Internet Bad - University of Michigan Debate Camp Wiki

advertisement
ClicKhole
Negative
**1NC Neolib
The aff’s merely accommodates the expansion of neoliberalism—instead debates
should resolve why we allow ourselves to be tracked instead of can the internet be
free
Morozov 2013 (Evgeny; The Snowden saga heralds a radical shift in capitalism; Dec 26;
www.ft.com/intl/cms/s/0/d2af6426-696d-11e3-aba3-00144feabdc0.html#axzz3gMjZTjV8; kdf)
Technical infrastructure and geopolitical power; rampant consumerism and ubiquitous surveillance; the
lofty rhetoric of “internet freedom” and the sober reality of the ever-increasing internet control – all
these are interconnected in ways most of us would rather not acknowledge or think about. Instead, we
have focused on just one element in this long chain – state spying – but have mostly ignored all others. But the
spying debate has quickly turned narrow and unbearably technical; issues such as the soundness of US foreign policy,
the ambivalent future of digital capitalism, the relocation of power from Washington and Brussels to Silicon Valley have not received due
attention. But it
is not just the NSA that is broken: the way we do – and pay for – our communicating today is
broken as well. And it is broken for political and economic reasons, not just legal and technological ones: too many
governments, strapped for cash and low on infrastructural imagination, have surrendered their communications
networks to technology companies a tad too soon. Mr Snowden created an opening for a much-needed global debate that
could have highlighted many of these issues. Alas, it has never arrived. The revelations of the US’s surveillance addiction
were met with a rather lacklustre, one-dimensional response. Much of this overheated rhetoric – tinged with antiAmericanism and channelled into unproductive forms of reform – has been useless. Many foreign leaders still cling to the fantasy that, if only
the US would promise them a no-spy agreement, or at least stop monitoring their gadgets, the perversions revealed by Mr Snowden would
disappear. Here the politicians are making the same mistake as Mr Snowden himself, who, in his rare but thoughtful public remarks, attributes
those misdeeds to the over-reach of the intelligence agencies. Ironically, even he might not be fully aware of what he has uncovered. These are
not isolated instances of power abuse that can be corrected by updating laws, introducing tighter
checks on spying, building
more privacy tools, or making state demands to tech companies more transparent. Of course, all those things
must be done: they are the low-hanging policy fruit that we know how to reach and harvest. At the very least, such measures can create
the impression that something is being done. But what good are these steps to counter the much more
disturbing trend whereby our personal information – rather than money – becomes the chief way in which we
pay for services – and soon, perhaps, everyday objects – that we use? No laws and tools will protect citizens who, inspired by the
empowerment fairy tales of Silicon Valley, are rushing to become data entrepreneurs, always on the lookout for new, quicker, more profitable
ways to monetise their own data – be it information about their shopping or copies of their genome. These citizens
want tools for
disclosing their data, not guarding it. Now that every piece of data, no matter how trivial, is also an asset in disguise, they just
need to find the right buyer. Or the buyer might find them, offering to create a convenient service paid for by their data – which seems to be
Google’s model with Gmail, its email service. What eludes Mr Snowden – along with most of his detractors and supporters – is that we
might be living through a transformation in how capitalism works, with personal data emerging as an
alternative payment regime. The benefits to consumers are already obvious; the potential costs to
citizens are not. As markets in personal information proliferate, so do the externalities – with democracy
the main victim. This ongoing transition from money to data is unlikely to weaken the clout of the NSA;
on the contrary, it might create more and stronger intermediaries that can indulge its data obsession.
So to remain relevant and have some political teeth, the surveillance debate must be linked to debates about
capitalism – or risk obscurity in the highly legalistic ghetto of the privacy debate. Other overlooked dimensions
are as crucial. Should we not be more critical of the rationale, advanced by the NSA and other agencies, that they need this data to engage in
pre-emptive problem-solving? We
should not allow the falling costs of pre-emption to crowd out more systemic
attempts to pinpoint the origins of the problems that we are trying to solve. Just because US intelligence
agencies hope to one day rank all Yemeni kids based on their propensity to blow up aircraft does not
obviate the need to address the sources of their discontent – one of which might be the excessive use of
drones to target their fathers. Unfortunately, these issues are not on today’s agenda, in part because many
of us have bought into the simplistic narrative – convenient to both Washington and Silicon Valley – that we just need
more laws, more tools, more transparency. What Mr Snowden has revealed is the new tension at the very
foundations of modern-day capitalism and democratic life. A bit more imagination is needed to resolve
it.
Neoliberalism guarantees the dystopian impacts of the 1ac and worse—only a refusal
solves
Harvey 2014 (David [Distinguished Professor of Anthropology and Geography at the Graduate Center
of the City University of New York]; Seventeen Contradictions and the End of Capitalism; Oxford
University Press; p. 264-7; kdf)
It is not entirely beyond the realms of possibility that capital could survive all the contradictions hitherto
examined at a certain cost. It could do so, for example, by a capitalist oligarchic elite supervising the mass genocidal
elimination of much of the world's surplus and disposable population while enslaving the rest and
building vast artificial gated environments to protect against the ravages of an external nature run toxic,
barren and ruinously wild. Dystopian tales abound depicting a grand variety of such worlds and it would be wrong to rule them out as
impossible blueprints for the future of a less-than-human humanity. Indeed, there is something frighteningly close about some dystopian tales,
such as the social order depicted in the teenage hit trilogy The Hunger Games by Suzanne Collins or the futuristic anti-humanist sequences of
David Mitchell's Cloud Atlas. Clearly, any
such social order could only exist on the basis of fascistic mind control
and the continuous exercise of daily police surveillance and violence accompanied by periodic
militarised repressions. Anyone who does not see elements of such a dystopian world already in place around us is deceiving herself or
himself most cruelly. The issue is not, therefore, that capital cannot survive its contradictions but that the cost of
it so doing becomes unacceptable to the mass of the population. The hope is that long before dystopian
trends turn from a trickle of drone strikes here and occasional uses of poison gas against their own
people by crazed rulers there, of murderous and incoherent policies towards all forms of opposition in
one place to environmental collapses and mass starvation elsewhere, into a veritable flood of
catastrophic unequally armed struggles everywhere that pit the rich against the poor and the privileged
capitalists and their craven acolytes against the rest ... the hope is that social and political movements
will arise and shout, 'fa! Basta!' or 'Enough is enough', and change the way we live and love, survive and reproduce.
That this means replacing the economic engine and its associated irrational economic rationalities should by now be obvious. But how this
should be done is by no means clear and what kind of economic engine can replace that of capital is an
even murkier proposition given the current state of thought and the lamentable paucity of imaginative public debate devoted to the
question. In the analysis of this, an understanding of capital's contradictions is more than a little helpful, for, as the German playwright Bertolt
Brecht once put it, 'hope is latent in contradictions'. In excavating this zone of latent hope, there are some basic propositions that must first be
accepted. In The Enigma of Capital, I concluded: 'Capitalism
will never fall on its own. It will have to be pushed. The
accumulation of capital will never cease. It will have to be stopped. The capitalist class will never
willingly surrender its power. It will have to be dispossessed:1 I still hold to this view and think it vital that others do too. It will
obviously need a strong political movement and a lot of individual commitment to undertake such a task. Such a movement cannot
function without a broad and compelling vision of an alternative around which a collective political
subjectivity can coalesce. What sort of vision can animate such a political movement? We can seek to change the world
gradually and piecemeal by favouring one side of a contradiction (such as use value) rather than the other
(such as exchange value) or by working to undermine and eventually dissolve particular contradictions (such as
that which allows the use of money for the private appropriation of social wealth). We can seek to change the trajectories
defined by the moving contradictions (towards non-militaristic technologies and towards greater equality in a world of
democratic freedoms). Understanding capital's contradictions helps, as I have tried to indicate throughout this book, in developing a long-term
vision of the overall direction in which we should be moving. In much the same way that the rise of neoliberal capitalism from the 1970s
onwards changed the direction of capital's development towards increasing privatisation and commercialisation, the more emphatic
dominance of exchange value and an allconsuming fetishistic passion for money power, so an anti-neoliberal movement can point us in an
entirely different strategic direction for the coming decades. There
are signs in the literature as well as in the social
movements of at least a willingness to try to redesign a capitalism based in more ecologically sensitive
relations and far higher levels of social justice and democratic governance.2 There are virtues in this
piecemeal approach. It proposes a peaceful and non-violent move towards social change of the sort initially witnessed in the early
stages ofTahrir, Syntagma and Taksim Squares, although in all these instances the state and police authorities soon responded with astonishing
brutality and violence, presumably because these movements had the timerity to go beyond the boundaries of repressive tolerance. It seeks to
bring people together strategically around common but limited themes. It can have, also, wide-ranging impacts if and when contagious effects
cascade from one kind of contradiction to another. Imagine what the world would be like if the domination of exchange value and the alienated
behaviours that attach to the pursuit of money power as Keynes described them were simultaneously reduced and the powers of private
persons to profit from social wealth were radically curbed. Imagine, further, if the alienations of the contemporary work experience, of a
compensatory consumption that can never satisfy, of untold levels of economic inequality and discordance in the relation to nature, were all
diminished by a rising wave of popular discontent with capital's current excesses. We would then be living in a more humane world with muchreduced levels of social inequality and conflict and muchdiminished political corruption and oppression. This
does not tell us how
highly fragmented though numerous oppositional movements might converge and coalesce into a more
unified solidarious movement against capital's dominance. The piecemeal approach fails to register and
confront how all the contradictions of capital relate to and through each other to form an organic
whole. There is a crying need for some more catalytic conception to ground and animate political action. A collective political
subjectivity has to coalesce around some foundational concepts as to how to constitute an alternative
economic engine if the powers of capital are to be confronted and overcome. Without that, capital can
neither be dispossessed nor displaced. The concept I here find most appropriate is that of alienation.
**1NC Internet Centrism K
The aff’s merely accommodates the expansion of neoliberalism—instead debates
should resolve why we allow ourselves to be tracked instead of can the internet be
free
Morozov 2013 (Evgeny; The Snowden saga heralds a radical shift in capitalism; Dec 26;
www.ft.com/intl/cms/s/0/d2af6426-696d-11e3-aba3-00144feabdc0.html#axzz3gMjZTjV8; kdf)
Technical infrastructure and geopolitical power; rampant consumerism and ubiquitous surveillance; the
lofty rhetoric of “internet freedom” and the sober reality of the ever-increasing internet control – all
these are interconnected in ways most of us would rather not acknowledge or think about. Instead, we
have focused on just one element in this long chain – state spying – but have mostly ignored all others. But the
spying debate has quickly turned narrow and unbearably technical; issues such as the soundness of US foreign policy,
the ambivalent future of digital capitalism, the relocation of power from Washington and Brussels to Silicon Valley have not received due
attention. But it
is not just the NSA that is broken: the way we do – and pay for – our communicating today is
broken as well. And it is broken for political and economic reasons, not just legal and technological ones: too many
governments, strapped for cash and low on infrastructural imagination, have surrendered their communications
networks to technology companies a tad too soon. Mr Snowden created an opening for a much-needed global debate that
could have highlighted many of these issues. Alas, it has never arrived. The revelations of the US’s surveillance addiction
were met with a rather lacklustre, one-dimensional response. Much of this overheated rhetoric – tinged with antiAmericanism and channelled into unproductive forms of reform – has been useless. Many foreign leaders still cling to the fantasy that, if only
the US would promise them a no-spy agreement, or at least stop monitoring their gadgets, the perversions revealed by Mr Snowden would
disappear. Here the politicians are making the same mistake as Mr Snowden himself, who, in his rare but thoughtful public remarks, attributes
those misdeeds to the over-reach of the intelligence agencies. Ironically, even he might not be fully aware of what he has uncovered. These are
not isolated instances of power abuse that can be corrected by updating laws, introducing tighter
checks on spying, building
more privacy tools, or making state demands to tech companies more transparent. Of course, all those things
must be done: they are the low-hanging policy fruit that we know how to reach and harvest. At the very least, such measures can create
the impression that something is being done. But what good are these steps to counter the much more
disturbing trend whereby our personal information – rather than money – becomes the chief way in which we
pay for services – and soon, perhaps, everyday objects – that we use? No laws and tools will protect citizens who, inspired by the
empowerment fairy tales of Silicon Valley, are rushing to become data entrepreneurs, always on the lookout for new, quicker, more profitable
ways to monetise their own data – be it information about their shopping or copies of their genome. These citizens
want tools for
disclosing their data, not guarding it. Now that every piece of data, no matter how trivial, is also an asset in disguise, they just
need to find the right buyer. Or the buyer might find them, offering to create a convenient service paid for by their data – which seems to be
Google’s model with Gmail, its email service. What eludes Mr Snowden – along with most of his detractors and supporters – is that we
might be living through a transformation in how capitalism works, with personal data emerging as an
alternative payment regime. The benefits to consumers are already obvious; the potential costs to
citizens are not. As markets in personal information proliferate, so do the externalities – with democracy
the main victim. This ongoing transition from money to data is unlikely to weaken the clout of the NSA;
on the contrary, it might create more and stronger intermediaries that can indulge its data obsession.
So to remain relevant and have some political teeth, the surveillance debate must be linked to debates about
capitalism – or risk obscurity in the highly legalistic ghetto of the privacy debate. Other overlooked dimensions
are as crucial. Should we not be more critical of the rationale, advanced by the NSA and other agencies, that they need this data to engage in
pre-emptive problem-solving? We
should not allow the falling costs of pre-emption to crowd out more systemic
attempts to pinpoint the origins of the problems that we are trying to solve. Just because US intelligence
agencies hope to one day rank all Yemeni kids based on their propensity to blow up aircraft does not
obviate the need to address the sources of their discontent – one of which might be the excessive use of
drones to target their fathers. Unfortunately, these issues are not on today’s agenda, in part because many
of us have bought into the simplistic narrative – convenient to both Washington and Silicon Valley – that we just need
more laws, more tools, more transparency. What Mr Snowden has revealed is the new tension at the very
foundations of modern-day capitalism and democratic life. A bit more imagination is needed to resolve
it.
Their epistemology is bankrupt – vote neg on presumption
Morozov 2013 (Evgeny [former fellow @ Stanford & Georgetown]; To Save Everything, Click Here:
The Folly of Technological Solutionism; p. post-script; Pro-quest; kdf)
On the odd chance that this book succeeds, its greatest contribution to the public debate might lie in
redrawing the front lines of the intellectual battles about digital technologies. Those front lines will
separate a host of Internet thinkers who are convinced that “the Internet” is a useful analytical category
that tells us something important about how the world really works from a group of post-Internet
thinkers who see “the Internet,” despite its undeniable physicality, as a socially constructed concept that could perhaps
be studied by sociologists, historians, and anthropologists—much as they study the public life of ideas such as “science,” “class” or
“Darwinism”—but that tells us nothing about how the world works and even less about how it should work. The
former group thinks
that “the Internet” is the key to solving some of the greatest policy puzzles of the day; the latter thinks
that “the Internet” is only confusing policymakers more and that the sooner digital activists learn how to
make their arguments without appealing to “the Internet,” the better. Since my own theoretical sympathies should be
quite clear by now—I’m with the second camp, in case you fell asleep at the wheel—I won’t bore you with the details of how I think the first
camp will come down in flames. Instead, I’d rather use this opportunity to articulate a very broad outline of what this second, post-Internet
approach to technology might look like and what its preoccupations might be. First, it
would abstain from the highly emotional
and polemical discussions over what “the Net” or even “social media” do to our brains, freedom, and
dictators. This post-Internet approach is much more interested in the world of trash bins and parking
meters in our mundane everyday lives than in the role of Twitter in the Arab Spring—and not because it’s
parochial in outlook but because it doesn’t believe in the power of such ambitious and ambiguous questions. The role of Twitter’s algorithms in
highlighting the #Jan25 hash tag, which brought some global attention to the cause of the protesters in Tahrir Square, on the other hand, is fair
game. Will a viral TED talk emerge out of this second approach? Probably not; its
findings won’t be very sexy, and it won’t
default to some banal abstract truth about “democracy” or the “Middle East.” On the whole, though, this highly
empirical but small-scale approach will probably tell us more about the opportunities and limitations of digital technologies than the entire
“Does social media cause revolutions?” debate that wasted so much of everyone’s time—including mine—in
early 2011. Those pursuing this post-Internet approach will be extremely cautious—even skeptical—about any causality claims made with
respect to digital technologies. They will recognize that, more often than not, these technologies are not the causes of the world we live in but
rather its consequences. The
post-Internet approach will not treat these digital technologies as if they fell from
the sky and we should therefore not—God forbid—question their origins and only study their impact. Instead,
those relying on a post-Internet approach will trace how these technologies are produced, what voices and ideologies are silenced in their
production and dissemination, and how the marketing literature surrounding these technologies taps into the zeitgeist to make them look
inevitable. Internet theorists looking at, say, MP3 technology will think “Napster”—that quintessential “Internet technology”—and start their
account from the mid-1990s; post-Internet theorists looking at MP3 technology will think of the history of sound compression and start their
account in the 1910s (as Jonathan Sterne has done in his recent MP3: The Meaning of a Format). Internet theorists studying search engines will
begin with Stanford and Google perhaps, with a cursory mention of Vannevar Bush’s memex; post-Internet theorists will look much further
back than that, unearthing such obscure figures as Albert Kahn (and his effort to create “The Archives of the Planet” through photographs), as
well as Paul Otlet and Henri La Fontaine with their Mundaneum, an attempt to gather all the world’s knowledge. This list can go on indefinitely,
but the trend is clear: one unexpected benefit of a post-Internet approach is that it deflates the shallow and historically illiterate accounts that
dominate so much of our technology debate and opens them to much more varied, rich, and historically important experiences. Once we
realize that for the last hundred years or so virtually every generation has felt like it was on the edge of a technological revolution—be it the
telegraph age, the radio age, the plastic age, the nuclear age, or the television age—maintaining the myth that our own period is unique and
exceptional will hopefully become much harder. Perhaps, this will make it all but impossible for solutionists to mobilize revolutionary rhetoric
to justify their radical plans to the public. Once
we move to a post-Internet world, there is a small chance that our
technology pundits (and perhaps even some academics) will no longer get away with proclaiming something a
revolution and then walking away without supplying good, empirical evidence—as if that revolution were so selfevident and no further proof was needed. I too used to be one of those people—albeit very briefly—sometime between 2005 and 2007. I
remember perfectly the thrill that comes from thinking that the lessons of Wikipedia or peer-to-peer networking or Friendster or Skype could
and should be applied absolutely everywhere. It’s a very powerful set of hammers, and plenty of people—many of them in Silicon Valley—are
dying to hear you cry, “Nail!” regardless of what you are looking at. Thinking that you are living through a revolution and hold the key to how it
will unfold is, I confess, rather intoxicating. So I can relate to those Internet thinkers who feel extremely comfortable with the current state of
debate, even though I can probably not forgive them. This book, I hope, has shown that most Internet theorists venerate an imaginary god of
their own creation and live in denial. Secularizing our technology debate and cleansing it of the pernicious influence of Internet-centrism is by
far the most important task that technology intellectuals face today. Everything else—especially particular policies—hinges on how such
secularization proceeds, if it does so at all. Consider one example from what used to be my own favorite field: what
exactly is the point
of operating with a term like “Internet freedom” if the very idea of “the Internet” is contested and full of
ambiguity? Discussing the particulars of the “Internet freedom agenda” without resolving the many
contradictions in its initial formulation seems counterproductive to me, as it might only legitimize that
concept further. Once our debate moves into post-Internet territory, many of the technophobic,
ahistorical accounts will hopefully become harder to pull off as well. If “the Internet” is no longer seen as
a unified force that acts on our brains or our culture, any account of what digital technologies do to our neurons or books
will need to get empirical and start talking about individual technologies and individual practices, perhaps with a nod to how such practices
evolved and coped in the past. So far, we
get none of that: we are told that “the Net” is rewiring our brains, which
is not at all a good starting point for debate. After all, so what if it’s rewiring our brains? And what should
we do about “the Net” anyway? It stirs fears alright, but we quickly get mired in cheap populism. If technophobic accounts do
become harder to produce, then there’s also a small chance we will be able to have a meaningful debate about not just the appropriateness of
technological fixes to a given problem but also about the desirability of particular technological fixes. Once we can’t reject technology outright,
we’ll need to explain why some fixes are better than others. If it makes us think and ask questions, it is a worthy enterprise all by itself.
Technology is not the enemy; our enemy is the romantic and revolutionary problem solver who resides
within. We can do nothing to tame that little creature, but we can do a lot to tame its favorite weapon:
“the Internet.” Let’s do that while we can—it would be deeply ironic if humanity were to die in the crossfire as its problem solvers
attempted to transport that very humanity to a trouble-free world.
Link: Balkanization
Use of the term “Balkanization” should be rejected – vote neg
Maurer and Morgus 2014 (Tim and Robert; Stop Calling Decentralization of the Internet
"Balkanization"; Feb 19;
www.slate.com/blogs/future_tense/2014/02/19/stop_calling_decentralization_of_the_internet_balkani
zation.html; kdf)
It’s the end of the Internet. That was the headline of the prominent Swiss newspaper NZZ on Feb. 9. And Tim Berners-Lee, the creator of the
World Wide Web, recently called for a re-decentralization, declaring, “I want a Web that’s open, works internationally, works as well as
possible, and is not nation-based.” These are the latest voices in the growing chorus over the “balkanization” of the Internet and the emergence
of “splinternets”—networks that are walled off from the rest of the Web. This is an important debate, one that will affect the future of the
Internet. And with a major global conference on this topic taking place in Brazil in April and the World Summit on the Information Society +10
scheduled for 2015, it is high time to bring more clarity and nuance to it. Unfortunately,
the term balkanization itself creates
problems. Depending on whom you ask, balkanization can be a positive or negative process. For some,
the term represents a move toward freedom from oppression. For others, it is a reminder of centuries of
bloody struggle to hold together a region that ultimately ended in violent fragmentation, which makes
use of the word offensive to some. Fragmentation of the Internet is the term we’ll use, but maybe a creative
mind somewhere will find a better, more evocative way to describe it. The question is: What does fragmentation mean, exactly?
Is it the end of the Internet if domain names can no longer only be written using the Roman alphabet? If
so, the Internet ended in 2009, when ICANN approved alternative alphabet domain names. Is it
fragmentation if people around the world using Weibo and Yandex in lieu of Google and Twitter? Or is it data
localization and national routing – subjecting data transfers to national boundaries? This debate is a lot
more complex than most headlines suggest. The Internet is more than Facebook and it is more than the Web itself—more than the
content people access every day. However, popular discussion tends to lump these various dimensions together. It obscures the
fragmentation efforts that truly undermine the openness and interoperability of the network.
Link: Internet Freedom
Internet freedom is a rouse to expand the power of western corporations
Power and Jablonski 2015 (Shawn M [Assistant Professor of Communication at Georgia State
University] and Michael [attorney and presidential fellow in communication at Georgia State University];
The Real Cyber War; University of Illinois Press; p. 203-4; kdf)
Few dispute the centrality of information to modern economies and governance. What is contested, however, is
the legitimacy of institutions governing global information flows and the appropriate scope of state authority in managing information within its
sovereign borders.
The real cyber war is thus a competition among different political economies of the
information society. Discourses of “internet freedom,” most prominently articulated by former Secretary of State Hillary
Clinton, serve to legitimize a particular political economy of globalism. America’s “free flow” doctrine is a
strategic vision to legitimize a specific geopolitical agenda of networking the world in ways that
disproportionally benefit Western governments and economies. Similarly, the increasingly vocal call for information
sovereignty serves a legitimating function for state efforts to govern highly complex societies in a world wired for globally instantaneous
information and data are the new oil (chapter 3), research on comparative and competing information
neither economics, political
science, law, nor environmental studies were sufficient to understand and explain the powerful role
natural resources played in twentieth-century geopolitics. Similarly, a more historical and holistic account is
required to place the current battle for control over the world’s information flows into focus. By
emphasizing four lines of conceptual inquiry—history, social totality, moral philosophy, and praxis—a political-economy
framework places the internet-freedom movement in the broader geopolitical and economic context
within which strategic actors are competing for resources and power. It joins case studies that may otherwise not be
communications. If
policies requires a method of inquiry that spans beyond a particular disciplinary focus. Taken alone,
seen as connected, draws on historical comparison, and goes beyond documenting what is by emphasizing what ought be.
Assuming that the internet is free or that American policy can make it that way is
cyber-utopian- it overlooks global oppression that affects the internet
Morozov 11 (Evgeny Morozov. Writer and researcher who studies political and social implications of
technology. Senior writer at New Republic. “The Net Delusion.” 2011. P. 25.)//EMerz
American diplomats have been wrong to treat the Internet, revolutionary as it might seem to them, as a
space free of national prejudices. Cyberspace is far less susceptible to policy amnesia than they believe;
earlier policy blunders and a long-running history of mutual animosity between the West and the rest
won’t be forgotten so easily. Even in the digital age, the foreign policy of a country is still constrained by
the same set of rather unpleasant barriers that limited it in the analog past. As Joseph Nye and Robert
Keohane, two leading scholars of international relations, pointed out more than a decade ago,
“information does not flow in a vacuum but in a political space that is already occupied.” Until the
events in Iran, America’s technology giants may have, indeed, functioned in a mostly apolitical vacuum
and have been spared any bias that comes with the label “American.” Such days, however, are clearly
over. In the long run, refusing to recognize this new reality will only complicate the job of promoting
democracy.
Link: Internet Freedom->Democracy
Attempts to spread Western democracy via the internet and capitalism are doomed to
fail- ideological problems and empirics prove
Morozov 11 (Evgeny Morozov. Writer and researcher who studies political and social implications of
technology. Senior writer at New Republic. “The Net Delusion.” 2011. P. ix-xi.)//EMerz
*We do not endorse the ableist language in this card*
For anyone who wants to see democracy prevail in the most hostile and unlikely environments, the first decade of the new millennium was
marked by a sense of bitter disappointment, if not utter disillusionment. The seemingly inexorable march of freedom that began in the late
1980s has not only come to a halt but may have reversed its course. Expressions like “freedom recession” have begun to break out of the thinktank circuit and enter the public conversation. In a state of quiet desperation, a growing number of Western policymakers began to concede
that the Washington Consensus—that set of dubious policies that once promised a neoliberal paradise at deep discounts—has been
superseded by the Beijing Consensus, which boasts of delivering quick and- dirty prosperity without having to bother with those pesky
The West has been slow to discover that the fight for democracy wasn’t won back in
1989. For two decades it has been resting on its laurels, expecting that Starbucks, MTV, and Google will do the rest just fine. Such a
laissez-faire approach to democratization has proved rather toothless against resurgent
authoritarianism, which has masterfully adapted to this new, highly globalized world. Today’s authoritarianism
institutions of democracy.
is of the hedonism- and consumerism-friendly variety, with Steve Jobs and Ashton Kutcher commanding far more respect than Mao or Che
Guevara. No wonder the West appears at a loss. While the Soviets could be liberated by waving the magic wand of blue jeans, exquisite coffee
machines, and cheap bubble gum, one can’t pull the same trick on China. After all, this is where all those Western goods come from. Many
of the signs that promised further democratization just a few years ago never quite materialized. The socalled color revolutions that swept the former Soviet Union in the last decade produced rather
ambiguous results. Ironically, it’s the most authoritarian of the former Soviet republics—Russia, Azerbaijan, Kazakhstan—that found
those revolutions most useful, having discovered and patched their own vulnerabilities. My own birthplace, Belarus, once singled out by
Condoleezza Rice as the last outpost of tyranny in Europe, is perhaps the shrewdest of the lot; it continues its slide into a weird form of
authoritarianism, where the glorification of the Soviet past by its despotic ruler is fused with a growing appreciation of fast cars, expensive
holidays, and exotic cocktails by its largely carefree populace. The
wars in Iraq and Afghanistan, which were started, if
anything, to spread the gospel of freedom and democracy, have lost much of their initial emancipatory
potential as well, further blurring the line between “regime change” and “democracy promotion.”
