30 min read

title: "The National Security State: From COINTELPRO to PRISM"

Chapter 6: The National Security State — From COINTELPRO to PRISM


title: "The National Security State: From COINTELPRO to PRISM" part: 2 chapter: 6 description: "An examination of how state surveillance evolved from targeted political repression to mass collection programs, tracing the arc from the FBI's domestic espionage campaigns through the post-9/11 surveillance explosion and the Snowden revelations." prerequisites: - Chapter 3 (Pre-Modern State Surveillance) - Chapter 4 (Industrial Era Surveillance) learning_objectives: - Define the national security state and explain its surveillance mandate - Analyze COINTELPRO as a case study in institutionalized political surveillance - Evaluate the Church Committee's findings and the reforms that followed - Explain the post-9/11 legal and technical expansion of surveillance authority - Assess the significance of the Snowden revelations and NSA mass collection programs - Apply the concept of function creep to explain how counterterrorism tools migrate into domestic policing - Evaluate the tension between Fourth Amendment protections and national security exceptions key_terms: - national security state - COINTELPRO - Church Committee - USA PATRIOT Act - FISA court - PRISM - XKeyscore - MUSCULAR - metadata - function creep - third-party doctrine estimated_time: "90-110 minutes" difficulty: Advanced subject_categories: primary: B (Social-Behavioral) secondary: D (Humanities-Philosophical) tertiary: C (Practical-Skills)


Opening: A Letter Jordan Never Sent

On a Tuesday evening in October, Jordan Ellis was helping their mother sort through boxes of old documents she'd finally brought out of storage. Somewhere between a stack of tax returns and a bundle of birthday cards, their mother handed them a folder that had belonged to Jordan's Uncle Darnell. Inside were photocopied documents — pages with broad black redaction bars, agency letterhead, and a subject line that read: DARNELL MARCUS ELLIS — DOMESTIC SECURITY.

"He found out in 1999," Jordan's mother said quietly. "Under the Freedom of Information Act. They'd been watching him since '91, when he was organizing with the welfare rights group."

Jordan turned the pages slowly. Names were crossed out. Phrases floated free of context: suspected subversive affiliations, meetings monitored, employment disruption recommended. Uncle Darnell had never been charged with a crime. He'd been organizing low-income families to push back against welfare reform legislation.

Jordan brought the folder to Dr. Osei's office hours the next day.

"What you're holding," Dr. Osei said, examining the papers, "is the paper record of a surveillance apparatus that has been running, in one form or another, since the 1950s. And what happened to your uncle wasn't an aberration. It was the system working exactly as designed."


6.1 What Is the National Security State?

The term national security state refers to a configuration of governmental power in which the imperatives of security — defined broadly to include protection against foreign threats, domestic subversion, terrorism, and instability — justify the concentration of surveillance, intelligence, and coercive capacity in executive agencies operating with limited public oversight.

The concept was theorized most explicitly by scholars like Harold Lasswell, who in 1941 warned of a "garrison state" in which military and security logics colonized all aspects of civilian governance. The national security state as it developed in the United States after World War II had several defining features:

  1. Permanent institutions of intelligence and domestic security — the FBI, CIA, NSA, and later DHS — with mandates that expanded well beyond their original scope.
  2. Secrecy as a structural norm — the classification system that removed large domains of government activity from democratic accountability.
  3. Legal exceptionalism — the development of courts, procedures, and doctrines that applied different rules to security matters than to ordinary law enforcement.
  4. Threat elasticity — the capacity of security agencies to redefine what counted as a threat, enabling surveillance mandates to expand in scope without democratic deliberation.

Sociologist C. Wright Mills, writing in The Power Elite (1956), identified the emerging fusion of military, corporate, and governmental elites that would come to characterize this formation. What he could not have fully anticipated was how deeply the logic of surveillance would permeate that structure — and how its targets would expand from foreign adversaries to domestic political communities.

💡 Intuition: Think of the national security state less as a single agency and more as a logic — a set of justifications, institutional arrangements, and legal tools that can be picked up by any sufficiently powerful state actor and pointed in any direction. The targets change; the logic persists.


6.2 COINTELPRO: The Architecture of Political Repression

The most exhaustive domestic surveillance and disruption program in American history operated under the bureaucratic acronym COINTELPRO — Counter Intelligence Program. Formally authorized by FBI Director J. Edgar Hoover in August 1956, COINTELPRO ran until 1971 and targeted an extraordinary range of political organizations, individuals, and social movements.

