The U.S. National Security Agency’s leader recently gave a speech defending the surveillance of Americans’ phone and Internet activities as a tool to help thwart terrorist plots. “The nation needs to know we’re going to do the right thing,” Army General Keith Alexander declared in the democratic tradition of government transparency and accountability. Amid the debate over the constitutionality of the programs, specifically whether the government needs warrants to collect the data, one can’t help but be reminded of the debate over the Palmer Raids that occurred during the first Red Scare.
Following the Bolshevik Revolution of 1917, Americans feared a similar uprising by domestic communists, anarchists, and other “ists” more broadly termed radicals. In this context, President Woodrow Wilson’s attorney general, A. Mitchell Palmer, began a program of dubious legality. The government raided the homes and offices of known and suspected radicals, detained thousands, and deported hundreds. Many searches were conducted without warrants, and many people were detained and deported without just cause and without trials. To be sure, some of the targets were indeed radicals with criminal pasts or intentions (Alexander Berkman had spent time in jail for attempting to murder the man who crushed the Homestead Strike in 1892), but many of the detainees and deportees were only guilty of being immigrants from the wrong country.
Despite the differences in time and tactics, the NSA’s surveillance program began under similar circumstances. In the aftermath of the September 11 attacks, the government enhanced its ability to find and foil the plots of individual terrorists in a country of over three hundred million. The gathering of metadata is a tool (rightly or wrongly) to maintain security in a time of threats from non-state actors who are a true needle in the haystack problem.
The post World War I time period also had violent threats from individuals within. It was a time of domestic unrest that was marked by labor strikes gone violent and terrorist acts against the government and business leaders that included mail bombs and a coordinated series of explosions in eight cities on June 2, 1919. These events more than hit close to home for Palmer when one of the blasts blew up the front of his house.
Palmer’s actions had support at the onset, but there was a limit to the public’s acceptance of his disregard for the rule of law despite the violence. When the revolution Palmer claimed would occur May 1, 1920 never materialized, support for the government’s increased powers waned. The Senate Judiciary Committee investigated Palmer’s tactics in 1921.
Although the Palmer Raids searched and seized people rather than data, the government’s growth in power (perhaps unconstitutionally) in the midst of violent threats from individuals within is a repeat episode. This is why studying our history comes in handy. By evaluating the government’s actions a century ago we can find guidance as to what is and is not appropriate and necessary for the government to do now.
Whether one decides the NSA’s programs are acceptable in a time of terrorism or not, the fact that the government has engaged in constitution-stretching behavior prior to a vigorous public debate should be concerning to all citizens. Only when debate precedes the government’s assumption of increased powers will the nation indeed know the government is going to do the right thing. And this will ensure that history books look more favorably on the NSA’s actions than they do on Palmer’s.
Is the public backlash against the NSA in light of the revelations made by Edward Snowden the beginning of the end for the surveillance program? Or will the NSA’s national security argument win the day? Leave a comment.
Despite the differences in time and tactics, the NSA’s surveillance program began under similar circumstances. In the aftermath of the September 11 attacks, the government enhanced its ability to find and foil the plots of individual terrorists in a country of over three hundred million. The gathering of metadata is a tool (rightly or wrongly) to maintain security in a time of threats from non-state actors who are a true needle in the haystack problem.
The post World War I time period also had violent threats from individuals within. It was a time of domestic unrest that was marked by labor strikes gone violent and terrorist acts against the government and business leaders that included mail bombs and a coordinated series of explosions in eight cities on June 2, 1919. These events more than hit close to home for Palmer when one of the blasts blew up the front of his house.
Palmer’s actions had support at the onset, but there was a limit to the public’s acceptance of his disregard for the rule of law despite the violence. When the revolution Palmer claimed would occur May 1, 1920 never materialized, support for the government’s increased powers waned. The Senate Judiciary Committee investigated Palmer’s tactics in 1921.
Although the Palmer Raids searched and seized people rather than data, the government’s growth in power (perhaps unconstitutionally) in the midst of violent threats from individuals within is a repeat episode. This is why studying our history comes in handy. By evaluating the government’s actions a century ago we can find guidance as to what is and is not appropriate and necessary for the government to do now.
Whether one decides the NSA’s programs are acceptable in a time of terrorism or not, the fact that the government has engaged in constitution-stretching behavior prior to a vigorous public debate should be concerning to all citizens. Only when debate precedes the government’s assumption of increased powers will the nation indeed know the government is going to do the right thing. And this will ensure that history books look more favorably on the NSA’s actions than they do on Palmer’s.
Is the public backlash against the NSA in light of the revelations made by Edward Snowden the beginning of the end for the surveillance program? Or will the NSA’s national security argument win the day? Leave a comment.