Coupled with Washington’s unnecessary abuses of human rights and rather frivolous interpretations of
international law, these two wars gave democracy promotion such a bad name that anyone eager to
defend it is considered a Dick Cheney acolyte, an insane idealist, or both. It is thus easy to forget, if only for therapeutic purposes,
that the West still has an obligation to stand up for democratic values, speak up about violations of human rights, and reprimand those who
abuse their office and their citizens. Luckily, by the twenty-first century the case for promoting democracy no longer needs to be made; even
the hardest skeptics agree that a world where Russia, China, and Iran adhere to democratic norms is a safer world. That said, there is still very
little agreement on the kind of methods and policies the West needs to pursue to be most effective in promoting democracy. As the last few
decades have so aptly illustrated, good intentions are hardly enough. Even the most noble
attempts may easily backfire,
entrenching authoritarianism as a result. The images of horrific prisoner abuse at Abu Ghraib were the result, if only indirectly, of
one particular approach to promoting democracy. It did not exactly work as advertised. Unfortunately, as the neoconservative vision
for democratizing the world got discredited, nothing viable has come to fill the vacuum. While George Bush
certainly overdid it with his excessive freedomworshiping rhetoric, his successor seems to have abandoned the rhetoric, the spirit, as well as
any desire to articulate what a post-Bush “freedom agenda” might look like. But there is more to Obama’s silence than just his reasonable
attempt to present himself as anti-Bush. Most likely his silence is a sign of an extremely troubling bipartisan malaise: the growing Western
fatigue with the project of promoting democracy. The
project suffers not just from bad publicity but also from a
deeply rooted intellectual crisis. The resilience of authoritarianism in places like Belarus, China, and Iran
is not for lack of trying by their Western “partners” to stir things up with an expectation of a democratic
revolution. Alas, most such Western initiatives flop, boosting the appeal of many existing dictators, who excel
at playing up the threat of foreign mingling in their own affairs. To say that there is no good blueprint for dealing with modern authoritarianism
would be a severe understatement. Lost in their own strategizing, Western leaders are pining for something that has guaranteed effectiveness.
Their representations of the internet as the savior of democracy are rooted in western
ideology- it’s a utopian mindset that fails to recognize reality
Morozov 11 (Evgeny Morozov. Writer and researcher who studies political and social implications of
technology. Senior writer at New Republic. “The Net Delusion.” 2011. P. ix-xi.)//EMerz
Given that it’s the only ray of light in an otherwise dark intellectual tunnel of democracy promotion, the
Internet’s prominence in future policy planning is assured. And at first sight it seems like a brilliant idea.
It’s like Radio Free Europe on steroids. And it’s cheap, too: no need to pay for expensive programming,
broadcasting, and, if everything else fails, propaganda. After all, Internet users can discover the truth
about the horrors of their regimes, about the secret charms of democracy, and about the irresistible
appeal of universal human rights on their own, by turning to search engines like Google and by following
their more politically savvy friends on social networking sites like Facebook. In other words, let them
tweet, and they will tweet their way to freedom. By this logic, authoritarianism becomes unsustainable
once the barriers to the free flow of information are removed. If the Soviet Union couldn’t survive a
platoon of pamphleteers, how can China survive an army of bloggers? It’s hardly surprising, then, that
the only place where the West (especially the United States) is still unabashedly eager to promote
democracy is in cyberspace. The Freedom Agenda is out; the Twitter Agenda is in. It’s deeply symbolic
that the only major speech about freedom given by a senior member of the Obama administration was
Hillary Clinton’s speech on Internet freedom in January 2010. It looks like a safe bet: Even if the Internet
won’t bring democracy to China or Iran, it can still make the Obama administration appear to have the
most technologically savvy foreign policy team in history. The best and the brightest are now also the
geekiest. The Google Doctrine—the enthusiastic belief in the liberating power of technology
accompanied by the irresistible urge to enlist Silicon Valley start-ups in the global fight for freedom—is
of growing appeal to many policymakers. In fact, many of them are as upbeat about the revolutionary
potential of the Internet as their colleagues in the corporate sector were in the late 1990s. What could
possibly go wrong here? As it turns out, quite a lot. Once burst, stock bubbles have few lethal
consequences; democracy bubbles, on the other hand, could easily lead to carnage. The idea that the
Internet favors the oppressed rather than the oppressor is marred by what I call cyber-utopianism: a
naïve belief in the emancipatory nature of online communication that rests on a stubborn refusal to
acknowledge its downside. It stems from the starryeyed digital fervor of the 1990s, when former
hippies, by this time ensconced in some of the most prestigious universities in the world, went on an
argumentative spree to prove that the Internet could deliver what the 1960s couldn’t: boost democratic
participation, trigger a renaissance of moribund communities, strengthen associational life, and serve as
a bridge from bowling alone to blogging together. And if it works in Seattle, it must also work in
Shanghai. Cyber-utopians ambitiously set out to build a new and improved United Nations, only to end
up with a digital Cirque du Soleil. Even if true—and that’s a gigantic “if ”—their theories proved difficult
to adapt to non-Western and particularly nondemocratic contexts. Democratically elected governments
in North America and Western Europe may, indeed, see an Internet-driven revitalization of their public
spheres as a good thing; logically, they would prefer to keep out of the digital sandbox—at least as long
as nothing illegal takes place.
Cyber utopianism increases the power of authoritarian regimes-undermines the very
efforts of the movement
Morozov 11 (Evgeny Morozov. Writer and researcher who studies political and social implications of
technology. Senior writer at New Republic. “The Net Delusion.” 2011. P. xiii-xiv.)//EMerz
Authoritarian governments, on the other hand, have invested so much effort into suppressing any form
of free expression and free assembly that they would never behave in such a civilized fashion. The early
theorists of the Internet’s influence on politics failed to make any space for the state, let alone a brutal
authoritarian state with no tolerance for the rule of law or dissenting opinions. Whatever book lay on
the cyber-utopian bedside table in the early 1990s, it was surely not Hobbes’s Leviathan. Failing to
anticipate how authoritarian governments would respond to the Internet, cyber-utopians did not
predict how useful it would prove for propaganda purposes, how masterfully dictators would learn to
use it for surveillance, and how sophisticated modern systems of Internet censorship would become.
Instead most cyber-utopians stuck to a populist account of how technology empowers the people, who,
oppressed by years of authoritarian rule, will inevitably rebel, mobilizing themselves through text
messages, Facebook, Twitter, and whatever new tool comes along next year. (The people, it must be
noted, really liked to hear such theories.) Paradoxically, in their refusal to see the downside of the new
digital environment, cyber-utopians ended up belittling the role of the Internet, refusing to see that it
penetrates and reshapes all walks of political life, not just the ones conducive to democratization. 2
Link: Internet Governance
Internet governance is a meme to expand the power of neoliberalism
Power and Jablonski 2015 (Shawn M [Assistant Professor of Communication at Georgia State
University] and Michael [attorney and presidential fellow in communication at Georgia State University];
The Real Cyber War; University of Illinois Press; p. 23-4; kdf)
Connecting commodification and structuration, chapter 4 focuses on the economics of internet connectivity and the fight over
which international institutions are responsible for the regulation of digital information flows. We suggest that, at a basic level, U.S.
internet policy can be boiled down to getting as many people using the network of networks as possible,
while protecting the status quo legal, institutional, and economic arrangements governing connectivity
and exchanges online. From the global infrastructure facilitating exchanges of data to the creation of unique content and services
online, American companies are dominant, extraordinarily profitable, and, in most cases, well ahead of foreign
competition. Building on chapters 2 and 3, chapter 4 traces how economic logic continues to drive U.S. policy as well as
U.S. negotiating strategy in the international arena. From this perspective the real cyber war is not over offensive
capabilities or cybersecurity but rather about legitimizing existing institutions and norms governing internet
industries in order to assure their continued market dominance and profitability. By outlining the economic
significance of the issue—how economies of scale favor established, dominant actors, and how the current deregulated system
enables a handful of Western corporations to profit handsomely from expanded internet connectivity—
we attempt to deviate from the modernization and information-sovereignty paradigms that too often
dominate discussions of internet governance. While heavy-handed government controls over the internet should be resisted,
so should a system whereby internet connectivity requires the systematic transfer of wealth from the developing world to the developed. By
focusing on the uneven empirics of the internet’s economic significance, combined with a discussion of positive economic externalities and the
network effect, this chapter offers an alternative
hopefully a more reasonable path forward.
framing of an ongoing debate over internet governance—and
Link: Localization
The discourse of localization is a rouse for the expansion of neoliberalism
Schiller 2014 (Dan [professor in the Graduate School of Library and Information Science and the
Department of Communication at the University of Illinois at Urbana-Champaign]; Digital Depression;
University of Illinois Press; p. 209-10; kdf)
It was a remarkably fluid moment, wherein the direction of change remained both vital and indefinite—perhaps even a historic turning point.
The multipronged
U.S. internet policy offensive in support of a transnational digital capitalism had been
widely discredited, at home and especially abroad: the U.S. was compelled to regroup.149 It was not yet evident, however,
who else would, or who could, step in to recharge or adapt this existing policy program. Brazil, interestingly, stepped forward to announce that
it would host a “Global Multi-stakeholder Meeting on the Future of Internet Governance” in April 2014. Was this a bid for autonomy from the
U.S.-centric system—or a feint? Might a coalition of nations and corporations emerge that was sufficient to assemble a formally different,
though substantially similar, policy for global internet governance? Where might this leave the United States? Bureaucrats, strategists, and
independent analysts pondered whether Brazil’s initiative might further some kind of accommodation and help rebuild legitimacy for a version
of the status quo—or move beyond it.150 In
the predominant U.S. discourse, the question of whether different
states might fracture the interoperable internet as they imposed greater national jurisdictional controls
still continued to be a touchstone; but other questions were now intervening, more far-reaching and portentous ones. Would U.S.
corporate and state power over the extraterritorial internet finally be reduced? If so, this would constitute a sea change, the profound
ramifications of which would give rise at once to other questions: What would replace U.S. unilateral globalism? Would ICANN’s corporatist
“multi-stakeholder” model be elevated, to transpose into a full-fledged global regime? Or, far less likely, would a multilateral model of internet
governance be instituted? Or,
instead, would the previous unstable stalemate find a new lease on life as U.S.centric internet governance and its erstwhile allies continued to vie against dissatisfied stakeholders
such as China and Russia? How would the U.S. leadership respond to the varied reform proposals? What
roles would be played in forthcoming initiatives by other power groupings: the European Union, Mercosur, the BRICS, the Shanghai
Cooperation Organization? Only after this book goes to press will we learn whether the U.S.–centric internet may be modified and, if so, how.
Surprises, assuredly, remain in store. But the
essential questions have to do not with “balkanization,” as Eric Schmidt
with whose political-economic interests may predominate in
any restructuring and, above all, with how—and how far—democratic principles of representation and
accountability might be imagined and established. A neglected aspect of these profound questions
brings us back once more to the U.S. state—which was not bound necessarily to act in a single, unitary way. The NSA
spying scandal revealed that the seeming fusion of interests between the U.S. Executive Branch and U.S.
networking and internet companies was actually far from stable. Not only had the spiraling business threat posed to
U.S. internet companies caused them to look for means of appearing to distance themselves politically
from the U.S. state, so that they vowed to “harden” their systems and pressed publicly for tighter laws against backdoor surveillance
programs by their own government’s spy services152—indeed, Microsoft even boasted that it would allow foreign users
of its systems to store their personal data on servers located outside the United States.153 And not only had
referred to the specter of a fractured internet,151 but
President Obama reciprocated, ignoring U.S. public opinion (which opposed NSA data collection policies) in his attempts to shore up NSA
surveillance programs and to shift the blame by declaring, “The challenges to our privacy do not come from government alone.”154 Amid this
fractiousness between U.S. internet capital and the U.S. administration, other powerful U.S. state actors also expressed alarm at what they had
long perceived as the internet’s strategic vulnerabilities. The
longstanding U.S. approach to global internet governance
in turn faced additional challenges not only from without but also from within.
Link: Oversight/Transparency
Oversight/Transparency is a sacred cow of internet centrism
Morozov 2013 (Evgeny [former fellow @ Stanford & Georgetown]; To Save Everything, Click Here:
The Folly of Technological Solutionism; p. So open it hurts; Pro-quest; kdf)
Ironically, this is the position that Lessig the academic has made a career out of opposing. But Lessig the activist and public intellectual has no
problem embracing such a position whenever it suits his own activist agenda. As someone who shares many of the ends of Lessig’s agenda, I
take little pleasure in criticizing his means, but I do think they are intellectually unsustainable and probably misleading to the technologically
unsavvy.
Internet-centrism, like all religions, might have its productive uses, but it makes for a truly awful guide
to solving complex problems, be they the future of journalism or the unwanted effects of transparency.
It’s time we abandon the chief tenet of Internet-centrism and stop conflating physical networks with the
ideologies that run through them. We should not be presenting those ideologies as inevitable and
natural products of these physical networks when we know that these ideologies are contingent and
perishable and probably influenced by the deep coffers of Silicon Valley. Instead of answering each and every digital
challenge by measuring just how well it responds to the needs of the “network,” we need to learn how to engage in narrow, empirically
grounded arguments about the individual technologies and platforms that compose “the Internet.” If, in some cases, this
would mean
going after the sacred cows of transparency or openness, so be it. Before the idea of “the Internet”
hijacked our imaginations, we made such trade-offs all the time. No serious philosopher would ever
proclaim that either transparency or openness is an unquestionable good or absolute value to which
human societies should aspire. There is no good reason why we should suddenly accept the totalizing philosophy of “the
Internet” and embrace the supremacy of its associated values just because its cheerleaders believe that
“the network is not going away.” Digital technologies contain no ready-made answers to the social and
political dilemmas they create, even if “the Internet” convinces us otherwise.
Link – policy making/ debate
Policy debates about the internet are used to obfuscate the underlying flaws of the
internet
Morozov 2013 (Evgeny [former fellow @ Stanford & Georgetown]; To Save Everything, Click Here:
The Folly of Technological Solutionism; p.The Nonsense of “the Internet”—and How to Stop It; Proquest; kdf)
Today, “the
Internet” is regularly invoked to thwart critical thinking and exclude nongeeks from the
discussion. Here is how one prominent technology blogger argued that Congress should not regulate facial-recognition technology: “All too
many U.S. lawmakers are barely beyond the stage of thinking that the Internet is a collection of tubes; do we really want these guys to tell
Facebook or any other social media company how to run its business?” You see, it’s all so complex—much more complex than health care or
climate change—that only geeks should be allowed to tinker with the magic tubes. “The
Internet” is holy—so holy that it lies
beyond the means of democratic representation. That facial-recognition technology developed independently of “the
Internet” and has its roots in the 1960s research funded by various defense agencies means little in this context. Once part of “the
Internet,” any technology loses its history and intellectual autonomy. It simply becomes part of the
grand narrative of “the Internet,” which, despite what postmodernists say about the death of metanarratives, is one metanarrative
that is doing all right. Today, virtually every story is bound to have an “Internet” angle—and it’s the job of our Internet
apostles to turn those little anecdotes into fairy tales about the march of Internet progress, just a tiny chapter in their cyber-Whig theory of
history. “The Internet”: an idea that effortlessly fills minds, pockets, coffers, and even the most glaring narrative gaps. Whenever you hear
someone tell you, “This is not how the Internet works”—as technology bloggers are wont to inform everyone who cares to read their
scribblings—you should know that your interlocutor believes your views to be reactionary and antimodern. But where is the missing manual to
“the Internet”—the one that explains how this giant series of tubes actually works—that the geeks claim to know by heart? Why are they so
reluctant to acknowledge that perhaps there’s nothing inevitable about how various parts of this giant “Internet” work and fit together? Is it
really true that Google can’t be made to work differently? Tacitly, of course, the
geeks do acknowledge that there is nothing
permanent about “the Internet”; that’s why they lined up to oppose the Stop Online Privacy Act (SOPA), which—oh,
the irony—threatened to completely alter “how the Internet works.” So, no interventions will work “on the
Internet”—except for those that will. SOPA was a bad piece of legislation, but there’s something odd
about how the geeks can simultaneously claim that the Internet is fixed and permanent and work
extremely hard in the background to keep it that way. Their theory stands in stark contrast to their practice—a common
modern dissonance that they prefer not to dwell on. “The Internet” is also a way to shift the debate away from more
concrete and specific issues, essentially burying it in obscure and unproductive McLuhanism that seeks
to discover some nonexistent inner truths about each and every medium under the sun. Consider how
Nicholas Carr, one of today’s most vocal Internet skeptics, frames the discussion about the impact that digital technologies have on our ability
to think deep thoughts and concentrate. In his best-selling book The Shallows, Carr worries that “the Internet” is making his brain demand “to
be fed the way the Net fed it—and the more it was fed, the hungrier it became.” He complains that “the Net . . . provides a high-speed system
for delivering responses and rewards . . . which encourage the repetition of both physical and mental actions.” The book is full of similar
complaints. For Carr, the brain is 100 percent plastic, but “the Internet” is 100 percent fixed.
Link: Social Networks
Social networks are not inherently good as the affirmative assumes—they sweep the
ill effects under the rug
Morozov 2011 (Evgeny [visiting scholar at Stanford University and a Schwartz fellow at the New America Foundation]; The Net
Delusion; p 254-6; kdf)
But are social networks really goods to be treasured in themselves? After all, the mafia, prostitution and
gambling rings, and youth gangs are social networks, too, but no one would claim that their existence
the physical world is a net good or that it shouldn't be regulated. Ever since Mitch Kapor, one of the founding fathers of
cyber-utopianism proclaimed that "life in cyberspace seems to be shaping up exactly like Thomas Jefferson would have wanted: founded on the
primacy of individual liberty and a commitment to pluralism, diversity, and community" in 1993, many policymakers have been under the
impression that the only networks to find homes online would be those promoting peace and prosperity. But Kapor hasn't read his Jefferson
close!~ enough, for the latter was well aware of the antidemocratic spirit many civil associations, writing that "the mobs of the great cities add
just so much to the support of pure government as sores do to the strength of the human body." Jefferson, apparently, was not persuaded by
the absolute goodness of the "smart mobs;' a fancy term to describe social groups that have been organized spontaneously, usually with the
help of technology. As Luke Allnut, an editor with Radio Free Europe, points out " w
h ere the techno-utopianists are limited in
their vision is that in this great mass of internet users all capable of great things in the name of
democracy, they see only a mirror image of themselves: progressive, philanthropic, cosmopolitan. They
don't see the neo-Nazis, pedophiles, or genocidal maniacs who have networked, grown, and prospered
on the Internet:' The problem of treating all networks as good in themselves is that it allows
policymakers to ignore their political and social effects, delaying effective response to their otherwise
harmful activities. "Cooperation;' which seems to be the ultimate objective of Clinton's network building, is too ambiguous of a term to
build meaningful policy around. A brieflook at history-for example, at the politics of Weimar Germany, where increased civic engagement
helped to delegitimize parliamentary democracy-would reveal that an increase in civic activity does not necessarily deepen democracy.
American history in the post Tocqueville era offers plenty of similar cues as well. The
Ku Klux Klan was also a social network,
after all. As Ariel Armony, a political scientist at Colby College in Maine, puts it, "civic involvement may ... be linked to undemocratic
outcomes in state and society, the presence of a 'vital society' may fail to prevent outcomes inimical to democracy, or it may contribute to such
results:' It's political and economic factors, rather than the ease of forming associations, that primarily set the tone and the vector in which
social networks contribute to democratization; one would be naive to believe that such factors would always favor democracy. For example, if
online social networking tools end up over-empowering various nationalist elements within China, it is quite obvious that the latter's influence
on the direction of China's foreign policy will increase as well. Given the rather peculiar relationship between nationalism, foreign policy, and
government legitimacy in China, such developments may not necessarily be particularly conducive to democratization, especially if they lead to
more confrontations with Taiwan or Japan. Even Manuel Castells, a prominent Spanish sociologist and one of the most enthusiastic promoters
of the information society, has not been sold on the idea of just "letting a thousand networks bloom:' "The Internet is indeed a technology of
freedom;' writes Castells, "but it can make the powerful free to oppress the uninformed" and "lead to the exclusion of the devalued by the
conquerors of value:' Robert Putnam, the famed American political theorist who lamented the sad state of social capital in America in his bestselling Bowling Alone, also cautioned against the "kumbaja interpretation of social capital:' "Networks and associated norms of reciprocity are
generally good for those inside the network;' he wrote, "but the external effects of social capital are by no means always positive:' From the
perspective of American foreign policy, social networks may, indeed, be net goods, but only as long as they don't include anyone hiding in the
caves of Waziristan. When senator after senator deplores the fact that YouTube has become a second home to Islamic terrorists, they hardly
sound like absolute believers in the inherent democratic nature of the networked world. One
can't just limit the freedom to
connect to the pro-Western nodes of the Web, and everyone-including plenty of anti-Western nodes
stands to profit from the complex nature of the Internet. When it comes to democracy promotion, one
major problem with a networked society is that it has also suddenly overempowered those who oppose
the very process of democratization, be they the church, former communists, . or fringe political
movements. As a result, it has become difficult to focus on getting things done, for it's not immediately obvious if the new, networked
threats to democracy are more ominous than the ones the West originally thought to fight. Have the non-state enemies of democracy been
empowered to a greater degree than the previous enemy (i.e., the monolith authoritarian state) has been disempowered? It certainly seems
like a plausible scenario, at least in some cases; to assume anything otherwise is to cling to an outdated conception of power that is
incompatible with the networked nature of the modern world "People routinely praise the Internet for its decentralizing tendencies.
Decentralization and diffusion of power, however, is not the same thing as less power exercised over human beings. Nor is it the same thing as
democracy .... The
fact that no one is in charge does not mean that everyone is free," writes Jack Balkin of Yale Law
School. The authoritarian lion may be dead, but now there are hundreds of hungry hyenas swirling around
the body.
Link: Surveillance
The aff’s rhetoric merely accommodates the expansion of the system —instead
debates should resolve why we allow ourselves to be tracked instead of can the
internet be free
House 2013 (Chatham; NSA is not the enemy, it is Silicon Valley; Dec 16;
www.scienceguide.nl/201312/nsa-is-not-the-enemy,-it-is-silicon-valley.aspx; kdf)
“We are trapped in the vocabulary of Silicon Valley.” Harvard-scholar Evgeny Morozov never shies away from a provocative
standpoint. If we really want to talk privacy, we should start with the fundamentals of democracy. “The
guys from NSA are not the main evil.” Morozov was invited to speak in Amsterdam at the Privacy & Identity LAB conference
about privacy. After scientific director Ronald Leenes gave a worrying illustration of the current privacy debate in the wake of the Snowdentapes, it was Morozov providing the audience with a somewhat opposing view. “We
want to be tracked. Before talking
privacy, we have to find out why we accept to be tracked.” In illustrating his point Morozov gives the example of the ereader. “Kindle is offering a cheaper model in exchange for extra advertisements based on what we read.
It appeals to customers because it’s cheaper or free.” For many companies data has become a goal in itself, and we are
willing to give it to them, Morozov shows. Omnipresent Google Most striking examples are Google and Facebook, both
being omnipresent in our daily life. “If you are not on Facebook and you don’t own a mobile device, you are likely to be on the NSA
list, as you are probably hiding something.” What Morozov wants to say is that we might be worried about privacy issues, but in the meantime
we do not analyze the issue on the terms that it deserves. What happens now, according to Morozov, is that companies
address
customers in a way it becomes profitable to make use of existing data. “Our data is our asset.” Morozov has
been studying the rhetoric with which companies that use of genomic data have addressed customers. This convinced him that we are heading
towards a society in which data can, and will be used to ‘nudge’ people towards good behavior. “These
applications exist because
citizens are stupid.” According to Morozov we are reaching a situation in which policymakers depend on big data and the
use of that data to push citizens towards a desired direction. “But it’s the companies that run the
devices. It sounds like they are innovating. Consumers love it, because they have been convinced this will
help them.” Deliberate ‘citizenship’ The ‘Quantified Self-movement’ is one of the most striking examples of this trend. Applications are
used that measure how much we exercise, and refrigerators that sensor our food patterns. The fundamental underlying question is, according
to Morozov:
“What problem do we want to be tackled by the government and what do we want to do
ourselves.” We have to ask ourselves this question before a totally new market of information exchange
has been established, which is currently under progress. “We should be actively deliberating citizenship,”
Morozov argues thereby criticizing current social movements like the Pirate Party. “The problem with current social movements is that they are
already trapped in the vocabulary of Silicon Valley. The guys from NSA, they are not the main evil.” It
is this rhetoric, in which
citizens are directed to do the ‘good’ thing within the system, without deliberating other systems. “They
say they are just empowering you, but in the meantime, genomic data, social graphs, music data, it’s being presented as being all the same, but
it’s not.” An example of this rhetoric is the use of the word ‘hacking’. Even governments are now organizing so-called hackatons, to get the help
of individuals in streamlining and overcoming current problems. Books have been written like ‘Hack your education’. “Everything can be hacked
nowadays.
It is all about how to better accommodate at the system without thinking about changing the
system, while that might be what we should be worried about.”
Link: Psychoanalysis
The aff’s desire for internet freedom to solve democracy is a fantasy rooted in desire
to solve authoritarianism
Morozov 11 (Evgeny Morozov. Writer and researcher who studies political and social implications of
technology. Senior writer at New Republic. “The Net Delusion.” 2011. P. 5-6.)//EMerz
Iran’s seemed like a revolution that the whole world was not just watching but also blogging, tweeting,
Googling, and YouTubing. It only took a few clicks to get bombarded by links that seemed to shed more
light on events in Iran—quantitatively, if not qualitatively—than anything carried by what technologists
like to condescendingly call “legacy media.” While the latter, at least in their rare punditry-free
moments of serenity, were still trying to provide some minimal context to the Iranian protests, many
Internet users preferred to simply get the raw deal on Twitter, gorging on as many videos, photos, and
tweets as they could stomach. Such virtual proximity to events in Tehran, abetted by access to the highly
emotional photos and videos shot by protesters themselves, led to unprecedented levels of global
empathy with the cause of the Green Movement. But in doing so, such networked intimacy may have
also greatly inflated popular expectations of what it could actually achieve. As the Green Movement lost
much of its momentum in the months following the election, it became clear that the Twitter Revolution
so many in the West were quick to inaugurate was nothing more than a wild fantasy. And yet it still can
boast of at least one unambiguous accomplishment: If anything, Iran’s Twitter Revolution revealed the
intense Western longing for a world where information technology is the liberator rather than the
oppressor, a world where technology could be harvested to spread democracy around the globe rather
than entrench existing autocracies. The irrational exuberance that marked the Western interpretation of
what was happening in Iran suggests that the green-clad youngsters tweeting in the name of freedom
nicely fit into some preexisting mental schema that left little room for nuanced interpretation, let alone
skepticism about the actual role the Internet played at the time. The fervent conviction that given
enough gadgets, connectivity, and foreign funding, dictatorships are doomed, which so powerfully
manifested itself during the Iranian protests, reveals the pervasive influence of the Google Doctrine. But
while the manic surrounding Iran’s Twitter Revolution helped to crystallize the main tenets of the
doctrine, it did not beget those tenets.
AT: Link turn – Aff step in right direction
In the instance of internet policy, the perfect is the enemy of the good – their solution
will ultimately fail
Morozov 2013 (Evgeny [former fellow @ Stanford & Georgetown]; To Save Everything, Click Here:
The Folly of Technological Solutionism; p. post-script; Pro-quest; kdf)
I concluded my previous book, The Net Delusion, with a lengthy discussion of so-called “wicked problems” that don’t have neat and precise
solutions. (Just how bad are “wicked” problems? We don’t even know how to define them; forget about recognizing when they have been
solved.) It
seemed to me that modern authoritarianism—the target of so many “Internet freedom” campaigns—
was one such genuinely hard and barely tractable problem. To expect that a vague concept like “Internet
freedom” could help unseat highly sophisticated authoritarian regimes seemed extremely naïve, if not
outright dangerous. Back when I was finishing that first book in 2010, I was awed both by the immensity of the challenge of unseating
dictators—it probably helped that I hail from Belarus, that oasis of tolerance in the middle of Europe—and the sheer callousness and
utopianism with which this project was pursued in Washington and some European capitals. In retrospect, I realize just how lucky I was to
address a problem that no one—not even Eastern European curmudgeons like me—would dare deny; left, right, or center, we all seem to agree
that there are plenty of awful dictators out there, and the world would surely be better off without them.
How we get to recognize
all these truths is subject for debate—of course, it would be nice if it’s 99 percent blogs and 1 percent bombs, not vice versa—
but few disagree with the basic premise of that project: authoritarianism is real and not particularly
enjoyable for anyone involved. I don’t have the luxury of tackling a clear-cut issue in the current book in that I argue that many
circumstances that solutionists and Internet-centrists see as problems may not be problems at all; gone is the moral simplicity of fighting
authoritarianism. In this book, what’s
truly wicked are not the problems—those may not even exist—but the solutions
proposed to address them. That so much of our cultural life is inefficient or that our politicians are hypocrites or that bipartisanship
slows down the political process or that crime rates are not yet zero—all of these issues might be problematic in some
limited sense, but they do not necessarily add up to a problem worth solving—any more than having a soccer
match that lasts for ninety minutes rather than an eternity and features twenty-two people instead of everyone at the stadium is a problem to
be solved.