6.2.1 Origins and Authorization

COINTELPRO was launched in the context of Cold War anxiety about communist infiltration of American institutions. Its initial targets were members and suspected members of the Communist Party of the United States of America (CPUSA). But the program's internal logic — the idea that political dissent was itself a security threat — proved infinitely expandable.

By the early 1960s, COINTELPRO had extended to civil rights organizations. Martin Luther King Jr. became one of the Bureau's primary targets. Hoover authorized wiretapping of King's home and hotel rooms beginning in 1963, and in 1964, an FBI agent sent King an anonymous letter — later revealed in its full, astonishing text through FOIA requests — that concluded: "There is but one way out for you. You better take it before your filthy, abnormal fraudulent self is bared to the nation." The letter was widely understood as an incitement to suicide.

The Bureau's justification? King was suspected of being influenced by Communist advisors. The actual evidence for this was negligible. But evidentiary standards in COINTELPRO were not the standards of criminal prosecution; they were the looser standards of counterintelligence — a distinction with enormous consequences.

6.2.2 Targets and Methods

COINTELPRO operated distinct subprograms targeting:

  • The CPUSA (1956)
  • Socialist Workers Party (1961)
  • The Ku Klux Klan (1964) — one of the program's few targets on the political right, though this subprogram was less intensive
  • Black Nationalist groups including the Black Panther Party (1967)
  • The New Left (1968), encompassing Students for a Democratic Society, antiwar organizations, and campus activists
  • Puerto Rican independence organizations
  • American Indian Movement (documented in related programs)

The methods employed were diverse and deliberately disruptive. A declassified 1968 FBI memo instructed field agents to:

"Prevent the coalition of militant black nationalist groups... Prevent the rise of a 'messiah' who could unify and electrify the militant black nationalist movement... Prevent militant black nationalist groups and leaders from gaining respectability... Prevent the long-range growth of militant black nationalist organizations."

Specific COINTELPRO tactics included:

Infiltration. Informants were planted inside targeted organizations. Some of these informants became deeply embedded — attending meetings, drafting position papers, even holding leadership positions. The infiltration was so extensive in some organizations that internal trust collapsed entirely, which was, of course, part of the goal.

Disinformation. The Bureau sent forged letters, fabricated articles, and manufactured evidence to create conflict within and between organizations. The goal was not to gather evidence of crimes but to destroy organizational effectiveness through internal suspicion.

Blackmail and personal destruction. Information gathered through surveillance — on extramarital affairs, sexual behavior, financial struggles — was used to pressure individuals or was leaked to employers, landlords, or family members.

"Snitch-jacketing." Perhaps the most chilling tactic: falsely labeling loyal members of targeted organizations as FBI informants, knowing that this could result in violence against the falsely accused.

Coordination with local law enforcement. The FBI shared intelligence with local police departments and coordinated harassment, including raids on Black Panther offices that resulted in deaths, most notoriously the December 1969 Chicago raid in which Fred Hampton and Mark Clark were killed.

📊 Real-World Application: The Bureau's files on King alone eventually ran to more than 17,000 pages. The surveillance was not peripheral to King's civil rights work — it actively sought to destroy it. When King won the Nobel Peace Prize in 1964, Hoover called him "the most dangerous Negro in America." The award only intensified the surveillance.

6.2.3 COINTELPRO and the Recurring Themes

Three of the chapter's core themes converge sharply in the COINTELPRO case.

Visibility asymmetry was absolute. The FBI had comprehensive knowledge of targeted individuals' private lives, communications, and organizational activities. Those individuals had no knowledge they were being watched, no access to the files being compiled on them, no legal mechanism to contest the surveillance.

Consent as fiction is almost too obvious to name here: no legal authority notified targets, no court approved most of the program's activities, and the entire operation was classified. But consent as fiction operates more subtly too — the surveillance created a chilling effect (a term introduced in Chapter 1) that caused organizers to self-censor, avoid association, and moderate their political activities without knowing they were being watched.

Structural vs. individual explanations are essential for understanding COINTELPRO. The program did not depend on particularly malicious individual agents, though some were certainly that. It depended on institutional logics — the belief that political organizing by Black Americans constituted a security threat, the legal frameworks that permitted warrantless surveillance of domestic groups, the classification systems that prevented democratic accountability. The system produced these outcomes without requiring that every participant be a bigot, though the program was thoroughly shaped by anti-Black racism.


