the FBI's domestic surveillance continued to grow, many celebrities were also secretly investigated by the bureau, including:


1967–73: The now-defunct Project MINARET was created to spy on U.S. citizens. At the request of the U.S. Army, those who protested against the Vietnam War were put on the NSA's "watch list".[16]

asked the FBI to put in its files the names of citizens sending telegrams to the White House opposing his "national defense" policy and supporting Col. Charles Lindbergh.[51]

President Roosevelt

received inside information on a former Roosevelt aide's efforts to influence his appointments, labor union negotiating plans, and the publishing plans of journalists.[51]

President Truman

received reports on purely political and social contacts with foreign officials by Bernard Baruch, Eleanor Roosevelt, and Supreme Court Justice William O. Douglas.[51]

President Eisenhower

The ordered the FBI to wiretap a congressional staff member, three executive officials, a lobbyist, and a Washington law firm. US Attorney General Robert F. Kennedy received data from an FBI wire tap on Martin Luther King Jr. and an electronic listening device targeting a congressman, both of which yielded information of a political nature.[51]

Kennedy administration

asked the FBI to conduct "name checks" on his critics and members of the staff of his 1964 opponent, Senator Barry Goldwater. He also requested purely political intelligence on his critics in the Senate, and received extensive intelligence reports on political activity at the 1964 Democratic Convention from FBI electronic surveillance.[51]

President Johnson

authorized a program of wiretaps which produced for the White House purely political or personal information unrelated to national security, including information about a Supreme Court justice.[51]

President Nixon

1975: The Church Committee of the United States Senate was set up to investigate widespread intelligence abuses by the NSA, CIA and FBI.[11] Domestic surveillance, authorized by the highest executive branch of the federal government, spanned from the FDR Administration to the Presidency of Richard Nixon. The following examples were reported by the Church Committee:


The Final Report (Book II) of the Church Committee revealed the following statistics:


In response to the committee's findings, the United States Congress passed the Foreign Intelligence Surveillance Act in 1978, which led to the establishment of the United States Foreign Intelligence Surveillance Court, which was authorized to issue surveillance warrants.[52]


Several decades later in 2013, the presiding judge of the FISA Court, Reggie Walton, told The Washington Post that the court only has a limited ability to supervise the government's surveillance, and is therefore "forced" to rely upon the accuracy of the information that is provided by federal agents.[53]


On August 17, 1975 Senator Frank Church stated on NBC's "Meet the Press" without mentioning the name of the NSA about this agency:

H.R.4681 – Intelligence Authorization Act for Fiscal Year 2015[edit]

On 20 May 2014, U.S. Representative for Michigan's 8th congressional district Republican congressman Mike Rogers introduced Intelligence Authorization Act for Fiscal Year 2015 with the goal of authorizing appropriations for fiscal years 2014 and 2015 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency (CIA) Retirement and Disability System, and for other purposes.[93]


Some of its measures cover the limitation on retention. A covered communication (meaning any nonpublic telephone or electronic communication acquired without the consent of a person who is a party to the communication, including communications in electronic storage) shall not be retained in excess of 5 years, unless: (i) the communication has been affirmatively determined, in whole or in part, to constitute foreign intelligence or counterintelligence or is necessary to understand or assess foreign intelligence or counterintelligence; (ii) the communication is reasonably believed to constitute evidence of a crime and is retained by a law enforcement agency; (iii) the communication is enciphered or reasonably believed to have a secret meaning; (iv) all parties to the communication are reasonably believed to be non-United States persons; (v) retention is necessary to protect against an imminent threat to human life, in which case both the nature of the threat and the information to be retained shall be reported to the congressional intelligence committees not later than 30 days after the date such retention is extended under this clause; (vi) retention is necessary for technical assurance or compliance purposes, including a court order or discovery obligation, in which case access to information retained for technical assurance or compliance purposes shall be reported to the congressional intelligence committees on an annual basis; (vii) retention for a period in excess of 5 years is approved by the head of the element of the intelligence community responsible for such retention, based on a determination that retention is necessary to protect the national security of the United States, in which case the head of such element shall provide to the congressional intelligence committees a written certification describing (I) the reasons extended retention is necessary to protect the national security of the United States; (II) the duration for which the head of the element is authorizing retention; (III) the particular information to be retained; and (IV) the measures the element of the intelligence community is taking to protect the privacy interests of United States persons or persons located inside the United States.[94]