We see them as problems, I have argued, more because of the sheer awesomeness of our digital tools than due to the
genuine need to rid our public life of these incoherencies and imperfections. At its most simple, this book argues that perfect is
the enemy of good, that sometimes good is good enough, and that no matter what tool we are holding in our hands, both these
statements still hold. I have little doubt that the solutionist impulse, in its various mutations, will survive the current
excitement over “the Internet” and latch on to some later ideology or political project. As confident as I am in
my ability to take down unworthy ideas, I don’t think I can do much about solutionism—at least, no more than I can
do something about utopianism or romanticism. Occasionally, they might have their uses, but all three also have a long history of
abuse. While we can’t rid the world of people who want to “fix” politics, we can at least ridicule those who
want to do so by subjecting politics to “lessons learned” from Wikipedia or even “the Internet” as a
whole. While we can’t rid ourselves of solutionism, we can try to rid ourselves of Internet-centrism, thereby making
certain solutionist schemes harder to advocate and, hopefully, impossible to implement.
AT: Link Turn – Aff mobilizes dissent
Their politics undermines what it means to be human – this has blunted the ability for
dissent to be possible
Morozov 2013 (Evgeny [former fellow @ Stanford & Georgetown]; To Save Everything, Click Here:
The Folly of Technological Solutionism; p. Introduction; Pro-quest; kdf)
So perhaps we should seriously entertain the possibility that Silicon Valley will have the means to accomplish some of its craziest plans.
Perhaps it won’t overthrow the North Korean regime with tweets, but it could still accomplish a lot. This
is where the debate ought to shift to a different register: instead of ridiculing the efficacy of their
means, we also need to question the adequacy of the innovators’ ends. My previous book, The Net Delusion, shows
the surprising resilience of authoritarian regimes, which have discovered their own ways to profit from digital technologies. While I was—and
remain—critical of many Western efforts to promote “Internet freedom” in those regimes, most
of my criticisms have to do with
the means, not the ends, of the “Internet freedom agenda,” presuming that the ends entail a better
climate for freedom of expression and more respect for human rights. In this book, I have no such luxury, and I
question both the means and the ends of Silicon Valley’s latest quest to “solve problems.” I contend here that
Silicon Valley’s promise of eternal amelioration has blunted our ability to do this questioning. Who today
is mad enough to challenge the virtues of eliminating hypocrisy from politics? Or of providing more information—the direct result of selftracking—to facilitate decision making? Or of finding new incentives to get people interested in saving humanity, fighting climate change, or
participating in politics? Or of decreasing crime? To question the appropriateness of such interventions, it seems, is to question the
Enlightenment itself. And yet I feel that such questioning is necessary. Hence the premise of this book: Silicon Valley’s quest to fit
us all into a digital straightjacket by promoting efficiency, transparency, certitude, and perfection—and, by extension, eliminating their evil
twins of friction, opacity, ambiguity, and imperfection—will prove to be prohibitively expensive in the long run. For various ideological reasons
to be explained later in these pages, this
high cost remains hidden from public view and will remain so as long as
we, in our mindless pursuit of this silicon Eden, fail to radically question our infatuation with a set of
technologies that are often lumped together under the deceptive label of “the Internet.” This book, then,
attempts to factor in the true costs of this highly awaited paradise and to explain why they have been so hard to account for. Imperfection,
ambiguity, opacity, disorder, and the opportunity to err, to sin, to do the wrong thing: all of these are
constitutive of human freedom, and any concentrated attempt to root them out will root out that freedom as well. If we don’t
find the strength and the courage to escape the silicon mentality that fuels much of the current quest
for technological perfection, we risk finding ourselves with a politics devoid of everything that makes
politics desirable, with humans who have lost their basic capacity for moral reasoning, with lackluster (if
not moribund) cultural institutions that don’t take risks and only care about their financial bottom lines, and,
most terrifyingly, with a perfectly controlled social environment that would make dissent not just impossible
but possibly even unthinkable. The structure of this book is as follows. The next two chapters provide an outline and a critique of
two dominant ideologies—what I call “solutionism” and “Internet-centrism”—that have sanctioned Silicon Valley’s great ameliorative
experiment. In the seven ensuing chapters, I trace how both ideologies interact in the context of a particular practice or reform effort:
promoting transparency, reforming the political system, improving efficiency in the cultural sector, reducing crime through smart environments
and data, quantifying the world around us with the help of self-tracking and lifelogging, and, finally, introducing game incentives—what’s
known as gamification—into the civic realm. The last chapter offers a more forward-looking perspective on how we can transcend the
limitations of both solutionism and Internet-centrism and design and employ technology to satisfy human and civic needs. Now, why oppose
such striving for perfection? Well, I believe that not everything that could be fixed should be fixed—even if the latest technologies make the
fixes easier, cheaper, and harder to resist. Sometimes, imperfect is good enough; sometimes, it’s much better than perfect. What worries me
most is that, nowadays, the very availability of cheap and diverse digital fixes tells us what needs fixing. It’s quite simple: the more fixes we
have, the more problems we see. And yet, in our political, personal, and public lives—much like in our computer systems—not all bugs are
bugs; some bugs are features. Ignorance can be dangerous, but so can omniscience: there is a reason why some colleges stick to need-blind
admissions processes. Ambivalence can be counterproductive, but so can certitude: if all your friends really told you what they thought, you
might never talk to them again. Efficiency can be useful, but so can inefficiency: if everything were efficient, why would anyone bother to
innovate? The ultimate goal of this book, then, is to uncover the attitudes, dispositions, and urges that comprise the solutionist mind-set, to
show how they manifest themselves in specific projects to ameliorate the human condition, and to hint at how and why some of these
attitudes, dispositions, and urges can and should be resisted, circumvented, and unlearned. For only
by unlearning solutionism—
that is, by
transcending the limits it imposes on our imaginations and by rebelling against its value
system—will we understand why attaining technological perfection, without attending to the intricacies
of the human condition and accounting for the complex world of practices and traditions, might not be
worth the price.
AT: Aff = Democracy
Empirically wrong
Bailard 2014 (Catie [Assist Prof of Media and Pubic Affairs @ George Washington; Catie received her
doctorate in political science from UCLA with concentrations in American Politics, Formal and
Quantitative Methods, and International Relations]; The other Facebook Revolution;
www.foreignaffairs.com/articles/142351/catie-bailard/the-other-facebook-revolution?cid=rss-rss_xmlthe_other_facebook_revolution-000000; kdf)
Empirical testing confirms that the Internet has clear and consistent influence on how citizens feel about their governments. As one might
expect, the mirror-holding and window-opening mechanisms boost public satisfaction with government in advanced democracies and public
dissatisfaction in nations with weak democratic practices. However, research also demonstrates that the
Internet’s effect is
neither automatic nor uniform—one democratic gain, such as more critical evaluations of poor-performing governments, does
not automatically set off a domino effect of entirely pro-democratic gains in citizens’ attitudes and
behaviors. Take Tanzania, for example, where I conducted a randomized field experiment to test the effect of Internet use on
evaluations of the 2010 general election. Although the Internet offered plentiful information about the
questionable integrity of a then-upcoming national election, the results of the experiment revealed that
Tanzanians with access to that information also became less likely to vote. After all, the belief that an election
would not be fair can produce two very divergent responses—although some people may feel inclined to respond by taking to the streets,
others may simply throw up their hands and stay home. Meanwhile, another
randomized field experiment that I conducted
in Bosnia and Herzegovina revealed that Internet users there who became more dissatisfied with the
quality of democratic practices in their country also became more likely to consider alternative forms of
government as preferable for their country. Taken as a whole, then, this research reveals that the Internet’s influence is
complex, and that in some instances it will have ambiguous effects for democracy and democratization. The effects of Internet use
on political evaluations tend to be particularly profound in hybrid regimes—governments that, despite being firmly
authoritarian, allow some form of so-called elections for various offices. In many cases, such elections are exercises in futility, the outcome
already determined by the ruling party regardless of what the ballots say. Although
outsiders may take for granted that
these elections are largely shams, however, citizens living in these countries often invest significant value in
them. This was demonstrated in the build-up to the Egyptian Revolution of 2011, during which a segment of the public that
was originally angered by police brutality became further incensed by ostensibly rigged parliamentary elections, eyewitness accounts of which
were amplified by videos uploaded and distributed online. It wasn't long before citizens began expressing their discontent by protesting in the
streets and demanding a change in the regime. Moreover, even in instances that do not result in tangible political activity, the effects of
Internet use on political evaluations and satisfaction have important implications for the day-to-day business of governance. Quite simply,
governments—democratic, democratizing, and nondemocratic alike—are aware that they have lost some degree of control over information
compared to what they enjoyed in the era of traditional media. As a result, they know that there is greater potential for their decisions and
actions to be broadcast on the national, and even international, stage, a venue and context that they have diminished control over. Thus,
leaders are forced, to varying degrees, to consider the potential activation of latent public opinion when making political decisions in ways that
they never had to previously. It is regrettable, if not entirely surprising, that, aside from a handful of notable exceptions, scholars
and
other political observers mostly failed to anticipate the Arab Spring. Many tried to make up for it by
focusing renewed effort on the role played by the Internet in the wave of political upheaval that
subsequently swept across the Middle East and North Africa. But they would be wise to focus on what
has largely remained a blind spot in scholarly research: the effects of Internet use on the very political
evaluations that can, and sometimes do, precipitate political action and organization.
AT: Aff -> Transparency/Oversight
Neoliberalism guarantees that internet freedom will not expand internet liberties
Power and Jablonski 2015 (Shawn M [Assistant Professor of Communication at Georgia State
University] and Michael [attorney and presidential fellow in communication at Georgia State University];
The Real Cyber War; University of Illinois Press; p. 201; kdf)
So, where did the principle of secrecy of correspondence go? Codified in international and domestic laws, how was the norm not considered
parallel to, if not more important than, protections for free speech online? Looking back, Clinton’s
articulation of the internetfreedom paradigm—which inculcated the internet as a shared, public space—wasn’t simply lofty neoliberal rhetoric. It
was, as is alluded to in the beginning of this chapter, a deliberate framing of human rights online that protects free
speech but not the anonymity of that speech or the secrecy of one’s communications. According to Western
legal doctrine, once one enters a shared, public space, their individual rights are curtailed in order to
preserve the security and integrity of that space. For example, in a public park, it is perfectly legitimate for a government to
monitor your behavior and listen to your conversations. Mail, on the other hand, is considered a specific transmission of information between
two or more people, and is afforded robust protections from government intrusions on the content of the messages. The content of telephone
calls, too, is typically considered private, unless they take place in a public place. International treaties and organizations were founded and
continue to provide oversight to ensure the secrecy of correspondence, as long as that correspondence takes place via traditional, twentiethcentury means of communicating. So why wouldn’t analogous attempts to communicate, when taking place via the internet, be afforded
similar types of protections? The answer, as is outlined in careful detail in the preceding chapters, comes down to economics and geopolitics.
By exempting information exchanged online from the privacy protections afforded to other types of
communication, the modern internet economy was born. Targeted advertising accounts for the vast
majority of internet revenue. It is a technique incompatible with the principle of secrecy of
correspondence. If correspondence (and browsing) remained secret, internet companies couldn’t promise
advertisers that their ads will be effective. Advertisers would thus revert to traditional mass communication platforms to reach
their potential consumers. The modern internet economy is dependent on gathering and analyzing individual
user behavior and benefits a handful of Western countries and companies (chapter 4)
AT: Perm –Internet Centrism
Permutation carries the baggage of internet centrism – only rejection solves
Morozov 2013 (Evgeny [former fellow @ Stanford & Georgetown]; To Save Everything, Click Here:
The Folly of Technological Solutionism; p. With Models like this…; Pro-quest; kdf)
To quote Green and Shapiro again, rational-choice theory turns “a dispassionate search for the causes of political outcomes into brief-writing
on behalf of one’s preferred theory. If one is committed—in advance of empirical research—to a certain theory of politics, then apparent
empirical anomalies will seem threatening to it and stand in need of explaining away.” This is perhaps the best summary of what’s so wrong
with much of contemporary Internet-biased theorizing about politics. The models that Shirky and his disciples rely on, while nominally about
“the Internet,” do smuggle in a “certain theory of politics”—a theory of citizens responding to incentives and clinging together if they get the
right signals and have the right tools—which is awfully simplistic to account for political developments in much of the world. Nowhere does
Shirky allude to the heavy intellectual baggage that comes with his methods; in fact, he just recasts Lohmann as a historian, so a theory of
information cascades becomes something of a legitimate historical narrative rather than a reductionist model of human behavior. Any
anomalies that do turn up—the findings that dictators are extremely smart in using the same technologies, or that people don’t always respond
to incentives, or that forces like nationalism and religion are exerting a profound and unpredictable influence on how people behave and are
themselves transformed by technology—are simply dismissed as technophobic pessimism. In a true Hegelian dialectic spirit, Internet-centrism
sustains itself through the binary poles of Internet pessimism and Internet optimism, presenting (and eventually consuming) any critique of
itself as yet another manifestation of these two extremes. To
challenge this ideology and this way of talking and thinking
is to be immediately dismissed as too pessimistic or optimistic, as if no other type of critique were even
conceivable. It’s one of the hallmarks of Internet-centrism—at least as it manifests itself in the popular debate—that it
brooks no debates about methodology, for it presumes that there’s only one way to talk about “the
Internet” and its effects. Shirky’s veneration of Ronald Coase’s theory of the firm—and its accompanying discourse on transaction
costs—may seem harder to dismiss, not least because Coase is a Nobel Prize–winning economist. References to Coase pop up regularly in the
work of our Internet theorists; in addition to Clay Shirky, Yochai Benkler also draws heavily on Coase to discuss the open-source movement.
There is nothing wrong with Coase’s theories per se; in the business context, they offer remarkably useful explanations and have even helped
spawn a new branch of economics. But here is the problem: thinking of a Californian start-up in terms of transaction costs is much easier than
pulling the same trick for, say, the Iranian society. While it seems noncontroversial to conclude that cheaper digital technologies might indeed
lower most so-called transaction costs in Iran, that insight doesn’t really say much, for unless we know something about Iran’s culture, history,
and politics, we know nothing about the contexts in which all these costs have supposedly fallen. Who are the relevant actors? What are the
relevant transactions? In the absence of such knowledge about Iran, the
natural reflex is to opt for the simplest possible
model: imagine a two-way split between the government and the dissidents and then think through
how their own transaction costs may have fallen thanks to “the Internet.” This seems like a rather perfunctory way
of talking about a rather complex subject. Cue Don Tapscott, a popular Internet pundit, proclaiming that “the Internet not only drops
transaction and collaboration costs in business—it also drops the cost of collaboration in dissent,
rebellion and even in insurrection.” Okay—but is no one else in these countries collaborating or engaging in transactions? Is it just
the dissidents? Are the dissidents united? Or do they all have different agendas? Internet-centric explanations, at least in their
current form, greatly impoverish and infantilize our public debate. We ought to steer away from them as
much as possible. If doing so requires imposing a moratorium on using the very term “Internet” and
instead going for more precise terminology, like “peer-to-peer networks” or “social networks” or “search engines,” so be it.
It’s the very possibility that the whole—that is, “the Internet”—is somehow spiritually and politically greater
than the sum of these specific terms that exerts such a corrosive influence on how we think about the
world.
AT: Perm—Neolib
The left must withdraw from capitalist politics in order to avoid the inevitable
destruction of the biosphere by capitalism—the permutation merely furthers a
contradiction of capitalism, damning the alternative
Harvey 2014 (David [the Distinguished Professor of Anthropology and Geography at the Graduate
Center of the City University of New York]; Seventeen Contradictions and the End of Capitalism; Oxford
University Press; p. 110-111; kdf)
The political problem posed by the question of technology for anti-capitalist struggle is perhaps the most difficult to confront. On the one hand
we know all too well that the evolution of technologies, marked as it is by a good deal of autonomous 'combinatorial' logic of the sort that
Arthur describes, is a form of big business in which class struggle and inter-capitalist and interstate competition have played leading roles for
capital's
actions are steering closer and closer to the abyss of the loss of social labour as an underlying regulatory
principle that prevents the descent of capital into lawlessness. On the other hand we also know that any
struggle to combat worldwide. environmental degradation, social inequalities and impoverishment,
perverse population dynamics, deficits in global health, education and nutrition, and military and
geopolitical tensions will entail the mobilisation of many of our currently available technologies to
achieve non-capitalistic social, ecological and political ends. The existing bundle of technologies, saturated as they are in
the 'human purpose' of sustaining military dominance, class power and perpetual accumulation of capital. We also see that
the mentalities and practices of capital's search for class domination, contains emancipatory potentialities that somehow have to be mobilised
in anti-capitalist struggle. In
the short term, of course, the left is bound to defend jobs and skills under threat. But, as
the miserable history of the noble rearguard action fought against deindustrialisation in the 1970s and 198os demonstrates, this will likely
be a losing battle against a newly emerging technological configuration from the very beginning. An anticapitalist movement has in the current conjuncture to reorganise its thinking around the idea that social
labour is becoming less and less significant to how the economic engine of capitalism functions. Many of
the service, administrative and professional jobs the left currently seeks to defend are on the way out. Most of the world's
population is becoming disposable and irrelevant from the standpoint of capital, which will increasingly rely upon
the circulation of Technology, Work and Human Disposability fictitious forms of capital and fetishistic constructs of value centred on the money
form and within the credit system. As is to be expected, some populations are held to be more disposable than others, with the result that
women and people of colour bear most of the current burden and will probably do so even more in the foreseeable future. 13 Martin Ford
correctly poses the question: how will the resultant disposable and redundant population live (let alone provide a market) under such
conditions? A viable long-term and imaginative answer to this question has to be devised by any anti-capitalist movement. Commensurate
organised action and planning to meet the new eventualities and the provision of sufficient use values must be thought through and gradually
implemented. This has to be done at the same time as the
left has also to mount a rearguard action against the
technologies of increasingly predatory practices of accumulation by dispossession, further bouts of
deskilling, the advent of permanent joblessness, ever-increasing social inequality and accelerating
environmental degradation. The contradiction that faces capital morphs into a contradiction that
necessarily gets internalised within anti-capitalist politics.
Alt - Secularize the internet
Only secularization of the internet can solve
Morozov 2013 (Evgeny [former fellow @ Stanford & Georgetown]; To Save Everything, Click Here:
The Folly of Technological Solutionism; p. Recycle the Cycle; Pro-quest; kdf)
So our
survey of Internet-centrism paints a rather depressing picture. The very idea of “the Internet” has
not merely become an obstacle to a more informed and thorough debate about digital technologies. It has also
sanctioned many a social and political experiment that tries to put the lessons of “the Internet” to good
use. It has become the chief enabler of solutionism, supplying the tools, ideologies, and metaphors for its
efficiency crusades. Internet-centrism has rendered many of us oblivious to the fact that a number of these efforts are driven by old and
rather sinister logics that have nothing to do with digital technologies. Internet-centrism has also mangled how we think
about the past, the present, and the future of technology regulation. It has erroneously convinced us that
there are no other ways to talk about these issues without downplaying their importance. Internet-centrism
has been tremendously helpful for activist purposes—it has rekindled (and occasionally created) geek religious movements that have been
crucial to opposing government regulation of digital technologies. But what
has been gained in activist efficacy has been
lost in analytical clarity and precision. Internet-centrism’s totality of vision, its false universalism, and its
reductionism prevent us from a more robust debate about digital technologies. Internet-centrism has
become something of a religion. To move on, we need, as French media scholar Philippe Breton put it, “a ‘secularization’
of communication.” Such secularization can no longer be postponed. We need to find a way to
temporarily forget everything we know about “the Internet”—we take too many things for granted these days—roll
up our sleeves, and work to ensure that technologies do not just constrain human flourishing but also
enable it. The chapters that follow apply this secularized approach to contexts as different as politics and crime prevention not just to
illustrate what happens once solutionism meets Internet-centrism but also to think through a more productive civic use of technologies so
beloved by solutionists.
Alt – Social Construct Args
Their epistemology is bankrupt – vote neg on presumption
Morozov 2013 (Evgeny [former fellow @ Stanford & Georgetown]; To Save Everything, Click Here:
The Folly of Technological Solutionism; p. post-script; Pro-quest; kdf)
On the odd chance that this book succeeds, its greatest contribution to the public debate might lie in
redrawing the front lines of the intellectual battles about digital technologies. Those front lines will
separate a host of Internet thinkers who are convinced that “the Internet” is a useful analytical category
that tells us something important about how the world really works from a group of post-Internet
thinkers who see “the Internet,” despite its undeniable physicality, as a socially constructed concept that could perhaps
be studied by sociologists, historians, and anthropologists—much as they study the public life of ideas such as “science,” “class” or
“Darwinism”—but that tells us nothing about how the world works and even less about how it should work. The
former group thinks
that “the Internet” is the key to solving some of the greatest policy puzzles of the day; the latter thinks
that “the Internet” is only confusing policymakers more and that the sooner digital activists learn how to
make their arguments without appealing to “the Internet,” the better. Since my own theoretical sympathies should be
quite clear by now—I’m with the second camp, in case you fell asleep at the wheel—I won’t bore you with the details of how I think the first
camp will come down in flames. Instead, I’d rather use this opportunity to articulate a very broad outline of what this second, post-Internet
approach to technology might look like and what its preoccupations might be. First, it
would abstain from the highly emotional
and polemical discussions over what “the Net” or even “social media” do to our brains, freedom, and
dictators. This post-Internet approach is much more interested in the world of trash bins and parking
meters in our mundane everyday lives than in the role of Twitter in the Arab Spring—and not because it’s
parochial in outlook but because it doesn’t believe in the power of such ambitious and ambiguous questions. The role of Twitter’s algorithms in
highlighting the #Jan25 hash tag, which brought some global attention to the cause of the protesters in Tahrir Square, on the other hand, is fair
game. Will a viral TED talk emerge out of this second approach? Probably not; its
findings won’t be very sexy, and it won’t
default to some banal abstract truth about “democracy” or the “Middle East.” On the whole, though, this highly
empirical but small-scale approach will probably tell us more about the opportunities and limitations of digital technologies than the entire
“Does social media cause revolutions?” debate that wasted so much of everyone’s time—including mine—in
early 2011. Those pursuing this post-Internet approach will be extremely cautious—even skeptical—about any causality claims made with
respect to digital technologies. They will recognize that, more often than not, these technologies are not the causes of the world we live in but
rather its consequences. The
post-Internet approach will not treat these digital technologies as if they fell from
the sky and we should therefore not—God forbid—question their origins and only study their impact. Instead,
those relying on a post-Internet approach will trace how these technologies are produced, what voices and ideologies are silenced in their
production and dissemination, and how the marketing literature surrounding these technologies taps into the zeitgeist to make them look
inevitable. Internet theorists looking at, say, MP3 technology will think “Napster”—that quintessential “Internet technology”—and start their
account from the mid-1990s; post-Internet theorists looking at MP3 technology will think of the history of sound compression and start their
account in the 1910s (as Jonathan Sterne has done in his recent MP3: The Meaning of a Format). Internet theorists studying search engines will
begin with Stanford and Google perhaps, with a cursory mention of Vannevar Bush’s memex; post-Internet theorists will look much further
back than that, unearthing such obscure figures as Albert Kahn (and his effort to create “The Archives of the Planet” through photographs), as
well as Paul Otlet and Henri La Fontaine with their Mundaneum, an attempt to gather all the world’s knowledge. This list can go on indefinitely,
but the trend is clear: one unexpected benefit of a post-Internet approach is that it deflates the shallow and historically illiterate accounts that
dominate so much of our technology debate and opens them to much more varied, rich, and historically important experiences. Once we
realize that for the last hundred years or so virtually every generation has felt like it was on the edge of a technological revolution—be it the
telegraph age, the radio age, the plastic age, the nuclear age, or the television age—maintaining the myth that our own period is unique and
exceptional will hopefully become much harder. Perhaps, this will make it all but impossible for solutionists to mobilize revolutionary rhetoric
to justify their radical plans to the public. Once
we move to a post-Internet world, there is a small chance that our
no longer get away with proclaiming something a
revolution and then walking away without supplying good, empirical evidence—as if that revolution were so selftechnology pundits (and perhaps even some academics) will
evident and no further proof was needed. I too used to be one of those people—albeit very briefly—sometime between 2005 and 2007. I
remember perfectly the thrill that comes from thinking that the lessons of Wikipedia or peer-to-peer networking or Friendster or Skype could
and should be applied absolutely everywhere. It’s a very powerful set of hammers, and plenty of people—many of them in Silicon Valley—are
dying to hear you cry, “Nail!” regardless of what you are looking at. Thinking that you are living through a revolution and hold the key to how it
will unfold is, I confess, rather intoxicating. So I can relate to those Internet thinkers who feel extremely comfortable with the current state of
debate, even though I can probably not forgive them. This book, I hope, has shown that most Internet theorists venerate an imaginary god of
their own creation and live in denial. Secularizing our technology debate and cleansing it of the pernicious influence of Internet-centrism is by
far the most important task that technology intellectuals face today. Everything else—especially particular policies—hinges on how such
secularization proceeds, if it does so at all. Consider one example from what used to be my own favorite field: what
exactly is the point
of operating with a term like “Internet freedom” if the very idea of “the Internet” is contested and full of
ambiguity? Discussing the particulars of the “Internet freedom agenda” without resolving the many
contradictions in its initial formulation seems counterproductive to me, as it might only legitimize that
concept further. Once our debate moves into post-Internet territory, many of the technophobic,
ahistorical accounts will hopefully become harder to pull off as well. If “the Internet” is no longer seen as
a unified force that acts on our brains or our culture, any account of what digital technologies do to our neurons or books
will need to get empirical and start talking about individual technologies and individual practices, perhaps with a nod to how such practices
evolved and coped in the past. So far, we
get none of that: we are told that “the Net” is rewiring our brains, which
is not at all a good starting point for debate. After all, so what if it’s rewiring our brains? And what should
we do about “the Net” anyway? It stirs fears alright, but we quickly get mired in cheap populism. If technophobic accounts do
become harder to produce, then there’s also a small chance we will be able to have a meaningful debate about not just the appropriateness of
technological fixes to a given problem but also about the desirability of particular technological fixes. Once we can’t reject technology outright,
we’ll need to explain why some fixes are better than others. If it makes us think and ask questions, it is a worthy enterprise all by itself.
Technology is not the enemy; our enemy is the romantic and revolutionary problem solver who resides
within. We can do nothing to tame that little creature, but we can do a lot to tame its favorite weapon:
“the Internet.” Let’s do that while we can—it would be deeply ironic if humanity were to die in the crossfire as its problem solvers
attempted to transport that very humanity to a trouble-free world.
Alt – Discourse First
The discourse of internet freedom is used to legitimate the expansion of the state and
corporations into the internet
Power and Jablonski 2015 (Shawn M [Assistant Professor of Communication at Georgia State
University] and Michael [attorney and presidential fellow in communication at Georgia State University];
The Real Cyber War; University of Illinois Press; p. 206-7; kdf)
Turning to civil society, activists and academics alike need
to be much more cautious in their use and defense of
internet-freedom discourse. This is not to suggest that they should abandon the idea of internet freedom altogether; quite the
contrary. Instead, this analysis shows how the internet-freedom narrative is used to legitimize a particular geostrategic vision of the Web that has little to do with the foundational principles of internet freedom,
including freedom of expression and net neutrality. Activists and defenders of the original vision of the Web as a “fair and
humane” cyber-civilization need to avoid lofty “internet freedom” declarations and instead champion
specific reforms required to protect the values and practices they hold dear. Additional research is also needed to
identify how specific corporate policies undermine freedom online, and which institutional arrangements
allow for governments and companies to weaken the integrity of the Web. Civil-society groups need to be much
more critical of the consensus-building processes upon which multistakeholder institutions base their legitimacy (chapter 5). While this book
examined just three case studies—ICANN, IETF, and ISOC—the findings were especially troubling for civil-society groups aiming to influence
policy change. Multistakeholder processes may actually be worse than the alternative from the perspective of certain aspects of civil society.
Not only is legitimate dissent stifled, but discourses of inclusion and openness lend legitimacy to
institutions that protect the interests of powerful corporations and governments. At the same time, the promise
of multistakeholderism need not be abandoned in total. Clearer demarcations between commercial and political interests and internet
governance decision-making bodies would be a first step in ensuring these institutions are not simply legitimizing the actions of powerful
strategic actors. The combination of these four lines of conceptual inquiry—history, social totality, moral philosophy, and praxis—offers clear
insight into what we describe as the “real cyber war.” At
the center of debates over internet freedom, information
sovereignty, global surveillance, and digital protectionism is a single question that, despite its
significance, is too often overlooked: What authority (or responsibility) do states have to manage the flow of
information into and within their sovereign borders? The ongoing competition of narratives offering visions for how global
information flows should be governed is central to any discussion of cyber war, as its result will shape the use and scale of cyber weapons,
espionage, piracy, and rights in the twenty-first century. The outcome of this “war” is far from clear. Despite numerous international
conventions guaranteeing citizens everywhere “the right to freedom of opinion and expression . . . regardless of frontiers,”4 the multitude of
perspectives, ranging from the absolute free flow of information to an absolute sovereignty approach, with many variations in between,
indicate how far we remain from a establishing a consensus.