6.3 Exposure and the Church Committee

6.3.1 The Break-In That Broke the Secrecy

COINTELPRO might have remained entirely secret were it not for a burglary. On the night of March 8, 1971 — the same night Muhammad Ali fought Joe Frazier in the "Fight of the Century" — a group calling itself the Citizens' Commission to Investigate the FBI broke into the FBI field office in Media, Pennsylvania. They took every document in the office — roughly 1,000 files — and began mailing them to journalists.

The Washington Post, after consultation with the Justice Department, initially declined to publish. But journalist Betty Medsger, working with editor Ben Bagdikian, ultimately pushed for publication. The documents revealed, for the first time publicly, the existence of surveillance of domestic political organizations. Hoover's response was to shut down COINTELPRO entirely — not because he recognized its wrongfulness, but because secrecy was now compromised.

6.3.2 The Church Committee

The formal reckoning came after Watergate. In 1975, the Senate established the Select Committee to Study Governmental Operations with Respect to Intelligence Activities, chaired by Senator Frank Church of Idaho. The committee's final report — fourteen volumes, published in 1976 — remains the most comprehensive public accounting of American intelligence abuse ever produced.

Church himself described what he found in a famous formulation:

"In the need to develop a capacity to know what potential enemies are doing, the United States government has perfected a technological capability that enables us to monitor the messages that go through the air. Now, that is necessary and important to the United States as we look abroad at enemies or potential enemies. We must know, at the same time, that capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything — telephone conversations, telegrams, it doesn't matter. There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology."

Church was speaking in 1975. The technology he described was room-sized mainframe computers and telephone intercepts. The capacity he warned about has expanded by orders of magnitude since.

6.3.3 Reforms and Their Limits

The Church Committee's recommendations produced significant legislative reform:

  • The Foreign Intelligence Surveillance Act (FISA) of 1978 established a secret court — the Foreign Intelligence Surveillance Court (FISC) — to provide judicial oversight of intelligence surveillance targeting U.S. persons on behalf of foreign powers.
  • Executive Order 12333 (1981) placed limits on intelligence community activities, including a prohibition on assassinations.
  • The Privacy Act of 1974 granted citizens limited rights to access and correct government records about them.

These reforms created real constraints — for a time. But they also established the architecture of a legal framework that would prove highly malleable when security imperatives intensified again after 2001.

⚠️ Common Pitfall: It is tempting to read the Church Committee reforms as a complete resolution of the problem — a moment when the system corrected itself and returned to constitutional norms. This reading is comforting but inaccurate. The legal structures created in the reform era — particularly FISA and the FISC — became, after 9/11, the very mechanisms through which mass surveillance was authorized in secret. Reform created new architecture; it did not eliminate the logic of the national security state.


6.4 The Fourth Amendment and National Security Exceptions

The Fourth Amendment to the U.S. Constitution reads:

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

This text is deceptively simple. Its application to electronic surveillance has been contested since the first wiretap cases of the early twentieth century. The trajectory of the jurisprudence reveals how the law has consistently struggled — and often failed — to restrain surveillance technology.

6.4.1 The Third-Party Doctrine

One of the most consequential legal doctrines for modern surveillance emerged from two Supreme Court cases: United States v. Miller (1976) and Smith v. Maryland (1979). Together, these cases established what scholars call the third-party doctrine: information that you voluntarily share with a third party — your bank, your telephone company — carries no Fourth Amendment protection, because you have assumed the risk that the third party will disclose it to the government.

In 1979, when the Court decided Smith v. Maryland, the information at issue was phone numbers dialed from a home telephone — "pen register" data, not the content of calls. The Court held that no warrant was required to collect this information because users had voluntarily conveyed it to the telephone company.

In the internet era, the third-party doctrine has become enormously consequential. Nearly every digital act — every website visit, every text message, every email — involves sharing information with a third-party service provider. Under Smith, none of that information carries Fourth Amendment protection. The government can obtain it with a subpoena rather than a warrant, often without notifying the person whose data is collected.