On 10 December 2014, Republican U.S. Representative for Michigan's 3rd congressional district member of Congress Justin Amash criticized the act on his Facebook as being "one of the most egregious sections of law I've encountered during my time as a representative" and "It grants the executive branch virtually unlimited access to the communications of every American".[95]

USA Freedom Act[edit]

The USA Freedom Act was signed into law on June 2, 2015, the day after certain provisions of the Patriot Act had expired. It mandated an end to bulk collection of phone call metadata by the NSA within 180 days, but allowed continued mandatory retention of metadata by phone companies with access by the government with case-by-case approval from the Foreign Intelligence Surveillance Court.[96]

– The Defence Signals Directorate of Australia[151]

Australia

– The Government Communications Headquarters of the United Kingdom, which is widely considered to be a leader in traditional spying due to its influence on countries that were once part of the British Empire.[151]

United Kingdom

– The National Security Agency of the United States, which has the biggest budget and some of the most advanced technical abilities among the "five eyes".[151]

United States

Uses of intercepted data[edit]

Most of the NSA's collected data which was seen by human eyes (i.e., used by NSA operatives) was used in accordance with the stated objective of combating terrorism.[167][168][169]


In addition to combatting terrorism, these surveillance programs have been employed to assess the foreign policy and economic stability of other countries.[170]


According to reports by Brazil's O Globo newspaper, the collected data was also used to target "commercial secrets".[171] In a statement addressed to the National Congress of Brazil, journalist Glenn Greenwald testified that the U.S. government uses counter-terrorism as a "pretext" for clandestine surveillance in order to compete with other countries in the "business, industrial and economic fields".[172][173]


In an interview with Der Spiegel published on 12 August 2013, former NSA Director Michael Hayden admitted that "We [the NSA] steal secrets. We're number one in it". Hayden also added that "We steal stuff to make you safe, not to make you rich".[170]


According to documents seen by the news agency Reuters, information obtained in this way is subsequently funnelled to authorities across the nation to help them launch criminal investigations of Americans.[174] Federal agents are then instructed to "recreate" the investigative trail in order to "cover up" where the information originated,[174] known as parallel construction. (Were the true origins known, the evidence and resulting case might be invalidated as "fruit of the poisonous tree", a legal doctrine designed to deter abuse of power that prevents evidence or subsequent events being used in a case if they resulted from a search or other process that does not conform to legal requirements.)


According to NSA Chief Compliance Officer John DeLong, most violations of the NSA's rules were self-reported, and most often involved spying on personal love interests using surveillance technology of the agency.[175]


Most agricultural surveillance is not covert and is carried out by government agencies such as APHIS (USDA's Animal and Plant Health Inspection Service).[176] DHS has lamented the limited surveillance coverage provided by these inspections and works to augment this protection with their own resources.[176]

Censorship in the United States

Domain Awareness System

Freedom of speech in the United States

Global surveillance

Internet censorship in the United States

Labor spying in the United States

List of Americans under surveillance

List of government mass surveillance projects

Mass surveillance in the United Kingdom

Police surveillance in New York City

. The Guardian. London. 8 June 2013. Dozens of articles about the U.S. National Security Agency and its spying and surveillance programs

"The NSA Files"

by the Office of the Legislative Auditor of Minnesota, March 2004; part of a program to improve sharing of criminal justice information.

CriMNet Evaluation Report

Smyth, Daniel. , War & Society, Volume 32, Issue 1, 2013. doi:10.1179/0729247312Z.00000000017.

"Avoiding Bloodshed? US Journalists and Censorship in Wartime"

Deflem, Mathieu; Silva, Derek, M.D.; and Anna S. Rogers. 2018. . pp. 109–125 in The Cambridge Handbook of Social Problems, Volume 2, edited by A. Javier Treviño. New York: Cambridge University Press.

"Domestic Spying: A Historical-Comparative Perspective"