Alt – Solves/AT: Cap Inev
We should not give into the temptation to act within the confines of the aff- instead
we should seize the opportunity to alienate capital and develop an anti-capitalist
project
-AT: Cap inev: “capital can probably continue to function indefinitely but in a manner that will provoke
progressive degradation on the land and mass impoverishment, dramatically increasing social class
inequality, along with dehumanisation of most of humanity, which will be held down by an increasingly
repressive and autocratic denial of the potential for individual human flourishing”
Harvey 2014 (David [Distinguished Professor of Anthropology and Geography at the Graduate Center
of the City University of New York]; Seventeen Contradictions and the End of Capitalism; Oxford
University Press; p. 218-221; kdf)
The moving contradictions evolve differentially and provide much of the dynamicforce behind capital's historical and geographical evolution. In
some instances their movement tends to be progressive (though never without reverses here and setbacks there). Technological change has by
and large been cumulative, as has the geographical production of space, though in both instances there are strong countercurrents and
reversals. Viable technologies get left behind and fade away, spaces
and places that were once vigorous centres of
capitalist activity become ghost towns or shrinking cities. In other instances the movement is more like a pendulum, as
between monopoly and competition or the balance between poverty and wealth. And elsewhere, as in the case of freedom and domination,
the movement is more chaotic and random, depending upon the ebb and flow of political forces in struggle with one another, while in still
other instances, such as the complex field of social reproduction, the intersections between the historical evolution of capitalism and the
specific requirements of capital are so indeterminate and intermingled as to make the direction and strength of movement episodic and rarely
consistent. The
advances (for such they are) in the rights of women, of the handicapped, of sexual minorities
(the LGBT social group), as well as of religious groupings that have strict codes on various facets of social
reproduction (such as marriage, family, childrearing practices and the like), make it hard to calculate exactly how capital
and capitalism are or are not working with or against each other in terms of foundational contradictions.
And if this is true of the contradictions of social reproduction, it is even more so in the complex case of
domination and freedom. The patterning of the moving contradictions provides much of the energy and
much of the innovative zest in the co-evolution of both capital and capitalism and opens a wealth (and I
use that word advisedly as meaning a potential flourishing of human capabilities rather than of mere possessions) of possibilities for
new initiatives. These are the contradictions and spaces in which hope for a better society is latent and from which alternative
architectures and constructions might emerge. As in the case of foundational contradictions, the moving contradictions intersect, interact and
run interference with each other in intriguing ways within the totality of what capital is about. The production of space and the dynamics of
uneven geographical development have been strongly impacted by technological changes in both organisational forms (for example, of state
apparatuses and territorial forms of organisation) and technologies of transportation and the production of space. It is within the field of
uneven geographical development that differentiations in social reproduction and in the balance between freedom and domination flourish to
the point where they in themselves become part of the production of space and of uneven development. The
creation of heterotopic
spaces, where radically different forms of production, social organisation and political power might
flourish for a while, implies a terrain of anti-capitalist possibility that is perpetually opening and shutting
down. It is here too that questions of monopoly and centralisation of power versus decentralisation and competition play out to influence
technological and organisational dynamism and to animate geopolitical competition for economic advantage. And it goes without saying that
the balance between poverty and wealth is constantly being modified by interterritorial competition, migratory streams and competitive
innovations regarding labour productivities and the creation of new product lines. It
is within the framework of these
interactive and dynamic contradictions that multiple alternative political projects are to be found. Many of
these are constituted as distinctive responses of capital to its own contradictions and are therefore primarily directed to facilitate the
reproduction of capital under conditions of perpetual risk and uncertainty if not outright crises. But even
in these instances there lie
innumerable possibilities for the insertion of initiatives that so modify the functioning of capital as to
open perspectives on what an anti-capitalist alternative might look like. I believe, as did Marx, that the future is
already largely present in the world around us and that political innovation (like technological innovation) is a
matter of putting existing but hitherto isolated and separated political possibilities together in a
different way. Uneven geographical developments cannot but generate 'spaces of hope' and heterotopic situations where new
modes of cooperation might flourish, at least for a while, before they get reabsorbed into the dominant practices of capital.
New technologies (like the internet) open up new spaces of potential freedom from domination that can advance the cause of democratic
governance. Initiatives
in the field of social reproduction can produce new political subjects desirous of
revolutionising and humanising social relations more generally and cultivating a more aesthetically
satisfying and sensitive approach to our metabolic relation to nature. To point to all these possibilities is not to say
they will all bear fruit, but it does suggest that any anti-capitalist politics has to be assiduous in hunting
through the contradictions and ferreting out its own path towards the construction of an alternative
universe using the resources and ideas already to hand. This then brings us to the dangerous, if not potentially fatal,
contradictions. Marx is famously supposed to have said that capital would ultimately collapse under the weight of its own internal contradictions.
I cannot actually find where Marx said this, and from my own reading of him I think it extremely unlikely that he would ever have said such a
thing. It presupposes a mechanical breakdown of the economic engine of capitalism that will occur without any human agent throwing sand in
the machine or militantly setting about halting its progress and replacing it. Marx's position, and I broadly follow him in this (against certain
currents in the Marxist/communist tradition, as well as against the grain of the views his many critics typically attribute to him), is that capital
can probably continue to function indefinitely but in a manner that will provoke progressive degradation
on the land and mass impoverishment, dramatically increasing social class inequality, along with
dehumanisation of most of humanity, which will be held down by an increasingly repressive and
autocratic denial of the potential for individual human flourishing (in other words, an intensification of the totalitarian
police-state surveillance and militarised control system and the totalitarian democracy we are now largely experiencing). The resultant
unbearable denial of the free development of human creative capacities and powers amounts to throwing away the cornucopia of possibilities
that capital had bequeathed us and squandering the real wealth of human possibilities in the name of perpetual augmentation of monetary wealth
and the satiation of narrow economic class interests. Faced with such a prospect, the only sensible
politics is to seek to
transcend capital and the restraints of an increasingly autocratic and oligarchical structure of capitalist
class power and to rebuild the economy's imaginative possibilities into a new and far more egalitarian
and democratic configuration. The Marx I favour is, in short, a revolutionary humanist and not a teleological determinist. Statements
can be found in his works that support the latter position, but I believe the bulk of his writings, both historical and political-economic, support the
is for this reason that I reject the idea of 'fatal' in favour of 'dangerous' contradictions,
for to call them fatal would convey a false air of inevitability and cancerous decay, if not of apocalyptic
mechanical endings. Certain contradictions are, however, more dangerous both to capital and to humanity than others. These vary from
former interpretation. It
place to place and from time to time. Were we writing about the future of capital and humanity fifty or a hundred years ago, we would very likely
have focused on different contradictions from those which I focus on here. The environmental issue and the challenge of maintaining compound
growth would not have called for that much attention in 1945, when settling the geopolitical rivalries and rationalising processes of uneven
geographical development, all the while rebalancing (through state interventions) the contradictory unity between production and realisation,
were far more salient questions. The three contradictions I focus on here are most dangerous in the immediate present, not only for the ability of
the economic engine of capitalism to continue to function but also for the reproduction of human life under even minimally reasonable
conditions. One of them, but just one of them, is potentially fatal. But it will turn out so only if a revolutionary movement arises to change the
evolutionary path that the endless accumulation of capital dictates. Whether or not such a revolutionary spirit crystallises out to force radical
changes in the way in which we live is not given in the stars. It depends entirely on human volition. A first
step towards exercising
that volition is to become conscious and fully aware of the nature of the present dangers and the
choices we face.
. The argument that we cannot overcome capitalism saps the critical energy from the
alternative – the system is only strong because we think it is—this locks the aff into
the politics of melancholy
Zizek in 8 (Slavoj, [writes a lot of books], Defense of Lost Causes, Verso, p. 391-4, kdf)
Progressive liberals today often complain that they would like to join a "revolution" (a more
radical emancipatory political movement), but no matter how desperately they search for it, they
just "do not see it" (they do not see anywhere in the social space a political agent with the will and strength to
seriously engage in such activity). While there is a moment OF truth here, one should nonetheless also add that the
very attitude of these liberals is in itself part of the problem: if one just w aits to
"see" a revolutionary movement, it will, of course, never arise, and one will never see it.
What Hegel says about the curtain that separates appearances from true reality (behind the veil of appearance t here
is nothing, only what the subject who is searching has put there), holds also for a revolutionary proc ess:
"s e ei n g" a n d " d esi re" a re here i n e xt ric a bl y li nk ed, in ot her wo r d s , r e v o l u t i o n a r y p o t e n t i a l i s n o t t h e r e t o
b e d i s c o v e r e d a s a n objective social fact, one "sees it" only insofar as one "desires" it (engages oneself in
the movement). No wonder the Mensheviks and those who opposed Lenin's call for a revolutionary takeover in the summer of
1917 "did not see" the conditions for it as " ripe" and opposed it as "premature" simply did not want the revolution.
Another version of this skeptical argument about "seeing" is that liberals claim that
capitalism is today so global and all-encompassing that they cannot "see" any serious
alternative to it, that they cannot imagine a feasible "outside" to it . The reply to this is that, insofar as
this is true, they do not see tout court: the task is not to see the outside, but to see in the first
place ( to grasp the nature of contemporary capitalism) —the Marxist wager is that, when we "see" this, we see enough,
including how to go beyond it . . . So our reply to the worried progressive liberals, eager to join the revolution,
and just not seeing it having a chance anywhere, should be like the answer to the proverbial ecologist worried about the
prospect of catastrophe: do not worry, the catastrophe will arrive .. . To complicate the image further, we
often have an Event which succeeds through the self-erasure of its evental dimension, as was the case with the
Jacobins in the French Revolution: once their (necessary) Job was done, they were not only overthrown and liquidated,
they were even retroactively deprived of their evental status, reduced to a historical accident, to a freakish abomination, to an
(avoidable) excess of h i s t o r i c a l development. 10 This theme was often evoked by Marx and Engels--how, once
"normal" pragmatic-utilitarian bourgeois daily life was consoli dated, its own violent heroic origins were
disavowed. This possibi l i t y — n o t o n l y t h e ( o b v i o u s ) p os s i b i l i t y ' of a n e v e n t al s e q u en c e reaching its end, but
a much more unsettling possibility of an Event disavowing itself, erasing its own traces, as the ultimate indication o f
its triumph, is not taken into account by Badiou: the possibility and raimifications of there being radical breaks
and discontnuties that might, in part due to their own reverberations unfolding off into the future,
become invisible to those living in realities founded on such eclipsed points of origin. Such a
self-erasure of the Event opens up the space for what , in the Benjaminian mode, one is
tempted to call the leftist politics of melancholy. In a first approach, this term cannot but appear as an
oxymoron: is not a revolutionary orientation towards the future the very opposite of melancholic attachment to the past? What
if, however, the future one should be faithful to is the future of the past itself, in other words, the emancipatory potential
that was not realized due to the failure of the past attempts and that for this reason continues
to haunt us? In his ironic comments on the French Revolution, Marx opposes the revolutionary enthusiasm to the sobering
effect of the "morning after": the actual result of the sublime revolutionary explosion, of the Event of freedom, equality, and
brotherhood, is the miserable utilitarian/egotistic universe of market calculation. (And, incidentally, is not this -gap even wider in the
case of In his October Revolution?) However, one should not simplify Marx: his point is not the rather commonsensical insight into how
the vulgar reality of commerce is the "truth" of the theater of revolutionary enthu siasm, "what it all really came down to." In
the revolutionary explosion as an Event, another utopian dimension shines through, the
dimension of' universal emancipation which, precisely, is the excess betrayed by the market
reality which takes over "the day after"—as such, this excess is not simply abolished, dismissed as
irrelevant, but, as it were, transposed into a virtual state, continuing to haunt the emancipatory
imaginary like a dream waiting to be realized. The excess of revolutionary enthusiasm over its
own "actual social base" or substance is thus literally that of the future of/'In the past, a spectral
Event waiting for its embodiment.
Alt -- Movements Solve/Coming
Movements are coming, the question is what method is best for them to combine
under
-AT: Movements are violent: movements may be violent, but no more violent than cap
Harvey 2014 (David [the Distinguished Professor of Anthropology and Geography at the Graduate
Center of the City University of New York]; Seventeen Contradictions and the End of Capitalism; Oxford
University Press; p. 162-3; kdf)
Capital survives not only through a series of spatio-temporal fixes that absorb the capital surpluses in
productive and constructive ways, but also through the devaluation and destruction administered as
corrective medicine to those who fail to keep up and who fail to pay off their debts. The very idea that those who
irresponsibly lend should also be at risk is, of course, dismissed out of hand. That would require calling the wealthy property-owning classes everywhere to account
and insisting that they look to their responsibilities rather than to their inalienable rights to private property and accumulation without limit. The
sinister
and destructive side of spatia-temporal fixes (just look at how Greece is being pillaged and devastated) becomes just as
crucial to capital as its creative counterpart in building a new landscape to facilitate the endless
accumulation of capital and the endless accumulation of political power. So what, then, should an anti-capitalist
movement make of all this? It is first vital to recognise that capital is always a moving target for opposition
because of its uneven geographical development. Any anti-capitalist movement has to learn to cope with this. Oppositional
movements in one space have often been defanged because capital moved to another. Anti-capitalist
movements must abandon all thoughts of regional equality and convergence around some theory of
socialist harmony. These are recipes for an unacceptable and unachievable global monotony. Anti-capitalist movements have to
liberate and coordinate their own dynamics of uneven geographical development, the production of
emancipatory spaces of difference, in order to reinvent and explore creative regional alternatives to
capital. Different social movements and resistances are emerging from within the framework of capital's
uneven geographical development, from Stockholm and Cairo to Sao Paulo, Shanghai, Paris and London. These constitute a mosaic of different
but loosely interconnected seedbeds for transformations of capitalism towards an anticapitalist future. How they might be put together is the
question. We live in chaotic and volatile times, particularly with respect to uneven geographical developments. It is not unreasonable to
expect that resistances and oppositions will be equally chaotic, volatile and geographically specific.
Alt -- Ethics First
Must question ethics first anything less leads to violent frameworks
Critchley in 7 (Simon [Prof of Philosophy @ New School]; Infinitely Demanding: Ethics of
Commitment, Politics of Resistance; Verso, p.8-9, kdf)
How does a self bind itself to whatever it determines as its good? In my view, this is the fundamental
question of ethics. To answer it we require a description and explanation of the subjective commitment
to ethical action. My claim will be that all questions of normative justification, whether with reference to
theories of justice, rights, duties, obligations or whatever, should be referred to what I call 'ethical
experience'. Ethical experience elicits the core structure of moral selfhood, what we might think of as
the existential matrix of ethics. As such, and this is what really interests me, ethical experience furnishes
an account of the motivational force to act morally, of that by virtue of which a self decides to pledge
itself to some conception of the good. My polemical contention is that without a plausible account of
motivational force, that is, without a conception of the ethical subject, moral reflection is reduced to the
empty manipulation of the standard justificatory frameworks: deontology, utilitarianism and virtue
ethics.
AT: Alt = Cede political/ Inaction
Inaction in the instance of the plan is unique, we don’t foreclose solutionism in other
instances
Morozov 2013 (Evgeny [former fellow @ Stanford & Georgetown]; To Save Everything, Click Here:
The Folly of Technological Solutionism; p. The Will to Improve (Just About Everything!); Pro-quest; kdf)
It may seem that a critique of solutionism would, by its very antireformist bias, be the prerogative of the
conservative. In fact,many of the antisolutionist jibes throughout this book fit into the tripartite
taxonomy of reactionary responses to social change so skillfully outlined by the social theorist Albert
Hirschman. In his influential book The Rhetoric of Reaction, Hirschman argued that all progressive
reforms usually attract conservative criticisms that build on one of the following three themes:
perversity (whereby the proposed intervention only worsens the problem at hand), futility (whereby the
intervention yields no results whatsoever), and jeopardy (where the intervention threatens to
undermine some previous, hard-earned accomplishment).
Although I resort to all three of these critiques in the pages that follow, my overall project does differ
from the conservative resistance studied by Hirschman. I do not advocate inaction or deny that many
(though not all) of the problems tackled by solutionists—from climate change to obesity to declining
levels of trust in the political system—are important and demand immediate action (how exactly those
problems are composed is, of course, a different matter; there is more than one way to describe each).
But the urgency of the problems in question does not automatically confer legitimacy upon a panoply of
new, clean, and efficient technological solutions so in vogue these days. My preferred solutions—or,
rather, responses—are of a very different kind.
It’s also not a coincidence that my critique of solutionism bears some resemblance to several critiques of
the numerous earlier efforts to put humanity into too tight a straitjacket. Today’s straitjacket might be
of the digital variety, but it’s hardly the first or the tightest. While the word “solutionism” may not have
been used, many important thinkers have addressed its shortcomings, even if using different terms and
contexts. I’m thinking, in particular, of Ivan Illich’s protestations against the highly efficient but
dehumanizing systems of professional schooling and medicine, Jane Jacobs’s attacks on the arrogance of
urban planners, Michael Oakeshott’s rebellion against rationalists in all walks of human existence, Hans
Jonas’s impatience with the cold comfort of cybernetics; and, more recently, James Scott’s concern with
how states have forced what he calls “legibility” on their subjects. Some might add Friedrich Hayek’s
opposition to central planners, with their inherent knowledge deficiency, to this list.
These thinkers have been anything but homogenous in their political beliefs; Ivan Illich, Friedrich Hayek,
Jane Jacobs, and Michael Oakeshott would make a rather rowdy dinner party. But these highly original
thinkers, regardless of political persuasion, have shown that their own least favorite brand of
solutionist—be it Jacobs’s urban planners or Illich’s professional educators—have a very poor grasp not
just of human nature but also of the complex practices that this nature begets and thrives on. It’s as if
the solutionists have never lived a life of their own but learned everything they know from books—and
those books weren’t novels but manuals for refrigerators, vacuum cleaners, and washing machines.
Thomas Molnar, a conservative philosopher who, for his smart and vehement critique of technological
utopianism written in the early 1960s, also deserves a place on the antisolutionist pantheon, put it really
well when he complained that “when the utopian writers deal with work, health, leisure, life
expectancy, war, crimes, culture, administration, finance, judges and so on, it is as if their words were
uttered by an automaton with no conception of real life. The reader has the uncomfortable feeling of
walking in a dreamland of abstractions, surrounded by lifeless objects; he manages to identify them in a
vague way, but, on closer inspection, he sees that they do not really conform to anything familiar in
shape, color, volume, or sound.” Dreamlands of abstractions are a dime a dozen these days; what works
in Palo Alto is assumed to work in Penang.
It’s not that solutions proposed are unlikely to work but that, in solving the “problem,” solutionists twist
it in such an ugly and unfamiliar way that, by the time it is “solved,” the problem becomes something
else entirely. Everyone is quick to celebrate victory, only no one remembers what the original solution
sought to achieve.
The ballyhoo over the potential of new technologies to disrupt education—especially now that several
start-ups offer online courses to hundreds of thousands of students, who grade each other’s work and
get no face time with instructors—is a case in point. Digital technologies might be a perfect solution to
some problems, but those problems don’t include education—not if by education we mean the
development of the skills to think critically about any given issue. Online resources might help students
learn plenty of new facts (or “facts,” in case they don’t cross-check what they learn on Wikipedia), but
such fact cramming is a far cry from what universities aspire to teach their students.
AT: Cap good
They simply point to instances of capitalism that have yet to go awry—this is
epistemologically flawed and in no way proves capitalism is good
Harvey 2014 (David [the Distinguished Professor of Anthropology and Geography at the Graduate
Center of the City University of New York]; Seventeen Contradictions and the End of Capitalism; Oxford
University Press; p. 153-7; kdf)
Since it may take many years for capitalism to mature in these new territories (if it ever does) to the point where they too begin to produce
surpluses of capital, the originating country can hope to benefit from this process for a not inconsiderable period of time. This is particularly the
case with investments in railways, roads, ports, dams and other infrastructures that mature slowly. But the rate of return on these investments
eventually depends upon the evolution of a strong dynamic of accumulation in the receiving region. Britain lent to the United States in this way
during the nineteenth century. Much later, the United States, via the Marshall Plan for Europe (West Germany in particular) and Japan, clearly
saw that its own economic security (leaving aside the military aspect of the Cold War) rested on the active revival of capitalist activity in these
other spaces. Contradictions arise because these
new dynamic spaces of capital accumulation ultimately generate
surpluses and need to find ways to absorb them through further geographical expansions. This can spark
geopolitical conflicts and tensions. In recent times we have witnessed cascading and proliferating spatia-temporal fixes primarily
throughout East and South-East Asia. Surplus capital from Japan started to course around the world in the 1970s in search of profitable outlets,
followed shortly thereafter by surplus capital from South Korea and then Taiwan in the mid-198os. While these
cascading spatiatemporal fixes are recorded as relationships between territories, they are in fact material and social
relations between regions within territories. The formal territorial difficulties between Taiwan and mainland China appear
anachronistic beside the growing integration of the industrial regions of Taipei and Shanghai. Capital flows from time to time get
redirected from one space to another. The capitalist system remains relatively stable as a whole, even
though the parts experience periodic difficulties (such as deindustrialisation here or partial devaluations there). The overall
effect of such interregional volatility is to temporarily reduce the aggregate dangers of overaccumulation and devaluation even though localized
distress may be acute. The regional volatility experienced since 198 or so seems to have largely been of this type. At each step, of course, the
issue arises as to which will be the next space into which capital can profitably flow and why and which will be the next space to be abandoned
and devalued. The general effect can be misleading: since
capital is always doing well somewhere, the illusion arises
that all will be well everywhere if we only readjust the form of capital to that predominant in Japan and West Germany
(the 198os), the United States (the 1990s) or China (after 2ooo). Capital never has to address its systemic failings because
it moves them around geographically. A second possible outcome, however, is increasingly fierce
international competition within the international division of labour as multiple dynamic centres of capital accumulation compete on
the world stage in the midst of strong currents of overaccumulation (lack of markets for realisation) or under conditions of
competing scarcities for raw materials and other key means of production. Since they cannot all succeed, either the weakest
succumb and fall into serious crises of localised devaluation or geopolitical struggles arise between
regions and states. The latter take the form of trade wars, currency and resource wars, with the everpresent danger of military confrontations (of the sort that gave us two world wars between capitalist powers in the twentieth
century). In this case, the spatiatemporal fix takes on a much more sinister meaning as it transmutes into the export of localised and regional
devaluations and destruction of capital (of the sort that occurred on a massive scale in East and South-East Asia and in Russia in 1997-8). How
and when this occurs will depend, however, just as much upon the explicit forms of political action on the part of state powers as it does upon the
molecular processes of capital accumulation in space and time. The dialectic between the territorial logic and the capitalistic logic is then fully
engaged. So how does the relative spatial fixity and distinctive logic of territorial power (as manifest in the state) fit with the fluid dynamics of
capital accumulation in space and time? Is this not the locus of an acute and abiding contradiction for capital, perhaps the apogee of the
contradiction between fixity (the state) and motion (capital)? Recall: 'In order for capital to circulate freely in space and time, physical
infrastructures and built environments must be created that are fixed in space: The mass of all this fixed capital increases over time relative to the
capital that is continuously flowing. Capital has periodically to break out of the constraints imposed by the world it has constructed. It is in mortal
danger of becoming sclerotic. The building of a geographical landscape favourable to capital accumulation in one era becomes, in short, a fetter
upon accumulation in the next. Capital has therefore to devalue much of the fixed capital in the existing geographical landscape in order to build
a wholly new landscape in a different image. This sparks intense and destructive localised crises. The most obvious contemporary example of
such devaluation in the USA is Detroit. But many older industrial cities in all the advanced capitalist countries and beyond (even north China and
Mumbai) have had to remake themselves as their economic bases have been eroded by competition from elsewhere. The principle here is this:
capital creates a geographical landscape that meets its needs at one point in time only to have to
destroy it at a later point in time to facilitate capital's further expansion and qualitative transformation.
Capital unleashes the powers of 'creative destruction' upon the land. Some factions benefit from the creativity, while others suffer the brunt of the
destruction. Invariably, this involves a class disparity. So where is state power in all of this and by what distinctive logic does it intervene in
processes oflandscape formation? The state is a bounded territorial entity formed under conditions that had little to do with capital but which is a
fundamental feature of the geographicallandscape. Within its territory it has a monopoly of the legitimate use of violence, sovereignty over the
law and the currency, and regulatory authority over institutions (including private property), and it is blessed with the power to tax and
redistribute incomes and assets. It organises structures of administration and governance that at the very minimum address the collective needs
ofboth capital and, more diffusely, the state's citizens. Among its sovereign powers perhaps the most important is defining and conferring rights
of citizenship under the law upon its inhabitants and thereby introducing the category of illegal alien or 'sans-papiers' into the equation. This
creates a separate population vulnerable to unthinkable and unrestricted exploitation by capital. As a bounded entity, the question of how the
state's borders were established and how they are patrolled in relation to the movements of people, commodities and money becomes paramount.
The two spatialities of state and capital sit awkwardly with and frequently contradict each other. This is very clear in the case, for example, of
migration policies. The interests of the capitalist state are not the same as those of capital. The state is not a simple thing and its various branches
do not always cohere, although key institutions within the state do typically play a directly supportive role in the management of capital's
economy (with treasury departments usually in alliance with central banks to constitute the state-finance nexus). The governance of the state
depends upon the nature of its political system, which sometimes pretends to be democratic and is often influenced by the dynamics of class and
other social struggles. The practices that constitute the exercise of state powers are far from monolithic or even coherent, which means that the
state cannot be construed as a solid 'thing' exercising distinctive powers. It is a bundle of practices and processes assembled together in
unbounded ways since the distinction between the state and civil society (for example, in a field like education, health care or housing) is highly
porous. Capital is not the only interest to which the state must respond and the pressures upon it come from a variety of interests. Furthermore,
the ruling ideology behind state interventions (usually expressed as an economic and policy orthodoxy) can vary considerably. There is, also, an
interstate system. Relations among states can be hostile or collaborative as the case may be, but there are always geo-economic and geopolitical
relations and conflicts that reflect the state's distinctive interests and lead state practices into forms of action that may or may not be consistent
with capital's interests. The logic that attaches to the territoriality of state power is very different from the logic of capital. The state is, among
other things, interested in the accumulation of wealth and power on a territorial basis and it was Adam Smith's genius to advise and generally
persuade statesmen that the best way to do this was to unleash and rationalise the forces of capital and the free market within its territory and
open its doors to free trade with others. The capitalist state is one that broadly follows pro-business policies, albeit tempered by ruling ideologies
and the innumerable and divergent social pressures mobilised through theorganisation of its citizens. But it also seeks to rationalise and use the
forces of capital to support its own powers of governmentality over potentially restive populations, all the while enhancing its own wealth, power
and standing within a highly competitive interstate system. This rationality contrasts with that of capital, which is primarily concerned with the
private appropriation and accumulation of social wealth. The constructed loyalty of citizens to their states conflicts in principle with capital's
singular loyalty to making money and nothing else. The kind of rationality the state typically imposes is illustrated by its urban and regional
planning practices. These state interventions and investments attempt to contain the otherwise chaotic consequences of unregulated market
development. The state imposes Cartesian structures of administration, law, taxation and individual identification. The technocratic and
bureaucratic production of space in the name of a supposedly capitalist modernity has been, however, the focus of virulent critiques (most notably
that of Henri Lefebvre3). What tends to be produced is a soulless, rationalised geographical landscape against which populations periodically
revolt. But the application of state powers to these purposes never did run smooth. They are all too easily subverted, co-opted and corrupted by
moneyed interests. Conversely, the foundational interests of the
state in, for example, the case of national
security can be subverted by capital and turned into a permanent feeding trough for capitalist ambitions
- hence the historical role of the infamous 'military-industrial complex' in the development of capital.
Capitalism guarantees the destruction of the biosphere on the backs of the working
class- any claim to the contrary is epistemologically suspect
Harvey 2014 (David [the Distinguished Professor of Anthropology and Geography at the Graduate
Center of the City University of New York]; Seventeen Contradictions and the End of Capitalism; Oxford
University Press; p. 56-8; kdf)
Of all writers it was, perhaps, Karl Polanyi, an emigre Hungarian socialist economic historian and anthropologist who ended up working and
writing in the United States at the height of the McCarthyite scourge, who most clearly saw the nature of this phenomenon and 'the perils to
society' which it posed. His influential work on The Great Transformation was first published in 1944 and remains a landmark text to this day.