🎓 Advanced: The Supreme Court's 2018 decision in Carpenter v. United States represents a partial but significant modification of third-party doctrine. Writing for the majority, Chief Justice Roberts held that the government's acquisition of cell-site location information (CSLI) — which can reconstruct a person's movements over weeks or months — requires a warrant. The majority explicitly declined to overrule Smith v. Maryland but recognized that its logic could not extend without limit into the era of pervasive digital tracking. Carpenter has been called the most important Fourth Amendment decision in decades, but its precise scope remains contested in lower courts.

6.4.2 The National Security Exception

FISA created a parallel legal track for intelligence surveillance — one with a different standard of proof and different procedural protections than ordinary criminal law. Under FISA, the government could obtain surveillance authority by certifying to the FISC that the target was an agent of a foreign power or a foreign terrorist organization. The standard was lower than probable cause in criminal proceedings; the proceedings were entirely secret; the target had no opportunity to contest the authorization.

The FISA Court approved the overwhelming majority of government applications. Between 1979 and 2012, the court approved 33,900 government surveillance requests and denied 11. Critics called it a "rubber stamp court"; defenders argued that this record reflected the government's care in submitting only well-supported applications.


6.5 The Post-9/11 Transformation

6.5.1 The USA PATRIOT Act

The terrorist attacks of September 11, 2001 produced the most rapid expansion of surveillance authority in American history. The USA PATRIOT Act — Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism — was signed into law on October 26, 2001, just 45 days after the attacks. Congress received the 342-page bill on October 23 and voted on it three days later. Many members later acknowledged they had not read the legislation.

Key provisions of the PATRIOT Act:

Section 215 (Business Records). Allowed the FBI to obtain a FISA court order requiring "any tangible things" — including books, records, papers, and documents — relevant to a terrorism investigation. This provision would later be interpreted to authorize bulk collection of telephone metadata.

Section 206 (Roving Wiretaps). Authorized "roving" wiretaps that attached to a target rather than a specific phone or account, removing the requirement that surveillance orders specify the facility being monitored.

Section 213 ("Sneak and Peek"). Authorized "delayed notification" search warrants — allowing law enforcement to search premises without immediately notifying the subject.

Section 216. Extended pen register authority to email and internet communications, enabling collection of "to/from" metadata without a warrant.

Section 218. Lowered the standard for FISA surveillance by removing the requirement that intelligence gathering be the "primary purpose" of an investigation; it needed to be only a "significant purpose."

📊 Real-World Application: The PATRIOT Act's Section 215 bulk telephone records program authorized collection of metadata on virtually every telephone call made in the United States. By 2013, the NSA was collecting phone metadata from approximately 300 million Americans under a single FISA court order — an interpretation of "relevant to a terrorism investigation" that the program's defenders could not publicly discuss, because the court order itself was classified.

6.5.2 The FISA Amendments Act and Section 702

The warrantless wiretapping program authorized by President George W. Bush in secret after 9/11 — bypassing even the FISA Court — was eventually brought partially within a legal framework by the FISA Amendments Act of 2008. The most significant provision, Section 702, authorized the NSA to collect communications of foreign targets located outside the United States, even when those communications passed through U.S. servers or involved U.S. persons.

Section 702 is the legal authority behind two of the most significant surveillance programs revealed by Edward Snowden in 2013: PRISM and Upstream collection.


6.6 The Snowden Revelations: What We Learned

6.6.1 Edward Snowden and the Decision to Disclose

Edward Snowden was a 29-year-old NSA contractor working for Booz Allen Hamilton in Hawaii when he copied thousands of classified documents and flew to Hong Kong. Between June 2013 and later, journalists Glenn Greenwald, Laura Poitras, and Barton Gellman — working with The Guardian and The Washington Post — began publishing stories based on the documents.

The revelations were neither uniform in their significance nor uniformly accurate in early reporting, but several programs they exposed fundamentally changed public understanding of surveillance scale:

6.6.2 PRISM

The PRISM program, operated under Section 702, allowed the NSA to collect communications content directly from the servers of major American technology companies, including Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL, and Apple. The program did not require individual warrants; it operated under the blanket authorization provided by Section 702 certification.

The companies' participation varied in form and degree. Some received legal compulsion; none voluntarily invited NSA access. But the program demonstrated the degree to which American internet infrastructure — services used by hundreds of millions of people globally — had become a node in the intelligence collection network.

