PNW STAFF
When governments build the infrastructure of control, history tells us exactly what happens next.
Imagine waking up tomorrow to learn that every company you do business with -- your phone carrier, your internet provider, your GPS app -- has been legally required to store a detailed record of your movements, your devices, and your daily patterns for the past year. Not because you're suspected of anything. Not because a judge reviewed your case. Simply because you exist, and the government decided your data might be useful someday.
That is not a dystopian thought experiment. That is Canada, today.
Bill C-22, the Lawful Access Act, 2026, compels every electronic service provider in the country to warehouse the metadata of every Canadian citizen -- location data, device identifiers, transmission records -- for twelve months, pre-packaged and ready for law enforcement retrieval. The government's own description of its logic is almost admirably candid: build the haystack first, search it later. Every Canadian becomes a potential suspect before a single crime is committed.
Public Safety Minister Gary Anandasangaree assures Canadians there's nothing to worry about. "It is not about surveillance of Canadians going on about their daily lives," he said at the bill's introduction. It is a line as old as the surveillance state itself. Every government that has ever constructed a mass monitoring apparatus has said essentially the same thing. They always mean it -- at first.
What the minister didn't dwell on is the bill's most quietly alarming provision: the power to issue secret orders forcing technology companies to build and maintain surveillance capabilities for government access. Companies that receive these orders are legally gagged. They cannot tell their customers. They cannot tell the press. The existence of the order itself becomes a state secret. A surveillance architecture operating in legal darkness, with undefined scope, enforced by silence -- that is not a public safety tool. That is a blueprint.
The cybersecurity implications are just as troubling as the civil liberties ones. Privacy advocates have warned that forcing companies to engineer surveillance access into their own networks is an invitation to disaster. Once a backdoor is built into a system, it doesn't stay exclusive to its original architects. Every intelligence adversary, every criminal hacker, every foreign state actor now has a target to aim for. The government has essentially legislated a vulnerability into the foundations of Canadian digital infrastructure and called it a safety measure.
Location data alone -- where you sleep, where you worship, which clinic you visit, which rally you attend -- assembled over the course of a year, tells a more intimate story about a person than most diaries ever could. Multiply that by 40 million Canadians and you have something that has never existed before in this country: a comprehensive, government-mandated portrait of an entire population, pre-assembled, pre-stored, and waiting.
Americans watching from across the border should resist the urge to feel comfortable. The United States already operates one of the most expansive surveillance programs in the democratic world. Under Section 702 of the Foreign Intelligence Surveillance Act, the government can collect and search the electronic communications of American citizens without a warrant. FBI searches of this data rose 35% in a single year. The haystack already exists -- and it is growing.
The pattern is consistent across history. FISA itself was born from the surveillance abuses of the Nixon administration -- a law designed to contain government overreach that later became the legal cover for it. The post-9/11 era produced the NSA's mass domestic wiretapping program, operated in secret for years under a creative reinterpretation of laws that were never meant to permit it. Extraordinary powers, once granted, do not shrink. They normalize.
The most instructive parallel, however, is not historical. It is current and ongoing. China's surveillance state was not assembled in a single authoritarian stroke. It was constructed incrementally, provision by provision, system by system -- each justified with the familiar language of public safety, social stability, and national security.
Today it is a machine that tracks citizens' movements in real time, restricts travel based on behavior scores, monitors religious practice and political association, and punishes dissent not with the blunt force of a prison sentence alone, but with the quiet suffocation of algorithmic exclusion. Loans denied. Jobs disappearing. Children barred from universities. A life slowly made unlivable by a system that never forgets.
No comments:
Post a Comment