The markets for labour, land and money are, he pointed out, essential for the functioning of capital and the production of value. But labor, land,
and money are obviously not commodities ... Labor is only another name for a human activity which goes with life itself, which in its turn is not
produced for sale but for entirely different reasons, nor can that activity be detached from the rest of life, be stored or mobilized; land is only
another name for nature, which is not produced by man; actual money, finally, is merely a token of purchasing power which, as a rule, is not
produced at all, but comes into being through the mechanism of banking or state finance. None of them is produced for sale. The commodity
description of labor, land, and money is entirely fictitious? To allow the fictions that land, labour and money are commodities to flourish
without restraint would, in Polanyi's view, 'result in the demolition of society'. In 'disposing of a man's labor power the system would,
incidentally, dispose of the physical, psychological, and moral entity "man'' attached to that tag. Robbed of the protective covering of cultural
institutions, human beings would perish from the effects of social exposure; they would die as the victims of acute social dislocation through
vice, perversion, crime and starvation. Nature
would be reduced to its elements, neighborhoods and landscapes
defiled, rivers polluted, military safety jeopardized, the power to produce food and raw materials
destroyed'; and, finally, 'shortages and surfeits of money would prove as disastrous to business as floods
and droughts in primitive society'. No society, Polanyi concluded, 'could stand the effects of such a system of crude fictions even
for the shortest stretch of time unless its human and natural substance as well as its business organization was protected against the ravages of
this satanic mill'.3 To the degree that neoliberal
politics and policies these last few decades have dismantled many of the
protections that had been so painstakingly created through earlier decades of struggle, so we now find
ourselves increasingly exposed to some of the worst traits of that 'satanic mill' which capital, left to itself,
inevitably creates. Not only do we see around us abundant evidence of so many of the collapses that Polanyi feared, but a
heightened sense of universal alienation looms ever more threatening, as more and more of humanity
turns away in disgust from the barbarism the underpins the civilisation it has itself constructed. This
constitutes, as I shall argue by way of conclusion, one of the three most dangerous, perhaps even fatal, contradictions for
the perpetuation of both capital and capitalism. How the commodification of labour, land and money was historically
accomplished is in itself a long and painful story, as Marx's brief history of so-called 'primitive accumulation' in Capital outlines. The
transformation of labour, land and money into commodities rested on violence, cheating, robbery, swindling and the like. The common lands
were enclosed, divided up and put up for sale as private property. The gold and silver that formed the initial money commodities were stolen
from the Americas. The labour was forced off the land into the status of a 'free' wage labourer who could be freely exploited by capital when
not outright enslaved or indentured. Such forms of dispossession were foundational to the creation of capital. But even more importantly, they
never disappeared. Not
only were they central to the more dastardly aspects of colonialism, but to this very
day the politics and policies of dispossession ( administered for the most part by an unholy alliance of corporate and state
power) of access to land, water and natural resources are underpinning massive movements of global
unrest. The so-called 'land grabs' throughout Africa, Latin America and much of Asia (including the massive dispossessions occurring currently
in China) are just the most obvious symptom of a politics of accumulation by dispossession run riot in ways that even Polanyi could not have
imagined. In the United States, tactics of eminent domain, along with the brutal foreclosure wave that led to massive losses not only of use
values (millions rendered homeless) but also of hard-won savings and asset values embedded in housing markets, to say nothing of the loss of
pension, health care and educational rights and benefits, all indicate that the political economy of outright dispossession is alive and well in the
very heart of the capitalist world. The irony of course is that these
forms of dispossession are now increasingly
administered under the virtuous disguise of a politics of the austerity required to bring an ailing
capitalism back into a supposedly healthy state.
AT: Gibson-Graham/ K of Capitalocentric
Arguments that call of the rejection of capitalocentric critiques are dangerous:
A) we are a critique of capital, not capitalism taking out the internal link to their
argument—and—
B) only a focus on the system of capital can create solutions the aff outlines—rejecting
the alt is a reason to vote neg on presumption
Harvey 2014 (David [the Distinguished Professor of Anthropology and Geography at the Graduate
Center of the City University of New York]; Seventeen Contradictions and the End of Capitalism; Oxford
University Press; p. 10-11; kdf)
In certain circles it is fashionable to derogatorily dismiss studies such as this as 'capitalo-centric: Not only
do I see nothing wrong with such studies, provided, of course, that the interpretive claims that arise from them are not pressed too
far and in the wrong direction, but I also think it imperative that we have much more sophisticated and profound
capitalo-centric studies to hand to facilitate a better understanding of the recent problems that capital
accumulation has encountered. How else can we interpret the persistent contemporary problems of
mass unemployment, the downward spiral of economic development in Europe and Japan, the unstable
lurches forward of China, India and the other so-called BRIC countries? Without a ready guide to the contradictions underpinning
such phenomena we will be lost. It is surely myopic, if not dangerous and ridiculous, to dismiss as 'capitalo-centric'
interpretations and theories of how the economic engine of capital accumulation works in relation to
the present conjuncture. Without such studies we will likely misread and misinterpret the events that are occurring around us.
Erroneous interpretations will almost certainly lead to erroneous politics whose likely outcome will be to
deepen rather than to alleviate crises of accumulation and the social misery that derives from them. This
is, I believe, a serious problem throughout much of the contemporary capitalist world: erroneous policies based in erroneous theorising are
compounding the economic difficulties and exacerbating the social disruption and misery that result. For the
putative 'anti-capitalist'
movement now in formation it is even more crucial not only to better understand what exactly it is that
it might be opposed to, but also to articulate a clear argument as to why an anti-capitalist movement
makes sense in our times and why such a movement is so imperative if the mass of humanity is to live a
decent life in the difficult years to come. So what I am seeking here is a better understanding of the
contradictions of capital, not of capitalism. I want to know how the economic engine of capitalism works
the way it does, and why it might stutter and stall and sometimes appear to be on the verge of collapse. I also want to show why
this economic engine should be replaced and with what.
AT: Framework
The affirmative doesn’t have its hands on the levers of power—but the alternative
does, each chance to refuse neoliberalism is unique
Harvey 2007 (David [Distinguished Professor in the Graduate Center of the City University of New
York]; Neoliberalism as Creative Destruction; The ANNALS of the American Academy of Political and
Social Science 2007 610: 21; kdf)
Analysis also points up exploitable contradictions within the neoliberal agenda. The
gap between rhetoric (for the benefit of all) and
realization (for the benefit of a small ruling class) increases over space and time, and social movements have done
much to focus on that gap. The idea that the market is about fair competition is increasingly negated by the facts of extraordinary
monopoly, centralization, and internationalization on the part of corporate and financial powers. The startling increase in class and regional
inequalities both within states (such as China, Russia, India, Mexico, and in Southern Africa) as well as internationally poses a serious political
problem that can no longer be swept under the rug as something transitional on the way to a perfected neoliberal world. The
neoliberal
emphasis upon individual rights and the increasingly authoritarian use of state power to sustain the
system become a flashpoint of contentiousness. The more neoliberalism is recognized as a failed if not
disingenuous and utopian project masking the restoration of class power, the more it lays the basis for
a resurgence of mass movements voicing egalitarian political demands, seeking economic justice, fair
trade, and greater economic security and democratization. But it is the profoundly antidemocratic nature
of neoliberalism that should surely be the main focus of political struggle. Institutions with enormous leverage,
like the Federal Reserve, are outside any democratic control. Internationally, the lack of elementary accountability let alone democratic control
over institutions such as the IMF, the WTO, and the World Bank, to say nothing of the great private power of financial institutions, makes a
mockery of any credible concern about democratization. To bring back demands for democratic governance and for economic, political, and
cultural equality and justice is not to suggest some return to a golden past since the meanings in each instance have to be reinvented to deal
with contemporary conditions and potentialities. The meaning of democracy in ancient Athens has little to do with the meanings we must
invest it with today in circumstances as diverse as Sao Paulo, Johannesburg, Shanghai, Manila, San Francisco, Leeds, Stockholm, and Lagos. But
right across the globe, from China, Brazil, Argentina, Taiwan, and Korea to South Africa, Iran, India, and Egypt, and beyond the struggling
nations of Eastern Europe into the heartlands of contemporary capitalism, groups and social movements are rallying to reforms expressive of
democratic values. That is a key point of many of the struggles now emerging. The more clearly
oppositional movements
recognize that their central objective must be to confront the class power that has been so effectively
restored under neoliberalization, the more they will be likely to cohere. Tearing aside the neoliberal
mask and exposing its seductive rhetoric, used so aptly to justify and legitimate the restoration of that power, has a
significant role to play in contemporary struggles. It took neoliberals many years to set up and accomplish their march
through the institutions of contemporary capitalism. We can expect no less of a struggle when pushing in the opposite direction.
AT: Util
The focus of ends justifying the means is a bankrupt methodology justifying the
systemic elimination of entire populations
Zizek in 2008
(Slavoj, [Senior researcher at the Institute of Sociology, University of Ljubljana, Slovenia, has been
visiting prof @ Columbia, Princeton, and The New School], Violence: Big Ideas// small books. Picador,
pg(s) 100-1, kdf)
Of course, we do not openly admit these motive From time to time they nevertheless pop up in our public
space in censored form, in the guise of de-negation. evoked as an option and then immediately discarded
Recall what William Bennett, the gambling, neo-con author of The Book of Virtues, said on 28 September 2005
on his call-in programme Morning in America: But I do know that it's true that if you wanted to reduce crime,
you could, if that were your sole purpose, you could abort every black baby in this country, and your crime
rate would go down. That would be an impossibly ridiculous and morally reprehensible thing to do, but our
crime rate would go down." The White House reacted immediately: "The president believes the comments
were not appropriate." Two days later, Bennett qualified his statement: "I was putting a hypothetical
7roposition ... and then said about it, it was morally reprehensible to recommend abortion of an entire group of
people. But this is what happens when you argue that ends can justify the means." This is exactly what Freud
meant when he wrote that the unconscious knows no negation: the official (Christian, democratic ... ) discourse is accompanied and sustained by a whole nest of obscene, brutal, racist, sexist fantasies, which can
only -)e admitted in a censored form.
AT: Framework – Education
The plan is the death of education
Morozov 2013 (Evgeny [former fellow @ Stanford & Georgetown]; To Save Everything, Click Here:
The Folly of Technological Solutionism; p. The Will to Improve (Just About Everything!); Pro-quest; kdf)
The ballyhoo over the potential of new technologies to disrupt education—especially now that several start-ups offer online courses to
hundreds of thousands of students, who grade each other’s work and get no face time with instructors—is a case in point. Digital
technologies might be a perfect solution to some problems, but those problems don’t include
education—not if by education we mean the development of the skills to think critically about any given
issue. Online resources might help students learn plenty of new facts (or “facts,” in case they don’t cross-check what they learn on
Wikipedia), but such fact cramming is a far cry from what universities aspire to teach their students. As Pamela Hieronymi, a professor of
philosophy at the University of California, Los Angeles (UCLA), points out in an important essay on the myths of online learning, “Education
is not the transmission of information or ideas. Education is the training needed to make use of
information and ideas. As information breaks loose from bookstores and libraries and floods onto
computers and mobile devices, that training becomes more important, not less.” Of course, there are plenty of
tools for increasing one’s digital literacy, but those tools go only so far; they might help you to detect erroneous
information, but they won’t organize your thoughts into a coherent argument. Adam Falk, president of Williams
College, delivers an even more powerful blow against solutionism in higher education when he argues that it would be erroneous to
pretend that the solutions it peddles are somehow compatible with the spirit and goals of the university.
Falk notes that, based on the research done at Williams, the best predictor of students’ intellectual success in
college is not their major or GPA but the amount of personal, face-to-face contact they have with
professors. According to Falk, averaging letter grades assigned by five random peers—as at least one much-lauded start-up in this space,
Coursera, does—is not the “educational equivalent of a highly trained professor providing thoughtful evaluation and detailed response.” To
pretend that this is the case, insists Falk, “is to deny the most significant purposes of education, and to forfeit its true value.” Here
we have
a rather explicit mismatch between the idea of education embedded in the proposed set of
technological solutions and the time-honored idea of education still cherished at least by some colleges.
In an ideal world, of course, both visions can coexist and prosper simultaneously. However, in the world we inhabit, where the
administrators are as cost-conscious as ever, the approach that produces the most graduates per dollar
spent is far more likely to prevail, the poverty of its intellectual vision notwithstanding. Herein lies one
hidden danger of solutionism: the quick fixes it peddles do not exist in a political vacuum. In promising almost
immediate and much cheaper results, they can easily undermine support for more ambitious, more intellectually
stimulating, but also more demanding reform projects.
AT: Framework – Policy Failure
Cyber-utopian ideology results in poor policy decisions that worsen democracy- the
alternative is to counter authoritarian regime’s exploitative use of the internet
Morozov 11 (Evgeny Morozov. Writer and researcher who studies political and social implications of
technology. Senior writer at New Republic. “The Net Delusion.” 2011. P. 27-28.)//EMerz
Unbridled cyber-utopianism is an expensive ideology to maintain because authoritarian governments
don’t stand still and there are absolutely no guarantees they won’t find a way to turn the Internet into a
powerful tool of oppression. If, on closer examination, it turns out that the Internet has also empowered
the secret police, the censors, and the propaganda offices of a modern authoritarian regime, it’s quite
likely that the process of democratization will become harder, not easier. Similarly, if the Internet has
dampened the level of antigovernment sentiment—because yet another source of legitimacy. If the
Internet is reshaping the very nature and culture of antigovernment resistance and dissent, shifting it
away from real-world practices and toward anonymous virtual spaces, it will also have significant
consequences for the scale and tempo of the protest movement, not all of them positive. That’s an
insight that has been lost on most observers of the political power of the Internet. Refusing to
acknowledge that the Web can actually strengthen rather than undermine authoritarian regimes is
extremely irresponsible and ultimately results in bad policy, if only because it gives policymakers false
confidence that the only things they need to be doing are proactive—rather than reactive—in nature.
But if, on careful examination, it turns out that certain types of authoritarian regimes can benefit from
the Internet in disproportionally more ways than their opponents, the focus of Western democracy
promotion work should shift from empowering the activists to topple their regimes to countering the
governments’ own exploitation of the Web lest they become even more authoritarian. There is no
point in making a revolution more effective, quick, and anonymous if the odds of the revolution’s
success are worsening in the meantime.
AT: Framework – policy making/decision making
The naïve belief in the power of internet freedom turns decision making- policy
makers are oblivious to reality
Morozov 11 (Evgeny Morozov. Writer and researcher who studies political and social implications of
technology. Senior writer at New Republic. “The Net Delusion.” 2011. P. 21-22.)//EMerz
Whatever one calls it, this belief in the democratizing power of the Web ruins the public’s ability to
assess future and existing policies, not least because it overstates the positive role that corporations
play in democratizing the world without subjecting them to the scrutiny they so justly deserve. Such
cyber-utopian propensity to only see the bright side was on full display in early 2010, as Google
announced it was pulling out of China, fed up with the growing censorship demands of the Chinese
government and mysterious cyber-attacks on its intellectual property. But what should have been
treated as a purely rational business decision was lauded as a bold move to support “human rights”; that
Google did not mind operating in China for more than four years prior to the pullout was lost on most
commentators. Writing in Newsweek, Jacob Weisberg, a prominent American journalist and publisher,
called Google’s decision “heroic,” while Senator John Kerry said that “Google is gutsily taking real risk in
standing up for principle.”
Addressing the impact of cyber utopianism on policies is a prior question to making
those policies- conviction in the internet’s power makes rationally dealing with policy
questions impossible
Morozov 11 (Evgeny Morozov. Writer and researcher who studies political and social implications of
technology. Senior writer at New Republic. “The Net Delusion.” 2011. P. 27.)//EMerz
Furthermore, giving in to cyber-utopianism may preclude policymakers from considering a whole
range of other important questions. Should they applaud or bash technology companies who choose to
operate in authoritarian regimes, bending their standard procedures as a result? Are they harbingers of
democracy, as they claim to be, or just digital equivalents of Halliburton and United Fruit Company,
cynically exploiting local business opportunities while also strengthening the governments that let them
in? How should the West balance its sudden urge to promote democracy via the Internet with its
existing commitments to other nondigital strategies for achieving the same objective, from the fostering
of independent political parties to the development of civil society organizations? What are the best
ways of empowering digital activists without putting them at risk? If the Internet is really a revolutionary
force that could nudge all authoritarian regimes toward democracy, should the West go quiet on many
of its other concerns about the Internet—remember all those fears about cyberwar, cybercrime, online
child pornography, Internet piracy—and strike while the iron is still hot? These are immensely difficult
questions; they are also remarkably easy to answer incorrectly. While the Internet has helped to
decrease costs for nearly everything, human folly is a commodity that still bears a relatively high price.
The oft-repeated mantra of the open source movement—“fail often, fail early”—produces excellent
software, but it is not applicable to situations where human lives are at stake. Western policymakers,
unlike pundits and academics, simply don’t have the luxury of getting it wrong and dealing with the
consequences later.
AT: Internet Inevitable
Reject their inevitability calculus
Morozov 2013 (Evgeny [former fellow @ Stanford & Georgetown]; To Save Everything, Click Here:
The Folly of Technological Solutionism; p. So open it hurts; Pro-quest; kdf)
Ironically, this is the position that Lessig the academic has made a career out of opposing. But Lessig the activist and public intellectual has no
problem embracing such a position whenever it suits his own activist agenda. As someone who shares many of the ends of Lessig’s agenda, I
take little pleasure in criticizing his means, but I do think they are intellectually unsustainable and probably misleading to the technologically
unsavvy.
Internet-centrism, like all religions, might have its productive uses, but it makes for a truly awful guide
to solving complex problems, be they the future of journalism or the unwanted effects of transparency.
It’s time we abandon the chief tenet of Internet-centrism and stop conflating physical networks with the
ideologies that run through them. We should not be presenting those ideologies as inevitable and
natural products of these physical networks when we know that these ideologies are contingent and
perishable and probably influenced by the deep coffers of Silicon Valley. Instead of answering each and every digital
challenge by measuring just how well it responds to the needs of the “network,” we need to learn how to engage in narrow, empirically
grounded arguments about the individual technologies and platforms that compose “the Internet.” If, in some cases, this
would mean
going after the sacred cows of transparency or openness, so be it. Before the idea of “the Internet”
hijacked our imaginations, we made such trade-offs all the time. No serious philosopher would ever
proclaim that either transparency or openness is an unquestionable good or absolute value to which
human societies should aspire. There is no good reason why we should suddenly accept the totalizing philosophy of “the
Internet” and embrace the supremacy of its associated values just because its cheerleaders believe that
“the network is not going away.” Digital technologies contain no ready-made answers to the social and
political dilemmas they create, even if “the Internet” convinces us otherwise.
If the internet is inevitable, it takes out their advantage – still not a justification of
internet-centrism
Morozov 2013 (Evgeny [former fellow @ Stanford & Georgetown]; To Save Everything, Click Here:
The Folly of Technological Solutionism; p.What if Internet Theorists were Bouncers; Pro-quest; kdf)
Zittrain’s thought is a manifestation of a broader paradox that has become ubiquitous in our Internet debates. Rare is a reader of technology
blogs or an attendee of technology conferences who has not heard the admonition that some dark, evil force—Hollywood, the National
Security Agency, China, Apple—is about to “break the Internet.” Technologists and geeks—the
group that spends the greatest
amount of time philosophizing about “the Internet” and its future—constantly remind us that “the
Internet” is unstable and might fall apart. Save for the occasional proclamation that the world will stay as it is minus all the fun
and convenience, no one seems to know what awaits us once “the Internet” does break. But break it will—unless
some drastic change is taken to maintain its current state. Hence the greatest irony of all: one day we are told that “the
Internet” is here to stay, and we should reshape our institutions to match its demands; another day, we
are told that it’s so fragile that almost anyone or anything could deal it a lethal blow. It would be tempting to
write this paradox off as a mere contradiction in geek logic. Or, as in Lessig’s case, it might be just a rhetorical trick, a clever ruse that
bolsters some important activist cause—say, copyright reform, net neutrality, or opposition to surveillance and censorship—
while also nudging our seemingly obsolete political and legal institutions to experiment with technology
and innovation. Such an interpretation certainly seems plausible. But it’s also plausible that we have become utterly
confused about “the Internet” and its presumed nature, that we are dead wrong about its finality, that
the very idea of “the Internet” has impoverished our thinking about the world, and that we are
worshiping false gods and ideologies. So, which is it?
Morozov 2013 (Evgeny [former fellow @ Stanford & Georgetown]; To Save Everything, Click Here:
The Folly of Technological Solutionism; p.What if Internet Theorists were Bouncers; Pro-quest; kdf)
But the theory of generativity doesn’t preoccupy itself with the thorny subject of how “the Internet”
itself will die—not least because Zittrain, under the sway of Internet-centrism, badly wants “the
Internet” to be eternal. His theory is a recipe for how “the Internet” can live forever. This, of course, is
never expressed directly, for Zittrain assumes—quite correctly—that his geeky audience shares his
desire to make its fetish object immortal. However, we shouldn’t mistake our infatuation with “the
Internet” for a genuine theory of innovation. Any robust theory, instead of treating “the Internet” like a
permanent gift to civilization, would find a way to compare the innovation potentials of many different
platforms and technologies, including those that might eventually threaten to supplant “the Internet.”
Of course, there may be other strong social, political, and even aesthetic concerns about the challenge
that the rise of apps presents to digital “forms of life.” However, to claim that Apple—one of Zittrain’s
culprits—is bad for innovation because it’s bad for “the Internet” is like claiming that “the Internet” is
bad for innovation because it’s bad for the telephone. Well, it might have been bad for the telephone—
but when did the preservation of the telephone become a lofty social goal? Such teleological Internetcentrism should have no place in our regulatory thinking. But, alas, the preservation of “the Internet”
seems to have become an end in itself, to the great detriment of our ability even to imagine what might
come to supplant it and how our Internet fetish might be blocking that something from emerging. To
choose “the Internet” over the starkly uncertain future of the post-Internet world is to tacitly
acknowledge that either “the Internet” has satisfied all our secret plans, longings, and desires—that is, it
is indeed Silicon Valley’s own “end of history”—or that we simply can’t imagine what else innovation
could unleash.
The irony is that Zittrain’s theory of generativity, while very critical of gatekeepers like Apple, is itself a
gatekeeper. While generativity green-lights good, reliable, and predictable innovation, the kind that
promises to stay within the confines of “the Internet” and leave things as they are, it frowns upon—and
possibly even blocks—the unruly and disruptive kind that might start within “the Internet” but
eventually transcend, supplant, and perhaps even eliminate it. Zittrain attempts to universalize what he
takes to be the operating principles of “the Internet” and present them as objective, eternal, and
uncontroversial foundations on which innovation theory itself could run from now on. Thus, if openness
has supposedly been one of the defining features of “the Internet,” it gets magically transformed into an
objective benchmark for the future of innovation. Aggressive expansion into other domains is one of the
hallmarks of Internet-centrism; it colonizes entire theories and domains, imposing its own values—
openness, transparency, disruption—on whatever it touches. However, if we put the well-being of “the
Internet” aside, absolutely nothing about Apple’s hands-on approach to running its app store or
controlling its gadgets suggests that it’s bad for innovation. Its approach may not be “open”; it may not
even be “Internet compatible.” But these criteria only make sense in a world where the well-being of
“the Internet itself” is the alpha and omega of everything, the summum bonum. This may even be a
world in which Jonathan Zittrain and many other geeks would actually want to live; ideologies do have a
tendency to present other worldviews as irrelevant or impossible. In reality, though, control and
centralization are not inherently antithetical to innovation; if we have come to believe the opposite,
then “the Internet” is partly to blame.
Impact turns aff
The impact turns the aff
Packer 2013 (George; Change the world; May 27;
www.newyorker.com/magazine/2013/05/27/change-the-world?currentPage=5; kdf)
Technology can be an answer to incompetence and inefficiency. But it has little to say about larger
issues of justice and fairness, unless you think that political problems are bugs that can be fixed by
engineering rather than fundamental conflicts of interest and value. Evgeny Morozov, in his new book “To Save
Everything, Click Here,” calls this belief “solutionism.” Morozov, who is twenty-nine and grew up in a mining town in Belarus, is the
fiercest critic of technological optimism in America, tirelessly dismantling the language of its followers.
“They want to be ‘open,’ they want to be ‘disruptive,’ they want to ‘innovate,’ ” Morozov told me. “The
open agenda is, in many ways, the opposite of equality and justice. They think anything that helps you to
bypass institutions is, by default, empowering or liberating. You might not be able to pay for health care
or your insurance, but if you have an app on your phone that alerts you to the fact that you need to exercise more, or you
aren’t eating healthily enough, they think they are solving the problem.”
Impact—Authoritarianism
Internet freedom re-entrenches authoritarian regimes’ power and spills over globallyIran proves- results in net more surveillance
Morozov 11 (Evgeny Morozov. Writer and researcher who studies political and social implications of
technology. Senior writer at New Republic. “The Net Delusion.” 2011. P.10-14.)//EMerz
In just a few months, the Iranian government formed a high-level twelve-member cybercrime team and
tasked it with finding any false information—or, as they put it, “insults and lies”—on Iranian websites.
Those spreading false information were to be identified and arrested. The Iranian police began hunting the Internet for
photos and videos that showed faces of the protesters—numerous, thanks to the ubiquity of social
media—to publish them on Iranian news media websites and ask the public for help in identifying the individuals. In December 2009 the
pro-Ahmadinejad Raja News website published a batch of thirty-eight photos with sixty-five faces circled in red and a batch of forty-seven
photos with about a hundred faces circled in red. According
to the Iranian police, public tip-offs helped to identify and
arrest at least forty people. Ahmadinejad’s supporters may have also produced a few videos of their own, including a clip—which
many in the opposition believed to be a montage—that depicted a group of protesters burning a portrait of Ayatollah Khomeini. If people had
believed that the footage was genuine, it could have created a major split in the opposition, alienating vast swathes of the Iranian population.
The police or someone acting on their behalf also went searching for personal details—mostly Facebook profiles and email addresses— of
Iranians living abroad, sending them threatening messages and urging them not to support the Green Movement unless they wanted to hurt
the authorities were equally tough on Iranians in the country, warning
them to stay away from social networking sites used by the opposition. The country’s police chief Gen. Ismail Ahmadi
their relatives back in Iran. In the meantime,
Moghaddam warned that those who incited others to protest or issued appeals “have committed a worse crime than those who come to the
streets.” Passport control officers at Tehran’s airport asked Iranians living abroad if they had Facebook accounts; they would often doublecheck online, regardless of the answer, and proceed to write down any suspicious-looking online friends a traveler might have.
The
authorities, however, did not dismiss technology outright. They, too, were more than happy to harvest its benefits. They
turned to text messaging—on a rather massive scale—to warn Iranians to stay away from street protests in the future. One such message, sent
by the intelligence ministry, was anything but friendly: “Dear citizen, according to received information, you have been influenced by the
destabilizing propaganda which the media affiliated with foreign countries have been disseminating. In case of any illegal action and contact
with the foreign media, you will be charged as a criminal consistent with the Islamic Punishment Act and dealt with by the Judiciary.” In
the
eyes of the Iranian government, the Western media was guilty of more than spreading propaganda; they
accused CNN of “training hackers” after the channel reported on various cyber-attacks that
Ahmadinejad’s opponents were launching on websites deemed loyal to his campaign. Recognizing that the
enemy was winning the battle in the virtual world, one ayatollah eventually allowed pious Iranians to use any tool, even if it contravened
Shari’a law, in their online fight. “In a war, anti-Shari’a [moves] are permissible; the same applies to a cyberwar. The conditions are such that
you should fight the enemy in any way you can. You don’t need to be considerate of anyone. If you don’t hit them, the enemy will hit you,”
proclaimed Ayatollah Alam Ahdi during a Friday Prayer sermon in 2010. But the campaign against CNN was a drop in the sea compared to the
accusations launched against Twitter, which the pro-Ahmadinejad Iranian media immediately took to be the real source of unrest in the
country. An editorial in Javan, a hard-line
Iranian newspaper, accused the U.S. State Department of trying to
foment a revolution via the Internet by helping Twitter stay online, stressing its “effective role in the continuation of
riots.” Given the previous history of American interference in the country’s affairs—most Iranians still fret about the 1953 coup masterminded
by the CIA—such accusations are likely to stick, painting all Twitter users as a secret American revolutionary vanguard. In contrast to the
tumultuous events of 1953, the Twitter Revolution did not seem to have its Kermit Roosevelt, Theodore Roosevelt’s grandson and the
coordinator of CIA’s Operation Ajax, which resulted in the overthrow of the nationalist government of Mohammad Mosaddegh. But in the eyes
of the Iranian authorities the fact that today’s digital vanguards have no obvious charismatic coordinators only made them seem more
dangerous. (The Iranian propaganda officials could not contain their glee when they discovered that Kermit Roosevelt was a close relative of
John Palfrey, the faculty codirector of Harvard’s Berkman Center for Internet and Society, a think tank that the U.S. State Department had
Other governments also took notice, perhaps out of fear that they, too,
might soon have a Twitter Revolution on their hands. Chinese authorities interpreted Washington’s
involvement in Iran as a warning sign that digital revolutions facilitated by American technology
companies are not spontaneous but carefully staged affairs. “How did the unrest after the Iranian elections come about?”
funded to study the Iranian blogosphere.)
pondered an editorial in the People’s Daily, the chief mouthpiece of the Communist Party. “It was because online warfare launched by America,
via YouTube video and Twitter microblogging, spread rumors, created splits, stirred up, and sowed discord between the followers of
conservative reformist factions.” Another major outlet of government propaganda, Xinhua News Agency, took a more philosophical view,
announcing that “information technology that has brought mankind all kinds of benefits has this time become a tool for interfering in the
internal affairs of other countries.” A few months after the Iranian protests, China National Defense, an official outlet of the Chinese military,
ran a similar editorial, lumping April 2010 youth protests in Moldova with those of Iran and treating both as prime examples of Internetenabled foreign intervention. The editorial, singling out the United States as the “keenest Western power to add the internet to its diplomatic
arsenal,” also linked those two protests to an ethnic uprising in China’s own Xinjiang province in July 2009, concluding that more Internet
the irresponsible Iranrelated punditry in Washington allowed leaders in Beijing to build a credible case for more Internet
censorship in China. (The online blockade of the Xinjiang region only ended in early 2010.) Media in the former Soviet Union
took notice as well. “The Demonstrations in Iran Followed the Moldovan Scenario: The U.S. Got Burnt” proclaimed a headline on a
control was in order, if only “to avoid the internet becoming a new poisoned arrow for hostile forces.” Bizarrely,
Russian nationalist portal. A prime-time news program on the popular Russian TV channel NTV announced that the “Iranian protesters were
enjoying the support of the U.S. State Department, which interfered in the internal activities of Twitter, a trendy Internet service.” A newspaper
in Moldova reported that the U.S. government even supplied Twitter with cutting-edge anticensorship technology. This
was
globalization at its worst: A simple email based on the premise that Twitter mattered in Iran, sent by an
American diplomat in Washington to an American company in San Francisco, triggered a worldwide
Internet panic and politicized all online activity, painting it in bright revolutionary colors and
threatening to tighten online spaces and opportunities that were previously unregulated. Instead of
finding ways to establish long-term relationships with Iranian bloggers and use their work to quietly
push for social, cultural, and—at some distant point in the future—maybe even political change, the
American foreign policy establishment went on the record and pronounced them to be more dangerous
than Lenin and Che Guevara combined. As a result, many of these “dangerous revolutionaries” were
jailed, many more were put under secret surveillance, and those poor Iranian activists who happened
to be attending Internet trainings funded by the U.S. State Department during the election could not
return home and had to apply for asylum. (At least five such individuals got trapped in Europe.) The pundits were right: Iran’s
Twitter Revolution did have global repercussions. Those were, however, extremely ambiguous, and they often strengthened rather than
undermined the authoritarian rule.