A single PRISM slide, leaked by Snowden and published by The Guardian, showed a collection start date for each company: Microsoft (September 11, 2007), Yahoo (March 12, 2008), Google (January 14, 2009), Facebook (June 3, 2009), PalTalk (December 7, 2009), YouTube (September 24, 2010), Skype (February 6, 2011), AOL (March 31, 2011), Apple (October 2012).

6.6.3 XKeyscore

XKeyscore was described in classified NSA documents as the agency's "widest-reaching" system for developing intelligence from the internet. The program allowed analysts to search through vast databases of emails, online chats, and browsing histories. One leaked training document described XKeyscore as providing "near-real-time" analysis — allowing analysts to see "almost everything a typical user does on the internet."

The program indexed communications by various selectors — email addresses, IP addresses, keywords — and allowed analysts to conduct "federated" searches across databases covering communications from around the world. The oversight mechanism was largely self-reported: analysts certified that their targets were "foreign persons" without independent verification at the point of search.

6.6.4 MUSCULAR

The MUSCULAR program, operated jointly by NSA and GCHQ (the British signals intelligence agency), revealed a different approach: tapping the fiber-optic cables that carry data between the overseas data centers of major internet companies. Where PRISM collected data from companies' front-end servers with legal authorization, MUSCULAR collected the same data from the backend network connections — without the companies' knowledge or consent.

A diagram published by The Washington Post showed data being collected between Google's data centers at what the NSA labeled the "SSO corporate" — the point at which the companies' private networks were accessed. Google engineers, upon learning of the program, were reportedly furious.

6.6.5 Bulk Telephone Metadata

The most legally significant revelation was arguably the simplest: under Section 215, the NSA was collecting the telephone metadata of virtually every American — who called whom, when, for how long — on an ongoing basis. A single classified order from the FISA Court, directed to Verizon, required the daily production of all call detail records. Similar orders covered other major carriers.

The government's defense was that this was "just metadata" — not the content of calls. But researchers at Stanford University demonstrated that metadata alone could reveal extraordinarily sensitive information: a call to a cancer hotline followed by calls to oncologists, calls to a domestic violence shelter, calls to a HIV testing clinic, calls to a psychiatrist, calls to an abortion provider. The information that emerges from patterns of communication can be more revealing than the content of individual calls.

📊 Real-World Application: NSA Director Michael Hayden, in a notable moment of candor, stated in a public appearance: "We kill people based on metadata." The phrase, intended to defend the operational value of metadata, inadvertently underscored exactly what critics were arguing — that the category "just metadata" radically understated the significance of the information being collected.


6.7.1 ACLU v. Clapper and the Section 215 Question

The American Civil Liberties Union filed suit challenging the bulk telephone metadata program in ACLU v. Clapper. The Second Circuit Court of Appeals ruled in 2015 that the program exceeded the statutory authority of Section 215 — the court found that "relevant to an investigation" could not plausibly be interpreted to include the telephone records of every American.

Congress responded by passing the USA FREEDOM Act in 2015, which ended the NSA's bulk collection of telephone metadata and replaced it with a system requiring the NSA to query records held by telecommunications companies with specific selectors. The program continued in modified form; in 2019, the NSA recommended ending it after discovering it was collecting records it was not authorized to collect.

6.7.2 Carpenter v. United States (2018)

As discussed above, the Supreme Court's Carpenter decision represented a partial reconfiguration of the third-party doctrine in the digital era. But its limits matter as much as its holding. The Court held only that accessing seven days or more of historical CSLI required a warrant; it did not address prospective location tracking, foreign intelligence collection, or real-time surveillance. Section 702, the legal authority for the largest NSA collection programs, was reauthorized in 2018 and again in 2024, largely unchanged.


6.8 Function Creep: From Counterterrorism to Domestic Policing

Perhaps no concept better captures the trajectory of national security surveillance tools than function creep — the process by which technologies and legal authorities developed for one purpose migrate to entirely different applications. Function creep was introduced in Chapter 1 as a general surveillance dynamic; its operation in the national security domain is particularly consequential.

6.8.1 How Counterterrorism Tools Migrate

The pattern of function creep in post-9/11 surveillance has followed a consistent logic:

  1. A new surveillance tool or legal authority is developed in response to a specific security threat.
  2. The tool proves effective (or at least administratively convenient) for agencies.
  3. Agencies seek to apply the tool to adjacent threats — organized crime, drug trafficking, immigration enforcement.
  4. The tool becomes normalized in law enforcement contexts far removed from its original justification.

