THE VERTEX.
Back to home
INTERNATIONAL4 May 2026

The Reach of a 1930s Trade Law in Modern Digital Surveillance

The Department of Homeland Security used a 1930s trade law to demand Google data on a Canadian’s online activity and location after anti‑ICE posts. The case highlights the expanding extraterritorial reach of U.S. surveillance and its impact on privacy and free expression.

La
La Rédaction
The Vertex
5 min read
The Reach of a 1930s Trade Law in Modern Digital Surveillance
Source: www.wired.com
In a striking demonstration of the United States’ expanding surveillance reach, the Department of Homeland Security invoked a Depression‑era trade statute to compel Google to hand over a Canadian citizen’s digital activity and precise location data. The request followed the man’s outspoken criticism on X of the killings of Renee Good and Alex Pretti, acts that have become flashpoints in the anti‑ICE discourse. This episode underscores how legacy legal frameworks are being stretched to police online dissent. The 1930s trade law—originally crafted to restrict commerce with hostile entities—contains language broad enough to be interpreted as authorizing the collection of personal data from any individual deemed to support proscribed activities. By deploying this provision, DHS illustrates a troubling shift: immigration enforcement is now buttressed by economic sanctions tools, blurring the line between trade regulation and civil liberties. The demand also forces a private tech giant to act as an arm of law enforcement, raising questions about corporate complicity and the normalization of data‑driven policing. Contextualizing the case within a longer trajectory of US surveillance, it mirrors the post‑9/11 expansion of authority under the Patriot Act, the CLOUD Act, and Section 702 of FISA. Each successive legal instrument has broadened the government’s capacity to reach beyond national borders, often without transparent oversight. The targeting of a non‑resident alien further highlights the extraterritorial ambition that has come to define contemporary security policy. Looking ahead, the controversy is likely to fuel renewed calls for statutory revision. Legislators may seek to clarify the scope of the 1930s law, impose stricter warrants for cross‑border data requests, and reinforce judicial checks that prevent mission creep. Ultimately, the balance between security imperatives and privacy rights will be tested, determining whether the digital age demands a recalibration of the nation’s legal toolkit.