Impact: No Solvency
The aff operates under half-baked predictions—sweeping future social and political
problems under the rug
Morozov 2011 (Evgeny [visiting scholar at Stanford University and a Schwartz fellow at the New
America Foundation]; The Net Delusion; p 314-5; kdf)
Hannah Arendt, one of America's most treasured public intellectuals, was aware of this problem back in the 1960s, when the "scientifically
minded brain trusters" -Alvin Weinberg was just one of many; another whiz kid with a penchant for computer modeling, Robert McNamara,
was put in charge of the Vietnam War-were beginning to penetrate the corridors of power and influence government policy. "The trouble [with
such advisers] is not that they are cold-blooded enough to 'think the unthinkable,"' cautioned Arendt in "On Violence," "but that they do not
'think:" "Instead of indulging in such an old-fashioned, uncomputerizable activity," she wrote, "they reckon with the consequences of certain
hypothetically assumed constellations without, however, being able to test their hypothesis against actual occurrences:' A
cursory
glimpse at the overblown and completely unsubstantiated rhetoric that followed Iran's Twitter
Revolution is enough to assure us that not much has changed. It was more than just the constant
glorification of technical, largely quantitative expertise at the expense of erudition that bothered
Arendt. She feared that increased reliance on half-baked predictions uttered by self-interested
technological visionaries and the futuristic theories they churn out on an hourly basis would prevent
policymakers from facing the highly political nature of the choices in front of them. Arendt worried that
"because of their inner consistency ... [such theories J have a hypnotic effect; they put to sleep our common sense:' The ultimate irony of
the modern world, which is more dependent on technology than ever, is that, as technology becomes
ever more integrated into political and social life, less and less attention is paid to the social and political
dimensions of technology itself. Policymakers should resist any effort to take politics out of technology;
they simply cannot afford to surrender to the kind of apolitical hypnosis that Arendt feared. The Internet is too
important a force to be treated lightly or to be outsourced to know-all consultants. One may not be able to predict its impact on a particular
country or social situation, but it would be foolish to deny that some impact is inevitable. Understanding how exactly various stakeholderscitizens, policymakers, foundations, journalists-can influence the way in which technology's political future unfolds is a quintessential question
facing any democracy. More than just politics lies beyond the scope of technological analysis; human nature is also outside its grasp.
Proclaiming that societies have entered a new age and embraced a new economy does not
automatically make human nature any more malleable, nor does it necessarily lead to universal respect
for humanist values. People still lust for power and recognition, regardless of whether they accumulate it by running for office or
collecting Facebook friends. As James Carey, the Columbia University media scholar, put it: "The 'new' man and woman of the 'new age' strikes
one as the same mixture of greed, pride, arrogance and hostility that we encounter in both history and experience:' Technology changes all the
time; human nature hardly ever. The fact that do-gooders usually mean well does not mitigate the disastrous consequences that follow from
their inability (or just sheer lack of ambition) to engage with broader social and political dimensions of technology. As the German psychologist
Dietrich Dorner observed in The Logic of Failure, his masterful account of how decision-makers' ingrained psychological biases could aggravate
existing problems and blind them to the far more detrimental consequences of proposed solutions, "it's far from clear whether 'good intentions
plus stupidity' or 'evil intentions plus intelligence' have wrought more harm in the world:' In reality, the fact that we mean well should only give
us extra reasons for scrupulous self-retrospection, for, according to Dorner, "incompetent people with good intentions rarely suffer the qualms
of conscience that sometimes inhibit the doings of competent people with bad intentions:'
Morozov Prodicts
Morozov is qualified af – he’s had a firsthand experience of both authoritarianism
and social media’s explosive rise as well as a Standford scholar
Pilkington 11, (Ed, chief reporter for Guardian US. He is a former national and foreign
editor of the Guardian, “Evgeny Morozov: How democracy slipped through the net”,
http://www.theguardian.com/technology/2011/jan/13/evgeny-morozov-the-netdelusion)
On 15 June 2009, while thousands of Iranians were streaming on to the streets of Tehran to protest
against the disputed results of the presidential election, Jared Cohen, an official in the US state
department, quietly sent an email to Twitter. Despite coming from the youngest member of America's
foreign policy arm – Cohen was just 27 at the time – it was surprisingly serious. Cohen wrote that, in the
view of the Obama administration, Twitter was playing a crucial role in Iran as a way for protesters to
communicate. He implored the social networking site to delay routine maintenance work it had planned
for the following day that would have brought down all its feeds in Iran and possibly disrupted the
organisation of the protests. Twitter complied, putting off the maintenance for 24 hours, thus allowing
the flow of tweets to continue uninterrputed. The demonstrations grew and grew.∂ At face value the
exchange was harmless – an example of government and business working together to forward
America's interests abroad. But in the eyes of one scholar, this apparently benign interaction was to
have powerfu, unforeseen consequences. In Evgeny Morozov's analysis, Cohen's email set a dangerous
precedent, convincing the Iranian leadership, and many other authoritarian regimes around the world,
that the US government was in cahoots with Silicon Valley and that the internet was being turned into
an extension of politics by other means.∂ chief reporter for Guardian US. He is a former national and
foreign editor of the paper,The email was taken as evidence that the US government was behind the
protests, and that in turn was used to portray all Twitter users in Iran as agents of the west. People who
were blogging about cappuccinos found themselves transformed into Lech Walesa."∂ Digital retribution
was swift. The jails began to fill.∂ Morozov is fast becoming a leading voice of what might be called the
cyber-sceptic school of internet studies, at a time when such views are becoming more fashionable.
After so many grand predictions have been made about the world-changing potential of Twitter and
Facebook, the backlash has set in, with pundits now questioning whether the web is all it's cracked up to
be. Take Zadie Smith, for example, who recently wondered aloud in the New York Review of Books
whether social networking is creating a generation of People 2.0, or Malcolm Gladwell who cited
Morozov in a New Yorker article in October that cast doubt on Twitter and Facebook as instruments of
genuine change.∂ Morozov's status in this burgeoning camp of sceptics can only be enhanced by his new
book, The Net Delusion, which chronicles what he sees as the inflated hopes invested by the west in the
internet and the damage that has been caused as a result. Yet he cuts an unlikely figure for someone
playing a central role in an increasingly vital debate about the place of social media around the globe.∂
For a start, there's his age. At 26, he's even younger than Cohen was when he fired off that fateful email.
And then there's his background. Far from the twin Meccas of new technology – northern California and
New York – Morozov hails from a small potassium-mining town in Belarus. His parents worked for the
mining company, as did everybody else in Soligorsk (which translates as "mountains of salt"). "I know
more about potassium than I like to admit," he says.∂ But it's precisely his decidedly old world, highly
ungeeky, roots that make Morozov a credible observer of the west's uses, and abuses, of the internet.
They give him an affinity with those who live under authoritarian regimes, having grown up in Belarus,
which Condoleezza Rice once described as the last outpost of tyranny in Europe.∂ As we sit and talk in a
cafe near Capitol Hill in Washington, Morozov admits rather sheepishly that in the beginning he was
himself a passionate believer in the democratising potential of the web. After school, he moved to
Bulgaria with the benefit of a grant from George Soros's Open Society Institute and then worked for an
NGO in Berlin. He even become one of the first to use the term "Twitter revolution" at the time of the
protests in Moldova in April 2009.∂ "It was hard not to be infected by a sense of optimism and
excitement about the freedom agenda that was around at that time. I genuinely thought it was making a
difference. Democracy appeared to be advancing and marching, and the web 2.0 seemed to be part of
it, bringing people on to the streets."∂ The doubts set in, tentatively at first, with Moldova. After the
protests ended, it transpired that there hadn't been that many Twitter users in the country, and that
other forms of communication – including the good old telephone – had been just as important.∂ Then
when Tehran erupted, Morozov had a deepening sense that the claims being made for the internet as a
pro-democracy force were being wildly exaggerated. In his book, he points his finger at those he accuses
of hype, or as he puts it "cyber-utopianism" such as New York University's Clay Shirky – "this is it, the big
one, the first revolution transformed by social media" – Mark Pfeifle, a former George Bush adviser who
tried to get Twitter nominated for the Nobel peace prize, and our friend Cohen again, who called
Facebook "one of the most organic tools for democracy the world has ever seen". The Guardian also
gets a name-check, with Morozov referring to an op-ed that proposed to "bomb Iran with broadband".∂
The more he looked into it, the more he came to the conclusion that western views of social networking
were hopelessly naive and out of kilter with the realities on the ground. "Because of cyber-utopian
ideas, for the past 10 years the west has failed to think about how to use the internet to its best
advantage," he says. "Instead of really thinking about how to address these issues, we have spent too
much time extolling the power of Silicon Valley to conquer authoritarianism simply by opening offices in
Vietnam or China."
Morozov cites a litany of empirics and has a rigorous analysis of history – human
nature is not to utilize the internet for activism but leads to complacency.
Prston 11, (John, critic for the Daily and Sunday Telegraph, “The Net Delusion by
Evgeny Morozov: review”, http://www.telegraph.co.uk/culture/books/8241377/TheNet-Delusion-by-Evgeny-Morozov-review.html)
It is only recently that the clouds of guff have parted and people have begun to recognise this for the
nonsense it is. What’s become all too plain is that the internet can just as easily be used to control
people as it can to educate them. After the failed uprising in Iran, the government hunted down
dissidents online, tracking them through their emails and using face-recognition technology to identify
people from pictures taken on mobile phones.∂ But it’s not just the Iranians: they’re all at it. AlQaeda has proved to be as proficient in using the internet as its Western opponents, while the Chinese
government recently devised a program called Green Dam that analyses people’s internet habits and
shuts off access to sites it disapproves of. Hearteningly, the program has proved to have a number of
insoluble glitches. To try to stop people accessing pornography, Green Dam shut down any site featuring
unusual amounts of the colour pink – denoting skin tones. However, to the government’s fury, naked
dark-skinned people continued to sail unscathed through the censorship portals.∂ And herein lies one of
the key arrows that has pierced the heart of all this cyber-idealism. People, given access to unfettered
information, don’t necessarily strive for freedom. All too often, they’ve got less elevated things on
their minds.∂ In 2007, a group of wealthy geeks in the West volunteered to lend their computer
bandwidth to people in countries with repressive regimes in the hope – the confident hope – they’d
soon educate themselves about the horrors of their various regimes. Instead, they promptly went in
search of pictures of Gwen Stefani in her underwear and Britney Spears out of it.∂ If only these idealists
had paid more attention to the lessons of recent history. The notion that more information inevitably
leads to a greater desire for freedom took a battering in the Seventies and Eighties in East Germany –
the only communist country with ready access to the Western media. Far from fanning the flames of
liberation, a diet of television programmes from the United States dampened them down to a
conveniently quiescent level. Paying no attention to the latest news from Nato, East Germans lay supine
and glassy-eyed in front of endless repeats of Dallas and Dynasty.∂ An American academic who taught in
East Berlin in the late Eighties remembers that when he brought in a map of the US for his students,
they showed little interest in anything other than the precise locations of Denver and Dallas. This,
Morozov argues, doesn’t mean there’s no correlation between greater information and a striving for
freedom; just that it’s a far more complex issue than most people have chosen to recognise.∂ The
Net Delusion injects a welcome dose of common sense into an issue that’s been absurdly lacking in it.
At his best, Morozov is lively and combative, as well as dauntingly well-informed – his bibliography alone
runs to 70 pages.
tech bubble da
notes:
unicorns are in reference to tech start-ups that are worth at least $1 billion, like uber
and snapchat (they’re called unicorns bc their horns are close to bursting the bubble
and bc it was rare for tech startups to be worth that much)
here’s a visual representation:
1NC
Tech bubble collapse is inevitable, letting it happen now ensures a soft-landing
Mahmood 6/26 (Tallot; The Tech Industry Is In Denial, But The Bubble Is About To Burst; Jun 26 2015;
techcrunch.com/2015/06/26/the-tech-industry-is-in-denial-but-the-bubble-is-about-to-burst/; kdf)
In the face of these trends, a small group
of well-respected and influential individuals are voicing their concern.
They are reflecting on what happened in the last dot-com bust and identifying fallacies in the current unsustainable
modus operandi. These relatively lonely voices are difficult to ignore. They include established successful entrepreneurs, respected VC and
hedge fund investors, economists and CEOs who are riding their very own unicorns. Mark Cuban is scathing in his personal blog, arguing that
this tech bubble is worse than that of 2000, because, he states, that unlike in 2000, this time the
“bubble comes from private
investors,” including angel investors and crowd funders. The problem for these investors is there is no liquidity in their
investments, and we’re currently in a market with “no valuations and no liquidity.” He was one of the fortunate ones who exited his company,
Broadcast.com, just before the 2000 boom, netting $5 billion. But he saw others around him not so lucky then, and fears the same this time
around. A number of high-profile investors have come out and said what their peers all secretly must know. Responding to concerns raised by
Bill Gurley (Benchmark) and Fred Wilson (Union Square Ventures), Marc Andreessen of Andreessen Horowitz expressed his thoughts in an 18tweet tirade. Andreessen agrees with Gurley and Wilson in that high cash burn in startups is the cause of spiralling valuations and
underperformance; the availability of capital is hampering common sense. The
tech startup space at the moment resembles
the story of the emperor with no clothes. As Wilson emphasizes, “At some point you have to build a real business, generate real
profits, sustain the company without the largess of investor’s capital, and start producing value the old fashioned way.” Gurley, a stalwart
investor, puts the discussion into context by saying “We’re in a risk bubble … we’re taking on … a level of risk that we’ve never taken on before
in the history of Silicon Valley startups.” The
tech bubble has resulted in unconventional investors, such as hedge funds,
in privately owned startups. David Einhorn of Greenlight Capital Inc. stated that although he is bullish on the tech sector, he
believes he has identified a number of momentum technology stocks that have reached prices beyond
any normal sense of valuation, and that they have shorted many of them in what they call the “bubble
basket.” Meanwhile, Noble Prize-winning economist Robert Shiller, who previously warned about both the dot-com and
housing bubbles, suspects the recent equity valuation increases are more because of fear than exuberance. Shiller believes that
“compared with history, US stocks are overvalued.” He says, “one way to assess this is by looking at the CAPE (cyclically
adjusted P/E) ratio … defined as the real stock price (using the S&P Composite Stock Price Index deflated by CPI) divided by the ten-year
average of real earnings per share.” Shiller says this has been a “good predictor of subsequent stock market returns, especially over the long
run. The CAPE ratio has recently been around 27, which is quite high by US historical standards. The only other times it is has been that high or
higher were in 1929, 2000, and 2007 — all moments before market crashes.” Perhaps the most surprising contributor to the debate on a
looming tech bubble is Evan Spiegel, CEO of Snapchat. Founded in 2011, Spiegel’s company is a certified “unicorn,” with a valuation in excess of
$15 billion. Spiegel
believes that years of near-zero interest rates have created an asset bubble that has led
people to make “riskier investments” than they otherwise would. He added that a correction was inevitable.
Governmental attempts to reflate the bubble will fail – letting it burst now is the only
way to insure economic regrowth
Schiff and Downes 15 [Schiff, Peter D., and Downes, John. Crash Proof 2.0 : How to Profit from the
Economic Collapse (2nd Edition). Hoboken, NJ, USA: John Wiley & Sons, 2011. ProQuest ebrary. Web. 19
July 2015.]//kmc
I fear that government spending on the scale being contemplated will change the character of our
economy by moving us in the direction of central planning. That is the opposite of free-market
capitalism. Our economy needs to be restructured from the foundation up to regain the viability it had
when profit-minded people were making the important decisions and the United States was becoming
the world’s leading industrial power.∂ Yet what the government is about to do is spend massive
amounts of taxpayer money to reflate a consumer-driven bubble economy. Its objective is to get consumers
using credit again, to go back to the malls, to buy more cars, to carry more credit cards, and to take out more student loans. But buying
stuff we couldn’t afford with money we didn’t have was what got us into this fix. We’ve consumed too
much and have more than we need, and until we stop consuming and start saving and producing, our
economy will never enjoy a real recovery.∂ Get credit flowing again? There’s nothing to flow. The banks blew their money on
bad loans. That money is gone. The only way we can restore our banking system is with savings. To get from here to there,
we have to allow a lot of banks to fail. We can’t just print money and tell banks to lend it out. There is
no productivity associated with that. ∂ It also appears that first on the agenda of Treasury Timothy Geithner is to revitalize the
market for assetbacked securities. He wants to help Wall Street securitize more consumer debt (mortgages, credit cards, and auto and student
loans) and sell it to leveraged hedge funds and overseas investors. In other words, he wants to re-create the very conditions that brought our
economy to the brink. Rather then encouraging American borrowers to once again tap the savings of foreigners, we should allow our domestic
pool of savings to be replenished. The main reason securitization flourished in the first place was that after we depleted our own savings,
securitization was the best way to gain access to everyone else’s. But since the money financed consumption, we simply lack the productive
capacity to pay it back. President
Obama says if we don’t act quickly on a rescue plan, we’re in for a
catastrophe. I say if we do intervene we’re in for a bigger catastrophe, which, in a worst-case scenario,
means a repeat of the Great Depression, this time with hyperinflation instead of deflation. In short,
the government is about to pour gasoline on the wildfire it set.
Uniqueness
Tech bubble on the brink of burst – but it’s not as bad as you’d think
Mims 6/28 [Christopher, 2015. Why This Tech Bubble Is Less Scary. http://www.wsj.com/articles/whythis-tech-bubble-is-less-scary-1435532398 7/17]//kmc
Is tech in a bubble? I think so. The signs are all around us. The good news is, it’s nothing like the last one. Plus, for
reasons that go beyond the usual impossibilities of economic prognostication, no one can say for sure
what’s going on. Many people seem to find this reassuring, but we would be wise to heed the lesson that a lack of transparency about the
mechanics of a market rarely leads anywhere good.∂ But first, let’s define what kind of a bubble tech might be in. It isn’t like the bubble of
1997-2000, the Kraken of legend that came from the depths to wreak havoc on the whole of the U.S. economy. That was a genuine, oldfashioned stock market bubble, with money pouring into publicly held tech companies that couldn’t justify the investment.∂ If I’m right, and
what we’re experiencing now is a kind of Bubble Jr., any correction will be less widespread.∂ In 2015’s less-terrifying sequel to 1999, everyone is
to be commended for avoiding the worst excesses of the past, the empty vehicles for irrational exuberance like Pets.com.∂ Companies like
Postmates and Shyp are hardly equivalent to infamous delivery service flameout Kozmo. Ideas that didn’t work the last time around have been
reinvented as leaner business models, in which no one owns anything, such as inventory or has any relationship with the bulk of their
workforce other than as independent contractors.∂ Better software, two-sided marketplaces and the gig economy make plenty of startups at
least plausible, which isn’t to say they will all work out in the end.∂ This
bubble, if it is one, is being inflated by what are
relatively tiny amounts of money. That might seem like a strange way to describe the billions in latestage valuations that make headlines daily. However, consider the funding sources: mutual funds,
sovereign-wealth funds, hedge funds, and somewhat haphazard agglomerations of other big investors
with a particular interest in a startup, like the group putting money into Internet-from-space startup
OneWeb, which just got $500 million from, among others, Coca-Cola Co.∂ Startups are staying private
longer than ever, and the key to this phenomenon is that these big investors are willing to hand them
money despite the fact their having not yet gone through the baptism by fire that is an initial public
offering, which includes scrutiny from the Securities and Exchange Commission, sell-side analysts and the financial press.∂ “There’s no
longer a bright line where a company moves from being a venture-backed startup to, ‘We’re only a
public company,’” says Andrew Boyd, head of global equity capital markets at Fidelity. He adds that Fidelity’s own team of 135 analysts
subject all their private investments to quarterly earnings calls and tough questions, just as they would a public company. ∂ That said, the
bottom line is that for good and for ill, growing numbers of everyday investors are exposed to late-stage private tech companies.∂ One of
Fidelity’s largest funds, Fidelity Contrafund, has only about 1% of its assets in venture-backed startups, says Mr. Boyd. But Contra is a $110
billion fund, which means that what’s a rounding error to a bank with trillions in assets buys a hell of a lot of coders and prime San Francisco
office space.∂ This pattern is typical across investors, says Mike Stiller, a technology analyst at Nasdaq advisory services. All the funds he is
looking at are putting just 1% or 2% of their assets into private deals, if that.∂ But the thing about investments that are made in the margins of a
fund is that they can disappear just as quickly as they appeared. Which means the boom and bust cycles that typify the tech world can be
inflated or deflated practically overnight.∂ When it comes to investing in late-stage rounds of financing for startups, “we don’t have a mandate
to do this,” says Mr. Boyd. “If we do zero of this in a year, it’s fine,” he adds.∂ If we allow that the euphemisms investors use to describe the
current climate in the tech sector—the most popular one is “frothy”—make it at least plausible that tech is in a bubble, the next question is, so
what?∂ Bubbles
pop, or if you prefer, markets correct. And when they do, a whole lot of companies will
lose a lot of value on paper, leading them to eventually go public for less than they were only recently
valued by private investors.∂ “There’s one thing that’s crystal clear, which is that as soon as the market has a downturn,
private unicorns will almost certainly disappear,” says Jason Lemkin, managing director of venture-capital firm Storm
Ventures. “We’ll have a tenth as many as we have today.”∂ If Mr. Lemkin is right, globally that would mean the demotion of
about 90 startups. This could affect some financiers’ bonuses, but it would hardly affect the wider
economy—which in this scenario is probably reeling from some other macroeconomic shock, anyway.
--xt Bubble will collapse
Bubble will collapse
Mahmood 2015 (Tallot; The Tech Industry Is In Denial, But The Bubble Is About To Burst; Jun 26;
techcrunch.com/2015/06/26/the-tech-industry-is-in-denial-but-the-bubble-is-about-to-burst/; kdf)
The fact that we are in a tech bubble is in no doubt. The fact that the bubble is about to burst, however,
is not something the sector wants to wake up to. The good times the sector is enjoying are becoming
increasingly artificial. The tech startup space at the moment resembles the story of the emperor with no
clothes. It remains for a few established, reasoned voices to persist with their concerns so the majority
will finally listen.
link – economy
The aff’s attempt to repair the economy delays the tech bubble – insures burst will
ruin the economy – a natural burst is key
Blodget 08 [Henry, December. Henry Blodget is CEO and Editor-In Chief of Business Insider. Why Wall
Street Always Blows It. http://www.theatlantic.com/magazine/archive/2008/12/why-wall-street-alwaysblows-it/307147/ 7/19]//kmc
AS WE WORK our way through the wreckage of this latest colossal bust, our government—at our
urging—will go to great lengths to try to make sure such a bust never happens again. We will “fix” the
“problems” that we decide caused the debacle; we will create new regulatory requirements and systems; we will throw a lot
of people in jail. We will do whatever we must to assure ourselves that it will be different next time. And as
long as the searing memory of this disaster is fresh in the public mind, it will be different. But as the bust
recedes into the past, our priorities will slowly change, and we will begin to set ourselves up for the next
great boom.∂ A few decades hence, when the Great Crash of 2008 is a distant memory and the economy is humming along again, our
government—at our urging—will begin to weaken many of the regulatory requirements and systems we
put in place now. Why? To make our economy more competitive and to unleash the power of our freemarket system. We will tell ourselves it’s different, and in many ways, it will be. But the cycle will start
all over again.∂ So what can we learn from all this? In the words of the great investor Jeremy Grantham, who saw this collapse coming and
has seen just about everything else in his four-decade career: “We will learn an enormous amount in a very short time, quite a bit in the
medium term, and absolutely nothing in the long term.” Of course, to paraphrase Keynes, in the long term, you and I will be dead. Until that
time comes, here are three thoughts I hope we all can keep in mind.∂ First, bubbles
are to free-market capitalism as
hurricanes are to weather: regular, natural, and unavoidable. They have happened since the dawn of
economic history, and they’ll keep happening for as long as humans walk the Earth, no matter how we
try to stop them. We can’t legislate away the business cycle, just as we can’t eliminate the self-interest that makes the whole capitalist
system work. We would do ourselves a favor if we stopped pretending we can.∂ Second, bubbles and their aftermaths aren’t all
bad: the tech and Internet bubble, for example, helped fund the development of a global medium
that will eventually be as central to society as electricity. Likewise, the latest bust will almost certainly lead to a
smaller, poorer financial industry, meaning that many talented workers will go instead into other careers—that’s probably a healthy
rebalancing for the economy as a whole. The current bust will also lead to at least some regulatory improvements that endure;
the carnage of 1933, for example, gave rise to many of our securities laws and to the SEC, without which this bust would have been worse.∂
Lastly, we who have had the misfortune of learning firsthand from this experience—and in a bust this big, that group includes just about
everyone—can take pains to make sure that we, personally, never make similar mistakes again. Specifically, we can save more, spend less,
diversify our investments, and avoid buying things we can’t afford. Most of all, a few decades down the road, we can raise an eyebrow when
our children explain that we really should get in on the new new new thing because, yes, it’s different this time.