Consider the trajectory of the PATRIOT Act's "sneak and peek" provision (Section 213), which allowed delayed notification searches in terrorism investigations. By 2010, the provision was being used in 76% of drug cases and 24% of fraud cases — far outstripping its use in terrorism investigations, which accounted for less than 1% of applications.

The fusion center network — 77 federally funded intelligence fusion centers that were created after 9/11 to facilitate information sharing between federal and local law enforcement — provides another example. Originally conceived for counterterrorism intelligence, these centers have been extensively documented (by a 2012 Senate subcommittee report) as producing reports that were "irrelevant, useless or inappropriate" for counterterrorism, but highly relevant to local law enforcement surveillance of political protesters, Muslim community groups, and immigration enforcement.

🎓 Advanced: Legal scholar Susan Landau argues that the function creep in surveillance tools operates at multiple levels simultaneously: technical function creep (the tool can now do things it originally could not), legal function creep (the authority extends beyond its original statutory scope), and institutional function creep (the agency using the tool is now different from the one for which it was designed). These three forms reinforce each other and are difficult to disentangle once they are underway.

6.8.2 The COINTELPRO Connection

Jordan's uncle's story illustrates a form of function creep that predates the term: the migration of counterintelligence tools designed for foreign adversaries to domestic political organizing. The COINTELPRO programs used techniques — infiltration, disinformation, covert disruption — that had been developed for use against foreign intelligence services and applied them wholesale to American citizens engaged in constitutionally protected political activity.

The 1990s surveillance of domestic political organizations — when Darnell Ellis was monitored for welfare rights organizing — occurred in a period when many COINTELPRO-era practices had been formally prohibited. But the institutional logic, the tools, and the incentive structures had not been dismantled; they had been redirected. The monitoring of political organizations in the 1990s used different legal frameworks — informants within domestic extremism programs, Joint Terrorism Task Force activities — but drew on the same structural capacity.

🌍 Global Perspective: The function creep pattern is not uniquely American. The United Kingdom's Regulation of Investigatory Powers Act (RIPA), passed in 2000 ostensibly to regulate police surveillance, contained provisions that were used by local councils to conduct covert surveillance of parents suspected of falsely claiming school catchment area addresses, traders suspected of counterfeiting, and residents accused of dog fouling. The law's provisions were applied in hundreds of cases having nothing to do with terrorism or serious crime.


6.9 Thought Experiment: The Surveillance Legitimacy Spectrum

Consider the following surveillance activities, all of which have occurred or are currently occurring under U.S. law. Place each on a spectrum from "clearly legitimate" to "clearly illegitimate" — then interrogate your placements.

  1. NSA collection of communications of known foreign terrorists operating overseas.
  2. NSA collection of communications of foreign journalists writing about American foreign policy.
  3. FBI infiltration of a domestic white supremacist group planning violence.
  4. FBI informant placement in a mosque attended by the person suspected (but not charged) of planning violence.
  5. FBI informant placement in a mosque not connected to any specific investigation but in an area with a large Muslim community.
  6. Police collection of license plate reader data in a neighborhood with high crime rates.
  7. FBI monitoring of Black Lives Matter organizers based on "potential for civil unrest."
  8. NSA collection of all U.S. telephone metadata, stored for five years.

Most people find that their placements shift significantly as they move through this list — and that identifying the precise point where "legitimate national security surveillance" becomes "political surveillance" or "discriminatory surveillance" is genuinely difficult. That difficulty is not a failure of analysis; it is the central problem of the surveillance state.

📝 Note: The cases at the ambiguous middle of this spectrum are not hypothetical. Items 4 and 5 describe documented FBI programs under the "Domain Management" initiative that mapped Muslim communities in Brooklyn and Newark. Item 7 describes documented FBI "threat assessments" of BLM protesters. Item 8 was the NSA telephone metadata program revealed by Snowden.


6.10 Primary Source: The Church Committee on COINTELPRO

The following is excerpted from the Church Committee's final report (1976):

"Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that. The Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence."

The Committee identified several "basic facts" about COINTELPRO:

"First, COINTELPRO was designed to 'disrupt' the targeted groups and 'neutralize' their leaders, primarily through psychological warfare and harassment. Second, the Bureau's justification for COINTELPRO was the prevention of violence and the protection of national security. Third, most of COINTELPRO's targets were not violent and most of COINTELPRO's techniques were not calculated to prevent violence."