Link – internet
Bubbles become worse when inflated – the aff’s attempt to boost the internet creates
increasing values and decreasing demands, making the burst worse
Janeway 5/28 [William J, 2015. Unicorns: Why This Bubble Is Different.
http://www.forbes.com/sites/valleyvoices/2015/05/28/unicorns-why-this-bubble-is-different/
7/19]//kmc
Bubbles are banal; bubbles are necessary. Bubbles are banal: wherever markets in assets exist, there
will be found the persistent recurrence of momentum investing, herding behavior, and prices decoupled
from any concern with past, present or prospective cash flows. Bubbles are necessary: they mobilize capital to
fund the deployment of transformational technologies and the exploration of their use on a scale far
beyond what would be generated if investment were strictly a function of observable financial returns
and economic value.∂ Over the past year or so, a phenomenon has emerged at the frontier of the digital economy: a wave of ventures
delivering “disruptive” web services: Uber, Airbnb and their kin, generically known as “unicorns,” that share the double distinction of being
valued at more than $1 billion while remaining private companies. How can we know whether these unprecedented valuations, some 107 of
them at latest count, represent a bubble…and, if so, why this bubble is different?∂ Financial
bubbles can be distinguished and
categorized along two dimensions. The first dimension is the object of speculation. Charles Kindleberger, in his
masterful work Manias, Panics and Crashes, laid out the extraordinary spectrum of assets that have been the foci of bubbles:∂ Investors
have speculated in commodity exports, commodity imports, agricultural land at home and abroad, urban building sites,
railroads, new banks, discount houses, stocks, bonds (both foreign and domestic), glamour stocks, conglomerates, condominiums, shopping
centers and office buildings.∂ Occasionally, as in the case of railroads and some glamour stocks – for example, those
representing the
companies that commercialized electricity, radio, aviation, computing, the internet – the economic assets on which
financial speculators focus have the potential to deliver step-function changes in productivity and, indeed, in
the very scope of economic possibilities. Today’s unicorns appear to embody precisely that promise.∂ The second
dimension is the locus of speculation: is the bubble expressed in the prices of traded securities in the
liquid capital markets or is it driving the valuation of assets held (or serving as collateral for assets held) by the
institutions of the credit system? The distinction has enormous consequences when, inevitably, the bubble bursts. The markets of
the real economy can shrug off a collapse in prices in the relatively unleveraged financial markets for equites and junk bonds. But a collapse in
the value of the assets held by highly leveraged banks freezes the provision of working capital across the entire economic system. The contrast
between the economic consequences of the implosion of the dotcom/telecom/internet bubble of 1998-2000 versus the Global Financial Crisis
of 2008-9 is definitive.∂ Wherever they arise,
bubbles share a common signature. Whether speculation is limited to the liquid
capital markets or whether it infects the core credit system, the signature of a bubble is this: as prices rise, demand
increases. Against the conventional pattern of “negative feedback” that associates higher prices with
lower demand (and greater supply) – a response that is essential to the establishment and maintenance
of market equilibrium – the demand curve inverts in a bubble.∂ Bubbles in stock prices “are associated with increases in
trading volumes…a well- established stylized fact.” Bubbles in the credit system have a similar profile: higher prices of
the assets held by leveraged financial institutions feed through to increase the value of their equity with
a multiplier effect on their lending capacity: “When the price of a risky assets rises, the leveraged
financial institution purchases more of the risky asset….But then, the additional purchases of risky
assets…fuel the asset price boom further.”∂ It is along this second dimension that speculation on the future economic value of
the unicorns is different. For its venue is neither the credit system nor the public, liquid capital market. The venue of this bubble is the market
for private placement of equity securities with institutional investors – hedge funds, mutual funds, even sovereign wealth funds – whose
portfolios overwhelmingly consist of public, freely trade-able shares.
impact - solves the economy
Letting the bubble burst now is best for the economy – reconstruction to avoid the
bubble economy creates uneven patterns of economic decline and a rise in global
inequality in the future
Tabb 04 [Tabb, William K.. Economic Governance in the Age of Globalization. New York, NY, USA:
Columbia University Press, 2004. ProQuest eLibrary. Web. 19 July 2015.]//kmc
The operation of the globalization process takes place within, and is mediated by, a set of governance frameworks stretching from the global to
the local. It is the nature of these institutions, their operation, and the ways they could be reformed which are of interest. Accepting
the
free market outcome is not really a possibility because markets are always embedded in a larger
societal framework. Markets need rules for contracting, standards for judging what is permissible behavior by participants, and
enforcement of contracts. When market outcomes are experienced as favoring a smaller minority and seriously
discommode majorities there are political ramifications, resistance, and organizational efforts which
eventually change the rules. This has historically been the case. One presumes it will continue to be so.∂ It is well to remember that
capitalism is always a process of redistributive growth. Its innovations are normally efficiency
enhancing as this term is used by economists. They raise living standards on average and over time. But they do
so in ways which typically sacrifice the interests of much of a generation of workers who are made obsolete and
to whom little or no compensation is offered. While other workers get jobs in the emergent industries, it is rare that displaced workers,
especially older ones, do as well in the new conjuncture. A generation of such workers and whole communities which depend on their custom
for livelihood may wither. It is not enough to say that the general gain to society would be enough to offer adequate compensation. Such
compensation may be possible in theory but is rarely paid in practice. Indeed, if such compensation were mandatory, the pace and form of
change would be very different.∂ As global neoliberalism has gained momentum, the growth of real output has slowed. In the so-called Golden
Age (1950 through 1973) real world GDP growth averaged 4.9 percent. It was only 3.3 percent a year in the 1980s and 2.3 percent for the 1990s
leading some economists to ask whether the structures and practices of neoliberalism generated dilatory global growth. The
pressure to
cut costs and increase profit, while always present in our economic system, was mediated in the
postwar period by policies protecting national economies through tripartite agreements and fiscal
stimulus. The former has gone by the boards as corporations have raised their sights to global horizons. The latter is ineffective, or surely
less effective given the leakages created by the greater mobility of capital. Simultaneous expansions by competing transnationals seeking to
position themselves to seize global markets have produced overinvestment relative to demand.
Demand itself is repressed by the
redistributions, fiscal priorities, and labor market policies of national governments designed to attract
investment. The rise of inequality globally is linked both to GSEGI disciplinary measures and the restructuring of
economies in ways which have produced uneven patterns of economic development and periodic
crises resulting from cycles of too rapid capital inflows, speculative excesses, and collapse of bubble
economies.
AT: Internet Advantages
Censorship Good – ISIS
1NC
Censorship is key to block ISIS
Bradshaw 2015 (Tom [Senior lecturer in Journalism at U of Gloucestershire]; Why 2015 is gearing up
to be the year of censorship; theconversation.com/why-2015-is-gearing-up-to-be-the-year-ofcensorship-35693; kdf)
India’s government has displeased many internet users by blocking access to some major websites at
the start of the new year. A total of 32 sites were blocked, although sanctions have been lifted from the
three most famous sites on the list: software development platform GitHub and video sites Vimeo and
Dailymotion. The decision to block the sites was reportedly over concerns that they were hosting
content by terrorist groups. For many Westerners, democracy and free speech are inextricably
connected, so the idea of curtailing freedom of expression in the interests of political stability seems
illiberal and even totalitarian. But India is not alone in feeling the need to take some action. Some initial
battles took place last year, but it looks as if 2015 will really be the year in which internet censorship will
become a war. British prime minister, David Cameron, and other Western leaders have been forced to
confront a difficult issue in 2014, as Islamic State showed how deftly it could appropriate social media
networks to spread its jihadi manifesto. What happens when terrorists commandeer global media
networks and use them to disseminate propaganda aimed at undermining democratic, secular
governance? The response from politicians has been to lean heavily on internet service providers,
making them do more to remove jihadi material. This approach is regarded as unjustifiable censorship
by critics, including the Index on Censorship, which has argued for the right of people to decide for
themselves whether they view such content. Corporate censorship For their part, social media
companies such as Twitter have been taking down accounts linked to IS, even though employees have
been threatened with death for doing so. And YouTube has been working hard to remove jihadi material
that glorifies violence. But if you’re determined to find a video of an IS beheading, you will find one. One
student casually remarked to me during a recent lecture that he’d watched a beheading video only a
few nights earlier, in rather the same way as if he might have mentioned that he’d caught up on an
episode of The Simpsons. There are some who passionately believe that such videos should remain
accessible. The Index on Censorship argues that allowing governments or media corporations to decide
who watches what is the start of a process that leads, ultimately, to the muzzling of dissent and
difference. Those who believe this content shouldn’t be viewed can urge others not to watch it, as
Twitter users did in August with the #ISISmediablackout hashtag. Still, while one or more people can
choose not to look, the content will still be available unless politicians take action. And as Cameron
ponders just how he should do that in 2015 without triggering accusations of censorship, he could
consider a lesson in recent British history. The oxygen of publicity The British government formally
ended a high-profile dalliance with censorship 20 years ago when it lifted restrictions on how the media
could report the Troubles in Northern Ireland. From 1988 to 1994, broadcasters were banned from
airing the words spoken directly by the Irish Republican party, Sinn Fein, and by specified paramilitary
organisations. As it turned out, broadcasters could use actors and reported speech to convey the
content of such organisations. Interviews with Sinn Fein’s leader Gerry Adams were televised and his
exact words broadcast, just with the voice of an actor dubbed over the top. This all prompted questions
about just how the law was depriving Sinn Fein and other organisations of what Margaret Thatcher
termed the “oxygen of publicity”. Since then, the digital revolution has transformed the media, enabling
terrorists to reach new audiences. By setting up a social media account, jihadis can immediately give
themselves a voice with a reach that is potentially global. As a result the UK government is now engaged
in a similar battle to that which took place during the Troubles, but the goalposts have been significantly
widened. Last month, Cameron announced he wants companies to be more proactive in taking down
“harmful material”. He also called for stronger filters and an on-screen button to report jihadi material.
Talk of filters induces queasiness in the anti-censorship lobby – and for good reason. Censorship of the
web is regularly used by repressive regimes to retain control over what is said online. But the trouble for
those who oppose such restrictions is that a traditional argument against censorship has been
undermined – arguably by Twitter more than any other organisation. Social media often means that
debate is conducted via short statements that contain emotional responses. Abbreviated words, images
and hashtags often replace reasoned discourse. Almost by design, Twitter is not conducive to the sort of
patient argument needed to express a controversial opinion and justify it to your critics. So world
leaders have started running out of options. The indicators are that they won’t leave it to chance this
year and that censorship will continue to be deployed through a combination of government and
corporate activity. What started in a panic in 2014, will become something altogether more structured
and powerful in the 12 months to come.
ISIS uses the internet as a means of recruiting and financial support
Ajnaili 2014 (Mustapha; How ISIS conquered social media; June 24;
english.alarabiya.net/en/media/digital/2014/06/24/How-has-ISIS-conquered-social-media-.html; kdf)
After seizing swathes of land in Iraq and Syria, the Al-Qaeda-inspired Islamic State of Iraq and Syria is
expanding its presence on social media, using sophisticated techniques to recruit fighters, spread its
propaganda and garner financial support. One of these techniques is a Twitter application called “Fajr alBashaer,” or “Dawn of Good Tidings” (@Fajr991). The application - flagged by Twitter as “potentially
harmful” - requests user data and personal information. After downloading it, the app sends news and
updates on ISIS fighting in Syria and Iraq. A recent report estimates that hundreds of users have
subscribed to the application on the internet or their Android smart phones using the Google Play store.
ISIS spurs CBW terrorism
Budowsky 14 (LL.M. degree in international financial law from the London School of Economics, aide
to former Sen. Lloyd Bentsen and Bill Alexander - chief deputy majority whip of the House Brent
Budowsky, Budowsky: ISIS poses nuclear 9/11 threat, http://thehill.com/opinion/brentbudowsky/215603-brent-budowsky-isis-poses-9-11-scope-threat)
I vehemently opposed the misguided Iraq War from the moment it was proposed by former President George W. Bush and have never been a
ISIS has stated its intention to
attack the United States and Europe to advance its evil, messianic and genocidal ideology and ambitions. ISIS
has the money to purchase the most deadly weapons in the world, and has recruited American and
European traitors with above-average capability to execute an attack. The odds that ISIS can obtain
nuclear, chemical, biological or other forms of mass destruction weapons are impossible to ascertain
but in a world of vast illegal arms trafficking, with so many corrupt officials in nations possessing arsenals of destruction, the danger is
real. The fact that WMD scares prior to the Iraq War ranged from mistaken to deceitful does not mean
that the WMD danger does not exist today. It does. I applaud the recent actions taken by President Obama. Obama’s
neoconservative, warmonger or super-hawk. But aggressive action against ISIS is urgently needed.
airstrikes saved tens of thousands of Yazidis from genocide, took back the Mosul Dam from ISIS and saved countless Iraqis, Kurds and Syrians
from slaughter. The airstrikes inflicted material damage to ISIS. The diplomacy of Obama and Secretary of State John Kerry contributed mightily
to the replacement of a disastrous Iraqi government by a government can unite Iraqi Sunnis, Shiites and Kurds. The Obama-Kerry initiatives will
lead to the creation of a stable Afghan government and avoid the collapse that was possible after the recent controversial Afghan elections.
These are real successes. In the current political climate, Obama seems to get credit for nothing, but he deserves great credit for some
important successes in recent weeks. And yet the
danger of ISIS pulling off a nuclear, chemical, biological or other
mass death 9/11-style attack in a major American or European city is real. Even with dirty or primitive WMD
weapons, the casualty totals could be catastrophic. ISIS must be defeated and destroyed. This will not be
achieved with “boots on the ground” proxies from Iraqi or Kurd forces alone, though Kurdish forces should immediately receive strong military
assistance.
Extinction
Mhyrvold 13 (Nathan, Began college at age 14, BS and Masters from UCLA, Masters and PhD,
Princeton "Strategic Terrorism: A Call to Action," Working Draft, The Lawfare Research Paper Series
Research paper NO . 2 – 2013, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290382)
A technologically sophisticated terrorist group could develop such a virus and kill a large part of humanity
with it. Indeed, terrorists may not have to develop it themselves: some scientist may do so first and publish the details. Given
the rate at which biologists are making discoveries about viruses and the immune system, at some point in the near future, someone may
create artificial pathogens that could drive the human race to extinction. Indeed, a detailed specieselimination plan of this nature was openly proposed in a scientific journal. The ostensible purpose of that particular
research was to suggest a way to extirpate the malaria mosquito, but similar techniques could be directed toward humans.16 When I’ve talked
to molecular biologists about this method, they are
quick to point out that it is slow and easily detectable and
could be fought with biotech remedies. If you challenge them to come up with improvements to the
suggested attack plan, however, they have plenty of ideas. Modern biotechnology will soon be capable,
if it is not already, of bringing about the demise of the human race— or at least of killing a sufficient
number of people to end high-tech civilization and set humanity back 1,000 years or more. That terrorist
groups could achieve this level of technological sophistication may seem far-fetched, but keep in mind that it takes only a handful of
individuals to accomplish these tasks. Never has lethal power of this potency been accessible to so few,
so easily. Even more dramatically than nuclear proliferation, modern biological science has frighteningly undermined the correlation
between the lethality of a weapon and its cost, a fundamentally stabilizing mechanism throughout history. Access to extremely lethal
agents—lethal enough to exterminate Homo sapiens—will be available to anybody with a solid
background in biology, terrorists included.
xt – Yes ISIS uses Internet
FBI Director Comey – crackdown on the internet needed
Hudson 2015 (John; FBI Director: For Would-Be Terrorists, Twitter is the ‘Devil on Their Shoulder’; Jul
8; foreignpolicy.com/2015/07/08/fbi-director-for-would-be-terrorists-twitter-is-the-devil-on-theirshoulder/; kdf)
FBI Director James Comey accused Twitter of being the main conduit for Islamic State recruitment on
Wednesday and said the social media site amounted to the “devil on their shoulder” for extremist sympathizers around
the world. “ISIL is reaching out, primarily through Twitter, to about 21,000 English-language followers,” Comey told the
Senate Judiciary Committee, using an acronym for the extremist group. “It buzzes in their pocket … a device, almost a devil
on their shoulder, all day long saying, ‘kill, kill, kill, kill.’” Comey noted that the Islamic State’s recruitment techniques
differ from al Qaeda’s, which invests more heavily in spectacular attacks against Western landmarks. The ISIS message is “two pronged: come
to the so-called Caliphate … and if you can’t come, kill somebody where you are.” “I cannot see we stopping these indefinitely [sic],” he added.
The FBI chief’s unusually pointed warning about one of the most successful American social media companies came during congressional
testimony about the dangers of encryption technologies that prevent law enforcement from accessing data on Americans’ smartphones. In
recent months, Silicon
Valley and U.S. law enforcement agencies have been at loggerheads over new
versions of smartphone operating systems from Google, Apple, and other firms that offer default
encryption that the companies themselves can’t break. Privacy advocates have championed the
software as an important bulwark against government surveillance and cyber crime, but law
enforcement officials such as Comey worry that forensic data needed to solve crimes or thwart terrorist
attacks will “go dark.”
ISIS uses the internet as a recruitment
Ryan 2014 (Laura; Al-Qaida and ISIS use Twitter differently. Here's How and Why; Oct 9;
www.nationaljournal.com/tech/al-qaida-and-isis-use-twitter-differently-here-s-how-and-why20141009; kdf)
Al-Qaida has an Internet presence nearly two decades old, using various platforms and—more
recently—social media to push its message. But it is ISIS, the relative newcomer, that has escalated its
Internet efforts to the point that governments are beginning to see winning the Internet as central to
the fight against terrorism. European government officials reportedly met Thursday in Luxembourg with
heads of tech companies—including Twitter, Facebook, and Google—to discuss how to combat online
extremism. And the U.S. State Department launched its own Center for Strategic Counterterrorism
Communications in 2011. Much of ISIS's online strategy stems from lessons learned while its members
were still in al-Qaida's fold. But when the groups split apart, their online strategies diverged as well—
especially in how they use social media. From 9/11 to the executions of James Foley and Scott Sotloff,
there seem to be no limits to the violence the two terrorist groups are willing to carry out. Now both
groups use social media to wage their own brand of jihad, but they use it very differently. And their
separate techniques not only reveal key divisions between the two terrorist groups, but also illustrate
the depths of extremism that ISIS will plumb—and that al-Qaida won't. Here are a few key distinctions:
1. ISIS more successfully uses social media to recruit members. Both groups use social media to target
and recruit foreigners, but ISIS is much better at it. The number of Westerners fighting alongside ISIS in
Syria and Iraq could number in the thousands, thanks in large part to Twitter and Facebook, and this
spooks the West. Social media's public and instantaneous nature is ideal for reaching ISIS's target
audience—young, disillusioned Westerners who are ripe for radicalization—and it gives them a sense of
community. ISIS showcases its recruiting success via Twitter and Facebook, where foreign recruits
themselves become propaganda tools of the group's digital war, according to Gabriel Weimann, a
professor of communication at Haifa University, Israel, who has been tracking terrorists' use of the
Internet for nearly 15 years. The Facebook profiles and Twitter handles of Western recruits are distinct
because their nationality is usually noted after their new, traditional Muslim names. The American
public is most familiar with ISIS's graphic images, but recruits also share messages and images of daily
life in Syria as peaceful, purposeful, and orderly. "Even if they recruited them, radicalized them, changed
their names, made them legal muslims, they keep calling them by the name of the country they came
from," Weimann said. 2. Al-Qaida relies on 'older' Web platforms. Al-Qaida never managed to find this
kind of success, according to Weimann. Even though al-Qaida paved the way for ISIS on the Internet, the
group has quickly outpaced al-Qaida at exploiting social media to its fullest potential. Al-Qaida certainly
has a presence on social media, but the group still relies heavily on "older" platforms, like websites and
forums, according to Weimann. And while ISIS focuses on fighting a nearby enemy to defend the Islamic
State, al-Qaida focuses on fighting an external enemy, i.e. the United States., and is therefore more
focused on stirring "lone-wolf" terrorists to carry out acts of terror on their own.
Internet freedom allows for online terrorist recruitment
UNODC 12 (http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf,
pg. 5) JKS
The Internet may be used not only as a means to publish extremist rhetoric and videos, but also a way to
develop relationships with, and solicit support from, those most responsive to targeted propaganda.
Terrorist organizations increasingly use propaganda distributed via platforms such as passwordprotected websites and restricted access Internet chat groups as a means of clandestine recruitment.5
The reach of the Internet provides terrorist organizations and sympathizers with a global pool of
potential recruits. Restricted access cyber forums offer a venue for recruits to learn about, and provide
support to, terrorist organizations and to engage in direct actions in the furtherance of terrorist
objectives.6 The use of technological barriers to entry to recruitment platforms also increases the
complexity of tracking terrorism-related activity by intelligence and law enforcement personnel. 8.
Terrorist propaganda is often tailored to appeal to vulnerable and marginalized groups in society. The
process of recruitment and radicalization commonly capitalizes on an individual’s sentiments of
injustice, exclusion or humiliation.7 Propaganda may be adapted to account for demographic factors,
such as age or gender, as well as social or economic circumstances. 9. The Internet may be a particularly
effective medium for the recruitment of minors, who comprise a high proportion of users. Propaganda
disseminated via the Internet with the aim of recruiting minors may take the form of cartoons, popular
music videos or computer games. Tactics employed by websites maintained by terrorist organizations or
their affiliates to target minors have included mixing cartoons and children’s stories with messages
promoting and glorifying acts of terrorism, such as suicide attacks. Similarly, some terrorist organizations
have designed online video games intended to be used as recruitment and training tools. Such games
may promote the use of violence against a State or prominent political figure, rewarding virtual
successes, and may be offered in multiple languages to appeal to a broad audience.8
ISIS recruits online now – gives them more power
Hopping 7-8 (http://www.itpro.co.uk/security/24943/fbi-encryption-helps-isis-recruit-new-members)
JKS
Universal encryption will help terrorists spread their creeds through secure messaging services,
according to the FBI. James Comey, director of the agency, claimed in a blog post that worldwide
encryption will help groups like ISIS ahead of his appearance at the Senate Intelligence Committee. He
wrote that secure messaging services and social media will help ISIS recruit new members online. "When
the government's ability—with appropriate predication and court oversight—to see an individual's stuff
goes away, it will affect public safety," he wrote on pro surveillance website Lawfare. "That tension is
vividly illustrated by the current ISIL threat, which involves ISIL operators in Syria recruiting and tasking
dozens of troubled Americans to kill people, a process that increasingly takes part through mobile
messaging apps that are end-to-end encrypted, communications that may not be intercepted, despite
judicial orders under the Fourth Amendment." While he recognised the personal privacy benefits of
secure encryption, he added: "My job is to try to keep people safe. In universal strong encryption, I see
something that is with us already and growing every day that will inexorably affect my ability to do that
job. "It may be that, as a people, we decide the benefits here outweigh the costs and that there is no
sensible, technically feasible way to optimize privacy and safety in this particular context, or that public
safety folks will be able to do their job well enough in the world of universal strong encryption." His
comments come after Prime Minister David Cameron denounced encrypted messaging services like
Whatsapp earlier this year.
xt – Censorship Key
ISIS is recruiting through the internet at unprecedented ways- an uncensored internet
lets them use media as a form of control and persuasion.
Shroder, 7/14- (Landon Shroder staff writer, VICE Magazine)”The Islamic State's Propaganda War: Advertisers and Marketers Weigh in on
the World's Angriest Ad Campaign” 7/14/15, https://news.vice.com/article/the-islamic-states-propaganda-war-advertisers-and-marketersweigh-in-on-the-worlds-angriest-ad-campaign //droneofark
Healing the Chests of the Believing People is a July 4th summer blockbuster offering by the Islamic State (IS). The 10 minute video chronicles the
fate of 25 Syrian soldiers as they are led from Tadmur Prison to the ancient Palmyra Amphitheater where, in front of the black flag of IS, they
are executed by what appears to be a group of teen-age soldiers. IS
knows that this video, along with other recent death
cult recruiting video classics like: Punish Them Severely to Disperse Those Who Are Behind Them, A
Message Signed with Blood To the Nation of the Cross, and Healing the Souls with the Slaughtering of
the Spy (Part 2, no less) will inspire people to join their cause of revolutionary social change (of the bloody jihad
variety) — just like thousands of other Westerners already have. Videos like these represent just one piece
of IS's global marketing campaign, which also consists of monthly magazines, documentaries, and
nasheeds [audio messages], as well as online forums, blogs, postings on the ever-ubiquitous social media
platforms like Twitter, Facebook, and Instagram, and even their own short-lived Arab-language app, The
Dawn of Glad Tidings, that, once downloaded, automatically posted tweets by IS to a user's personal
Twitter account. Welcome to the propaganda war with IS — a war that is central to their defeat, and a
war that the US isn't winning. But how does IS sell their message? How does it get people from comfortable
backgrounds in the US and Europe to give up everything and join a movement so infused with violence and brutality? The answer
ultimately resides with the kinds of marketing strategies used by advertising agencies all over the world.
In the most basic terms, IS is selling an idea the very same way a company would sell a product. According to
the last National Counterterrorism Center estimate released in February, almost 3,400 Westerners have
traveled to Iraq and Syria to fight alongside IS. While some of these people would have found their way
to the fight no matter what, it would be incorrect to assume that most have joined IS simply to satiate
some kind of religious blood lust. "Today people buy based on social conversation," Brett Landry, creative director for DarkHorse
Marketing, told VICE News. "Brands find success by placing themselves within the social conversation in meaningful or fun or shocking ways."
Nowhere has this strategy been more successfully executed than in the horrifying media campaign run by IS's publicity wing, al-Hayat Media
Center. The videos and images of beheadings, burnings, crucifixions, and mass executions have simultaneously revolted and enticed viewers,
becoming a core component of their marketing strategy. Those
who are attracted to these kinds of graphic media are
initially drawn in by the production value, which is extraordinarily high compared to Al-Qaeda and other
jihadist-produced propaganda of the past. In contrast to al Qaeda's videos, which were shot on shaky handheld cameras, IS uses
sound design, special effects, rehearsed sequences, and multiple-angle scenes, as well as high-tech 5D cameras and professional editing teams.
The sensational videos take the viewer directly inside the war being waged by IS, much in the same way
a video game or action movie would. This has allowed IS to situate themselves at the center of a
worldwide conversation on religion, politics, and war, in a way that is entirely unencumbered by
traditional communication strategies — particularly those that would rely exclusively on mainstream
media to spread their message. "The burnings, beheadings, and torture are really hard to look at, but we're not the [target]
audience," Jason Smith, creative director for Magnetry, an advertising agency in Phoenix, told VICE News. "The brutality works in their favor
because it proves their effectiveness. The darker the images, the more obvious the void or lack of someone preventing them." "The
brutality works in their favor because it proves their effectiveness. The darker the images, the more
obvious the void or lack of someone preventing them." Marketing these atrocities has a two-fold propaganda value: IS is
not only defining exactly who they are, but who they are not, as well, which resonates with a select group of people who equate extreme
violence with power. More importantly, the brutality automatically narrows down the viewing audience, allowing the message to specifically
target those who might be susceptible to radicalization. Additionally,
IS propaganda is produced in a way that allows it
to be packaged for broadcast media and online video forums like YouTube, LiveLeak, and Vimeo. This
ensures that at least some of the content will be replayed on mainstream news outlets, regardless of the
subject matter. Because of this, IS has developed a very effective and low-cost type of advertising campaign reliant on something called
"earned media." Earned media is about generating buzz — getting other people to talk about and push your agenda and story. This kind of
marketing strategy fundamentally relies on the viral tendencies surrounding online "word of mouth" and comes in the form of mentions,
shares, reposts, views, and third-party broadcasts, and acts as a force multiplier for any IS media project. "The sole focus of an earned media
campaign is to reach the maximum amount of viewers with the minimum amount of effort," Landry told VICE News. "The US and world media
are feeding on the content, and that's huge earned media for ISIS…The more it's talked about, the more free advertising they get." Using social
media sites like Twitter contributes to the earned media campaign of IS by providing platforms to spread videos, documentaries, audio
messages, and other propaganda products, and allowing users to interact and engage with those products instantly and continuously. While
there are no exact numbers available with regard to internet penetration by IS, according to the ISIS
Twitter Census, released by the Brookings Institution in March 2015, at any one time, there are between
46,000 and 90,000 active IS Twitter accounts, each having an average of 1,004 followers who produce approximately 2,219
tweets during the account's lifetime. These accounts not only further disseminate IS propaganda, but allows
recruiters to connect with potential volunteers in near real time, which has helped the IS brand reach a
diverse global audience. "There are units of specialized recruiters operating around the clock from internet cafes in Iraq and Syria,
interacting on an individual level with prospective recruits," Henry Tuck, program coordinator for Extreme Dialogue at the Institute for Strategic
Dialogue, told VICE News. "Content
is expertly tailored to specific audiences in multiple languages, with
propaganda aimed at women, converts to Islam, and even certain professions." The US and world media
are feeding on the content, and that's huge earned media for ISIS…The more it's talked about, the more
free advertising they get. IS's marketing success, however, is based on more than just the creation and distribution of propaganda.
Their flags, balaclavas, and black-clad execution teams have made them instantly recognizable as the face of global jihad and modern terror.
This branding is consistent, visceral, and appeals to those who process images and symbols on an emotional, as opposed to rational, level.