This excerpt is essential reading for understanding what the Committee actually found: not simply that the FBI had overreached, but that it had deliberately and systematically sought to suppress constitutionally protected political activity under the guise of national security. The phrase "protecting the national security" served, as it has served repeatedly in American history, as a justification for surveillance that was primarily about political control.


6.11 Research Study Breakdown: The Chilling Effect of Mass Surveillance

A rigorous empirical study by Jon Penney, published in the Michigan Law Review in 2016, examined Wikipedia traffic patterns before and after the Snowden revelations. Penney analyzed traffic to Wikipedia articles on topics classified as "privacy-sensitive" by the Department of Homeland Security — including terms related to terrorism, chemical weapons, and domestic security.

Methodology: Penney compared monthly page views for 48 DHS-defined "security-sensitive" articles to control articles from June 2012 to August 2014. The Snowden revelations began in June 2013.

Key findings: - Traffic to the privacy-sensitive articles declined by approximately 30% in the months following the Snowden revelations. - The decline was not explained by seasonal patterns, general Wikipedia traffic trends, or the political salience of individual topics. - The effect was most pronounced for articles about which innocent people would be most concerned about surveillance stigma — articles about terrorism and explosives, for example.

Significance: This study provides the first rigorous behavioral evidence of the "chilling effect" — the suppression of information-seeking behavior in response to perceived surveillance. The chilling effect is not merely theoretical; it produces measurable changes in how people seek information about politically sensitive topics.

Limitation and discussion: Penney's methodology cannot establish individual-level causation — we cannot observe specific people deciding not to search for specific terms. We observe only aggregate traffic patterns. But the consistency and magnitude of the effect across the full set of privacy-sensitive articles makes alternative explanations unlikely. The study suggests that mass surveillance programs affect not only those who are directly surveilled but the entire population — chilling political inquiry even among people who have done nothing that would be of investigative interest.

🔗 Connection: This research directly operationalizes the "chilling effect" concept introduced in Chapter 1 and the visibility asymmetry theme that runs throughout the text. The knowledge that one might be watched — even without certainty that one is being watched — produces behavioral change. This is the panoptic mechanism operating at population scale, as we explored in Chapter 2.


6.12 The Ongoing Architecture

What distinguishes the post-Snowden moment is not that surveillance has been curtailed but that it has been publicly acknowledged. The legal frameworks — Section 702 reauthorized, the FISA Court operating — remain largely intact. The technical infrastructure — fiber-optic taps, server access agreements, data collection centers — has not been dismantled. The USA FREEDOM Act modified the telephone metadata program but did not fundamentally alter the legal or technical architecture of mass surveillance.

The Snowden revelations produced public debate, some legislative modification, and significant changes in encryption practices by major technology companies. They did not produce a fundamental restructuring of the national security surveillance state. The primary achievement of the revelations may have been informational: the public now knows, in general terms, what exists, even if most of that structure remains classified in its details.

For Jordan's uncle, the knowledge came 30 years late and through the FOIA process. For today's targets of national security surveillance — and the definition of "target" has become extraordinarily broad — the knowledge that surveillance is happening is available. The knowledge of whether one is individually watched remains as inaccessible as ever.

✅ Best Practice: When analyzing national security surveillance programs, avoid the twin errors of dismissal ("if you have nothing to hide") and apocalypticism ("everything is being read"). The accurate picture — programs that collect at scale but analyze selectively, using legal authorities that are real but limited, producing surveillance that is pervasive but not omniscient — is more complex and requires more sustained engagement than either extreme suggests.


What's Next

Chapter 7 shifts our focus from the national security state's internal surveillance apparatus to its most visible chokepoint: the border. If COINTELPRO and PRISM represent the state's watching of its own citizens, border surveillance represents something different — the state's management of who gets to enter, and what information can be extracted from anyone who tries. Biometric databases, predictive screening algorithms, and the asymmetric power of the border inspection will all come into focus.

For Jordan, border surveillance has a different valence than the domestic surveillance that touched Uncle Darnell. As a mixed-race person who presents differently in different contexts, Jordan will encounter how the border's surveillance systems do not see individual humans — they see data categories, and which categories get assigned can depend on factors that have nothing to do with what a person has done.


Chapter 6 | Part 2: State Surveillance | The Architecture of Surveillance