"There's clearly
a visual identity associated with ISIS," Anna Bedineishvili, a strategic planner at Pereira &
O'Dell, a marketing agency in New York City, told VICE News. "They use dramatic scenes of beheadings and
bloodbaths that are shocking, yet very memorable." The signature violence gives potential volunteers a
sense of agency within a movement that appears unstoppable — invincible, even. For those who might
feel marginalized in a world that appears constantly adversarial, this kind of symbolism remains a potent
source of publicity for IS. "To many young men who feel like their current life is purposeless, this tells them that they can do
something," Bedineishvili said. "They can be someone and play a meaningful role in a glamorized apocalyptic battle." IS more than delivers on
these opportunities, which establishes legitimacy for potential volunteers and is essential to their brand loyalty. IS propaganda sources can then
leverage these experiences by developing their own news and editorial content, some of which is as polished as anything one might find on
BBC, CNN, or al-Jazeera. "When you put a 'real' news story from, say, the BBC next to one from ISN (Islamic State News), they feel remarkably
similar," Magnetry's Smith said. "Not only does that lift their legitimacy in some way, but it also robs legitimacy from the BBC…Who is to say
which content is legitimate?" IS's monthly online magazine, Dabiq, a term that refers to the coming Islamic apocalypse, might look completely
benign sitting on a magazine rack, and its publication in English is clearly an attempt to target a western audience. For a time, copies were even
sold on Amazon, though the listings were eventually removed. "[Dabiq] conveys some credibility and hints that ISIS might be a civilized place,"
Jeff Vitkun, a freelance copywriter for some of the world's largest advertising agencies, told VICE News. "Their design is better than the average
small-town American newspaper." Within its pages are news items, interviews, and feature articles that cover everything from modern-day
slavery to battlefield communiqués to living sincerely as a Muslim. A reader might just as easily find an editorial supporting the beheading of a
journalist as a religious discourse on how to take care of your weapons according to Islamic law. This creates a robust conversation through
various narratives, which can connect to compelling content that draws attention to living and fighting under IS. Advertisers call this a "brand
ecosystem," and as more content gets generated across multiple media channels, the product eventually compels its own influence. IS
has
used this kind of strategy to brand itself as the one truly incorruptible force that can avenge the
grievances of Muslims everywhere. This has tremendous marketing value when you take into account
the political and military failures that have beleaguered the Middle East in recent years. Another theme that is
central to IS's brand but that is often overlooked, especially in the West, is the idea of camaraderie. While most people will typically fixate on
the violence and brutality, potential volunteers are finding a different message, one that appeals to a community of like-minded individuals
looking to be a part of something greater than themselves. "[Look] at images of ISIS members smiling, hugging, hands up in the air with glee,
and general camaraderie," Brooke-Luat, strategy director for 72andSunny, a marketing agency in Los Angeles, said in an interview. "ISIS is trying
to combat any notion that it is a group of barbarians out in the desert by positioning itself as sophisticated, well-funded, organized, and even
charitable." Littered
throughout their propaganda materials are the pictures and testimony of young men
and women who have arrived in IS territory from all over the world. Eventually, this softer side of IS
makes the brutality and violence seem secondary to the idea of creating a new and revolutionary
society. This effectively undermines any counter narrative that can only portray IS as a group of bloodthirsty religious zealots. To combat the
messages coming from IS, Major Geneva David, a spokesperson for CENTCOM, said that the truth is one of the best weapons. "Amplifying
factual information regarding these areas is an important aspect of establishing a counter narrative to ISIL's propaganda and disinformation
campaign," David told VICE News. But how the US hopes to gain legitimacy with this message remains to be seen.
The US would be
wise to understand the strategies used by IS and reacquaint itself with the art of modern propaganda.
Far from being isolated occurrences, western citizens will continue to be recruited with greater
frequency. Terrorists now inhabit a world where all the tools of contemporary marketing and advertising are at their disposal. This allows
for an intoxicating call-to-arms aimed at those who believe that volunteering for IS is a once-in-a-lifetime experience — moreso since those
targeted are being attracted to a cause that has only two possible outcomes: victory or death.
ISIS is sending a strong signal through the means of the internet now—persuasion and
intimidation tactics.
Farwell, 14- (holds a B.A. from Tulane University, a J.D. in Law from Tulane University, and a D.C.L.S. in Comparative Law from the
University of Cambridge (Trinity College). In addition, he is a Senior Research Scholar in Strategic Studies at the Canada Centre for Global
Security Studies, Munk School of Global Affairs, University of Toronto) “The Media Strategy of ISIS” From “Survival: Global Politics and
Strategy”, Routledge Publishing vol. 56 no. 6 | December 2014–January 2015 | pp. 49–55, pdf, //droneofark
In June, the Islamic State of Iraq and al-Sham (ISIS) made a dramatic entrance onto the global stage,
aiming to establish its religious authority across the planet under a caliphate led by Abu Bakr al-Baghdadi. The group’s principal tool
for expanding its influence has been brute force, but as it has attempted to build credibility and
establish legitimacy, it has shown a deftness for propaganda, using social media and cyber technology to
recruit fighters and intimidate enemies.1 ISIS is not the first set of violent extremists to use such means to drive home its
messages or carry out operations. Al-Shabaab used Twitter during its September 2013 attack on the Westgate Mall in Nairobi to intimidate,
mock and brag.2 Lashkar-e-Taiba made effective use of cyber technologies such as Google Earth and mobile phones to gather intelligence and
for command and control during its November 2008 assault on Mumbai.3 Four years ago, I explored jihadists’ use of video in the ‘war of ideas’
in the pages of Survival.4 Yet
ISIS stands apart for its sophisticated use and understanding of social media to
achieve its goals. Its communication strategy aims to persuade all Muslims that battling to restore a
caliphate is a religious duty. The group’s narrative portrays ISIS as an agent of change, the true apostle of
a sovereign faith, a champion of its own perverse notions of social justice, and a collec tion of avengers
bent on settling accounts for the perceived sufferings of others.5 This narrative stresses that ISIS is gaining strength and
amassing power, and that victory is inevitable. The use of cellular technology, along with the exploitation of the
mainstream media (ISIS videos have appeared on Western broadcast outlets as well as extremist websites), means that these
messages have reached audiences around the world.6 The group has employed Twitter, Facebook and Instagram to
influence adversaries, friends and journalists alike. These methods have allowed the group to distribute powerful,
emotional images. Some of these, consistent with its message of inevitable victory, depict group members as fearsome warriors. Such
images can be used to build support among fellow travellers and recruit new members. Images of gore,
beheadings and executions are intended to intimidate opponents. And yet the group has also released images showing foot soldiers eating
Snickers bars and nurturing kittens, a historical reference, as Danish strategic communication expert Thomas Elkjer Nissen has pointed out, to
Abu Huraira, a companion of the Prophet Muhammad known for being fond of cats.7 These warmer
images aim to communicate
the message that, while strictly Islamic, ISIS stands for promoting the welfare of people, not murdering
them.8 Foreign Policy Research Institute expert Clint Watts reports that while ISIS social media provides a means for outsiders to track what is
going on in Syria and Iraq – places where there can be little coverage by journalists – the militants themselves largely regard this as a good
thing. According
participating’.9
to Watts, they ‘want to communicate back to their communities that they’re
xt – Internet recruitment Key
Recruitment via the Internet is critical to ISIS’s success
Ajnaili 2014 (Mustapha; How ISIS conquered social media; June 24;
english.alarabiya.net/en/media/digital/2014/06/24/How-has-ISIS-conquered-social-media-.html; kdf)
Western Muslims Western Muslims are an important target of ISIS’s social media propaganda. The
group ensures most of its media productions are translated into as many Western languages as possible.
This is done through sophisticated media arms such as Al-Furqan Media, Fursan Al-Balagh Media,
Asawirti Media, Al-Ghuraba Media - which appears to be operated in Germany - and Al-Hayat Media
Center (http://justpaste.it/ma_asabak). The last one provides the translation of a recent speech by ISIS
spokesman Abu Mohammad al-Adnani al-Shami into English, Turkish, Dutch, French, German,
Indonesian and Russian. J.M. Berger, editor of INTELWIRE.com and author of “Jihad Joe: Americans Who
Go to War in the Name of Islam,” wrote: “ISIS does have legitimate support online - but less than it
might seem. And it owes a lot of that support to a calculated campaign that would put American socialmedia-marketing gurus to shame.” Peter W. Singer - director of the Center for 21st Century Security and
Intelligence, and a senior fellow in the Foreign Policy program - told Al Arabiya News that ISIS’s
increased activity on social media “in many ways reflects the new nature of media technology’s cross
with warfare.” Singer added: “Just as the Crimea War was the first war reported by telegraph and
Vietnam the first TV war, we are now seeing wars in places like Syria and Iraq, just like the broader use
of media technology, playing out online.”
xt – Yes CBWs: Ebola
ISIS will infect recruits with Ebola, creating a new bubonic plague
Dorminey October 5, 2014 (Ebola as ISIS BioWeapon?;
www.forbes.com/sites/brucedorminey/2014/10/05/ebola-as-isis-bio-weapon/; kdf)
ISIS may already be thinking of using Ebola as a low-tech weapon of bio-terror, says a national security
expert, who notes that the “Islamic State of Iraq and Syria” and terror groups like it wouldn’t even have
to weaponize the virus to attempt to wreak strategic global infection. Such groups could simply use
human carriers to intentionally infect themselves in West Africa, then disseminate the deadly virus via
the world’s air transportation system. Or so says Capt. Al Shimkus, Ret., a Professor of National Security
Affairs at the U.S. Naval War College. “The individual exposed to the Ebola Virus would be the carrier,”
Shimkus told Forbes. “In the context of terrorist activity, it doesn’t take much sophistication to go to
that next step to use a human being as a carrier.” And with a significant portion of West Africa now in an
open epidemic, it arguably wouldn’t be difficult for a terrorist group to simply waltz in and make off with
some infected bodily fluids for use elsewhere at another time. They wouldn’t even have to “isolate” it,
says Shimkus, who teaches a course in chemical and biological warfare. He says that if ISIS wanted to
send half a dozen of its operatives into an Ebola outbreak region and intentionally expose themselves to
the virus, they very well could. The idea is then once they had intentionally infected themselves, they
would try to interact with as many people in their target city or country of choice. The average fatality
rate from Ebola, classified as a hemorrhagic fever, is 50 percent; but without medical treatment, that
figure can range as high as 90 percent, reports the U.N. World Health Organization (WHO). The WHO
also notes that although there are two potential vaccines undergoing “evaluation,” at present none are
licensed. The virus was first documented in humans in 1976 during two simultaneous outbreaks, one in
Sudan and the other in the Congo, in a village near the Ebola River. The WHO reports that a type of fruit
bat is thought to act as the virus’ natural host. The virus apparently spreads into the human population
via direct contact with infected animals — ranging from chimpanzees, gorillas, monkeys, forest antelope
and porcupines; as well as the fruit bat itself — be they found ill or dead in the rain forest. According to
the WHO, Ebola can then be spread via contact with the infected’s bodily fluids; even bedding and
clothing “contaminated” with such fluids. The idea of using human carriers to intentionally spread
deadly pathogens has been around for centuries. As Shimkus points out, in the Middle Ages, adversaries
threw infected corpses over their enemy’s city walls in order to spread the deadly Bubonic Plague.
xt – Yes CBW Extinction
CBW attacks are the most probable existential threat
Burt 2013 (Alistar [member of parliament and parliamentary under-secretary of state at the UK
Foreign and Commonwealth Office]; We must wake up to the threats of new chemical weapons; Apr 15;
www.newscientist.com/article/mg21829125.900-we-must-wake-up-to-the-threats-of-new-chemicalweapons.html#.VMUUlP7F-AU; kdf)
Most governments now regard such weapons as militarily redundant, as demonstrated by their
membership of the Chemical Weapons Convention (CWC), which prohibits the production and use of
chemical weapons, commits them to destroying all existing stocks, and prevents reacquisition. Yet
advances in a range of scientific fields – such as neuroscience and nanotechnology – and the growing
convergence of chemistry and biology, while offering the hope of benefits to medicine and civil society,
also bring the potential for a new era in chemical warfare. There is an intrinsic connection between the
military and civilian scientific communities; the military's need for innovation has long been a driving
force in research. But the potential for the adaptation and exploitation of scientific discovery for military
advantage has rarely been greater. Pursuing legitimate research while minimising the risk of misuse is a
challenge for all. In 2011, I wrote in this magazine that the world needed to do more to guard against
the growing threat of biological weapons. Now, I want to make the same case with regard to chemical
weapons. These issues are being discussed this month at the Third Review Conference of the CWC at
The Hague in the Netherlands. The UK was a key player in negotiating agreement for the convention,
which came into force in 1997, and although the threats we now face are very different from those that
preoccupied the original negotiators, our commitment to it is undiminished. It remains a fundamental
part of the international legal framework to tackle the threat of chemical weapons and has resulted in
the destruction of four-fifths of the world's declared stockpiles. This is welcome, but we cannot afford to
be complacent. The international community must ensure it is equipped to meet new challenges and
prevent the re-emergence of chemical weapons. The latest threat comes on several fronts. Consider the
rapidly advancing field of neuroscience, in particular neuropharmacology. The potential benefits for
treating neurological impairment, disease and psychiatric illness are immense; but so too are potentially
harmful applications – specifically the development of a new range of lethal, as well as incapacitating,
chemical warfare agents. Nanotech also has the potential to transform medical care, but could be used
to bolster chemical weapon capabilities. We should not allow threats to hinder scientific progress. But
we should do all we can to minimise the misuse of knowledge, materials, expertise and equipment for
hostile purposes. The scientific community must play its part. These issues should be a fundamental
element of educational and professional training for scientists and engineers, along with clear guidance
on the obligations imposed by the CWC to not develop, produce, acquire, stockpile or retain chemical
weapons. Organisations such as the UK's Royal Society are spearheading this work. Significant
challenges to the convention are also being addressed. For instance, it focuses on the types and
quantities of toxins that armies, not terrorist cells, would need. The components of chemical weapons
are readily available: industrial chemicals are sold in bulk, yet unlike their nuclear equivalent, only
limited scientific and engineering knowledge is needed to turn them against us. Recent history shows us
that extremists entertain no qualms about the acquisition and use of such weapons; and they are willing
to use primitive delivery systems. In 1995, terrorists from the Japanese cult Aum Shinrikyo released a
nerve agent on the Tokyo subway which led to 13 deaths and left hundreds more suffering ill effects.
Preventing and prohibiting misuse without impeding the beneficial development of science and
technology is a delicate balancing act but a necessary one. All nations must face up to these challenges
and consider the implications for the CWC's verification regime in the short, near and long term. For
instance, will the declaration and inspection provisions that apply to the chemical industry still be
relevant? We cannot afford to be reactive. If unchecked, this threat has the potential to cause
devastation on a vast scale. This is a watershed moment for the convention and for the international
community. We must summon the political will to strengthen regulation and ensure relevance in the
modern world. The duty to prevent chemical development for weapons must be enforced in all nations,
and states must be prepared to take steps nationally to prevent the misuse of toxic chemicals. As the
current situation in Syria demonstrates, the danger posed by these weapons is not an abstract issue. The
existence of that country's chemical arsenal is a reminder of the threats we face. Any use of such
weapons is abhorrent. Preventing this and holding to account those who use them must remain a
priority for the international and scientific communities alike.
AT: ISIS Not a Threat
ISIS is more of a threat than ever
Botelho January 24, 2015 (Greg; What's happening in the Middle East and why it matters;
edition.cnn.com/2015/01/23/middleeast/middle-east-country-breakdown/; kdf)
Already, ISIS has beheaded a number of U.S. and British hostages -- all of them civilians -- and
threatened more. There's also the real threat that the group may take its campaign out of the Middle
East to strike in the West. That may have happened this month in France. One of the three terrorists
there, Amedy Coulibaly, proclaimed his allegiance to ISIS in a video, and investigators discovered ISIS
flags along with automatic weapons, detonators and cash in an apartment he rented, France's RTL Radio
reported Sunday, citing authorities. The West and some of its Middle Eastern allies are striking back with
targeted airstrikes not only in Iraq, where the coalition has a willing partner, but in Syria, where it is not
working with al-Assad. (In fact, Obama and others have said they want the Syrian President out of
power.) U.S. diplomatic officials said Thursday that estimates are that this coalition has killed more than
6,000 ISIS fighters. Yet their work is far from done. The group boasts upwards of 31,000 fighters, not to
mention fresh recruits seemingly coming in regularly.
AT: Plan doesn’t get modeled
Facebook censors posts to appease China, plan reverses that
Techdirt 2015 (Is Facebook Censoring posts to please China?; Jan 9; abovethelaw.com/2015/01/isfacebook-censoring-posts-to-please-china/; kdf)
Techdirt has reported before,
one troubling consequence of China’s widespread online censorship is that users of some
services outside that country are also affected. A recent incident suggests that as China’s soft power increases, so does its ability to
influence even the most powerful of Western online companies. It concerns Tsering Woeser, perhaps the leading Tibetan activist, and certainly the most Net-savvy.
As she explains in an article on China Change (NB — post contains some disturbing images of self-immolation): On December 26, 2014, I reposted on my Facebook
page a video of Tibetan Buddhist monk Kalsang Yeshe’s self-immolation that occurred on December 23 [in Tawu county, Kardze Tibetan Autonomous Prefecture,
Sichuan province, China], accompanied by an excerpted report explaining that self-immolation is a tragic, ultimate protest against repression. A
few hours
later, my post was deleted by the Facebook administrator. I was rather shocked when a Facebook notice of deletion leapt out on
screen, which I tweeted right away with the thought, “It’s been more than six years since I joined Facebook in 2008, and this is the first time my post was deleted!
Does FB also have ‘little secretaries?’ “ “Little secretaries” refers to the censors hired by Chinese online
services to remove politically sensitive material. Her article includes Facebook’s explanation for its move: Facebook has long been a place
where people share things and experiences. Sometimes, those experiences involve violence and graphic videos. We work hard to balance expression and safety.
However, since some people object to graphic videos, we are working to give people additional control over the content they see. This may include warning them in
advance that the image they are about to see contains graphic content. We do not currently have these tools available and as a result we have removed this
content. To which Woeser replies that there seems to be some double standards here: Western
democracies have recently resolved to
strike ISIS, and the public support for this is largely the result of the Jihadist videos of beheading hostages that have been disseminated online. Facebook
defended its inclusion of these beheading videos which it claims do not show the graphic moment of beheading. But I, for one, saw videos of the beheading
moment on Facebook. I even saw footage of the executioners putting the severed head on the torso of the dead. Even with a video without the moment of
beheading, does it not “involve violence” and is it therefore not “graphic?” Moreover, she points out that there is a key difference between the videos of hostages
being beheaded, and the images of self-immolation that she posted: Tibetans who burn themselves to death are not seeking death for their own sake but to call
attention to the plight of the Tibetan people. They die so that the Tibetans as a people may live in dignity. Those who took tremendous risk to videotape the selfimmolation and to upload it online know perfectly that such videos will not be able to spread on Chinese websites, and they must be posted on websites in free
societies such as Facebook for the world to see. When Facebook decides to delete the video to get rid of “graphic content,” it renders the sacrifice of the selfimmolator and the risk taken by the videographer as nothing. Is that what Facebook wants to accomplish? She concludes by posing an important question about
Facebook’s true motives here: On Facebook, videos of Tibetan self-immolations have not been censored before, and my friends argued that we have reason to
worry that Facebook founder and CEO Mark Zuckerberg is compromising on defending users’ freedom of expression as he seeks China’s permission to allow
Facebook in China, given that he visited Beijing two months ago and met with high-ranking Chinese officials, and that a couple of weeks ago, Mr. Zuckerberg
received Lu Wei, China’s Internet czar in Facebook’s headquarters where he ingratiated himself to his guest by showing that he and his employees were reading
[China’s President] Xi Jinping’s writings to learn about China. The view that Facebook is selling-out in order to ingratiate itself with the Chinese authorities is lent
support by another story involving a Facebook post by a Chinese dissident, reported here by The New York Times: Amid
growing censorship
pressures around the world, Facebook suspended the account of one of China’s most prominent exiled
writers after he posted pictures of a streaking anti-government demonstrator. On Tuesday, the exiled writer, Liao Yiwu,
said that he had received a notice from Facebook stating that his account had been temporarily suspended, and that it would be blocked permanently if he
continued to violate the site’s rules against nudity. Once again, the excuse for censorship is that it violated Facebook’s rules. But that doesn’t stand up to scrutiny:
Mr. Liao said the case was not that simple. In an interview at his home in Berlin, the 56-year-old writer said he had covered up the genitalia of the streaker in the
photo after people pointed out that it might violate Facebook rules. He cut out a picture of the former Chinese leader Mao Zedong and pasted it over the man’s
groin in the photo. His account was suspended several days after doing so. Taken together, these two cases certainly seem to indicate a
new desire by
Facebook to stay on the right side of the Chinese government by removing politically sensitive content,
perhaps in the hope that it may be allowed to launch in China at some point. That’s bad enough, but the situation is
made worse by the company’s feeble attempts to pretend otherwise.
China censors ISIS—Aff ends that censorship
Schrock January 21, 2015 (John Richard [Prof at Emporia State University]; Danger, dignity and
decent; www.hayspost.com/2015/01/21/danger-dignity-and-decency/; kdf)
Within these last months in the U.S., we
have seen Islamic State (ISIS) rebels recruit online. Hundreds of teenagers have
left their homes to join the war in Iraq and Syria. The wimpy U.S. response was to produce counter
online advertisements. Blocking those recruitment websites was not considered legitimate because it was “free speech.” But other
countries are willing to take action. Article 19 of the U.N. Universal Declaration of Human Rights recognized in the International Covenant on
Civil and Political Rights asserts that “…everyone shall have the right to freedom of expression…” in speech, print, art or other media. However,
Article 19 also explains that exercise of these rights may be “…subject to certain restrictions.” Those limitations include respecting “…the rights
or reputation of others” and “…the protection of national security or of public order, or of public health or morals.” Foreign
countries
recognize the gray areas of free-speech. For instance, some European countries restrict libel of living persons on the Internet.
And China has no qualms using their great firewall to block those Internet ISIS calls to come-and-kill. Why
do we consider it a crime to threaten to kill another person in the U.S., but not a crime to recruit
youngsters to kill people elsewhere?
Plan independently ends censorship
Plan sends a signal for internet freedom—causes a li
Gardner, 10
(Staff Editor & Reporter-Casino Gambling Web, 9/23, Gambling Regulations Will Help Obama's World
Internet Freedom Mandate, http://www.casinogamblingweb.com/gambling-news/gamblinglaw/gambling_regulations_will_help_obama_s_world_internet_freedom_mandate_55752.html)
Gambling Regulations Will Help Obama's World Internet Freedom Mandate President Obama gave a
speech today in front of the United Nations General Assembly, and his message was largely one of
individual freedom. During the speech, Obama touched on many issues, perhaps the most aggressive of
which was having a Palestinian state separate from Israel. Obama spoke of allowing the Palestinians
their own state with the hope that Israelis and Palestinians could live side by side in peace. Obama
acknowledged that this could take a long time, but that the goal could become a reality. During the
speech, Obama spoke about how the Internet should remain free from government interference
everywhere in the world. The freedom to surf the Internet would allow people all across the globe to
research issues and learn from the wide array of news that is currently found on the Internet. "We will
support a free and open Internet, so individuals have the information to make up their own minds," said
Obama. "And it is time to embrace and effectively monitor norms that advance the rights of civil society
and guarantee its expansion within and across borders." That statement may have been much better
received had the US not had their own blocks on Internet freedom. The Internet gambling industry
currently is operating as a black market in the US due to the 2006 Unlawful Internet Gambling
Enforcement Act. The law is a form of Internet censorship that Representative Barney Frank and other
lawmakers have been trying to repeal. In the quest for Internet freedom, the US proclaims themselves
as leaders, however, the country must be careful with their plea. If the US can place Internet bans on
certain industries, then little could be done to stop other countries from banning different industries
or websites because of their beliefs. For instance, in countries where religion is unified, there could be
bans on any material that the country finds outside the rules of their particular religion. In other
countries, bans could be placed on industries that are run largely by foreign operators. President Obama
took a strong first step today by promoting Internet freedom. The next step will be making sure the US
leads by example, and one area to start would be by lifting the ban on Internet gambling. The
president has laid down the gauntlet, and now it is time for him to follow his own lead.
AT: Internet—Competition
1nc Internet/Bandwidth
If the thesis of their advantage is true – that demand is already too high – companies
would be upgrading now. All the aff does is spike a bandwidth crunch in the short
term because broadband investments are long term.
No Internet collapse
Dvorak 2007 (John; Will the Internet Collapse?; May 1;
www.pcmag.com/article2/0%2c2817%2c2124376%2c00.asp; kdf)
When is the Internet going to collapse? The answer is NEVER. The Internet is amazing for no other reason than that it
hasn't simply collapsed, never to be rebooted. Over a decade ago, many pundits were predicting an all-out catastrophic
failure, and back then the load was nothing compared with what it is today. So how much more can this network take? Let's look at the basic
changes that have occurred since the Net became chat-worthy around 1990. First of all, only a few people were on the Net back in 1990, since
it was essentially a carrier for e-mail (spam free!), newsgroups, gopher, and FTP. These capabilities remain. But the e-mail load has grown to
phenomenal proportions and become burdened with megatons of spam. In one year, the amount of spam can exceed a decade's worth, say
1990 to 2000, of all Internet traffic. It's actually the astonishing overall growth of the Internet that is amazing. In 1990, the total U.S. backbone
throughput of the Internet was 1 terabyte, and in 1991 it doubled to 2TB. Throughput continued to double until 1996, when it jumped to
1,500TB. After that huge jump, it returned to doubling, reaching 80,000 to 140,000TB in 2002. This ridiculous growth rate has continued as
more and more services are added to the burden. The jump in 1996 is attributable to the one-two punch of the universal popularization of the
Web and the introduction of the MP3 standard and subsequent music file sharing. More recently, the emergence of inane video clips (YouTube
and the rest) as universal entertainment has continued to slam the Net with overhead, as has large video file sharing via BitTorrent and other
systems. Then VoIP came along, and IPTV is next. All the while, e-mail numbers are in the trillions of messages, and spam has never been more
plentiful and bloated. Add blogging, vlogging, and twittering and it just gets worse. According to some expensive studies, the growth rate has
begun to slow down to something like 50 percent per year. But that's growth on top of huge numbers. Petabytes. To date, we have to admit
that the structure of the Net is robust, to say the least. This is impressive, considering the fact that experts were predicting a collapse in the
1990s. Robust or not, this Internet is a transportation system. It transports data. All transportation systems eventually need upgrading, repair,
basic changes, or reinvention. But what needs to be done here? This, to me, has come to be the big question. Does anything at all need to be
done, or do we run it into the ground and then fix it later? Is this like a jalopy leaking oil and water about to blow, or an organic perpetualmotion machine that fixes itself somehow? Many
believe that the Net has never collapsed because it does tend to
fix itself. A decade ago we were going to run out of IP addresses—remember? It righted itself, with
rotating addresses and subnets. Many of the Net's improvements are self-improvements. Only spam,
viruses, and spyware represent incurable diseases that could kill the organism. I have to conclude that the
worst-case scenario for the Net is an outage here or there, if anywhere. After all, the phone system, a more
machine-intensive system, never really imploded after years and years of growth, did it? While it has
outages, it's actually more reliable than the power grid it sits on. Why should the Internet be any
different now that it is essentially run by phone companies who know how to keep networks up? And let's
be real here. The Net is being improved daily, with newer routers and better gear being constantly hotswapped all over the world. This is not the same Internet we had in 1990, nor is it what we had in 2000. While phone companies
seem to enjoy nickel-and-diming their customers to death with various petty scams and charges, they could easily charge one flat fee and
spend their efforts on quality-of-service issues and improving overall network speed and throughput. That will never happen, and phone
companies will forever be loathed. But when all is said and done, it's because of them that the Internet will never collapse.
That's the good news. The bad news is they now own the Internet—literally—and they'll continue to play the nickel-and-dime game with us.
Optoelectronics innovation is resilient
NRC 12
National Research Council, principal operating agency of the National Academies, Winter 2012, “Optics
and Photonics: Essential Technologies for Our Nation,” 7-155
Those firms
found that the lowest-cost option was to manufacture the discrete technologies in developing
countries and abandon U.S. production of monolithically integrated technologies.49 It is not clear, however, that the
apparent declines in monolithic-integration patenting in the firms that have moved production activities offshore will
necessarily lead to a decline in overall innovation by U.S. firms in monolithic integration. Several start-up firms
have emerged in the United States since 2000 that focus on monolithic-integration technologies. It is also possible that
established U.S. optoelectronic component manufacturers that have kept fabrication in the United
States will increase R&D and patenting in monolithic integration for optoelectronics. Finally, and perhaps most
important, firms outside telecommunications and data communications, such as computing firms, may
find it in their interest to develop monolithic-integration design and fabrication capabilities for
communications applications, as evidenced by Intel’s recent establishment of a silicon photonics design and fabrication facility at the
University of Washington.
The case of optoelectronics components illustrates a strong relationship between the location of production
activities by U.S. firms and the direction of these firms’ innovative efforts. But the evidence presented in this case
suggests that the movement of optoelectronics-component production to non-U.S. locations has thus far
not resulted in the “loss” by the U.S. economy of innovative capabilities in monolithic integration. Instead, we
observe that a different set of U.S. corporations (and universities) now have become active in this
technological field.50,51
Aff does nothing to industry structure—Comcast outweighs
Sasso 9/4/14 (Brendan; FCC Chief: Cable Companies Are Wrong About Internet Competition;
www.nationaljournal.com/tech/fcc-chief-comcast-is-wrong-about-internet-competition-20140904; kdf)
September 4, 2014 Most
Americans lack any real choice in accessing high-speed Internet, the chairman of the
Federal Communications Commission said Thursday. Comcast and other cable giants have argued that the industry is
already plenty competitive. Consumers in many areas can choose to access the Internet from a DSL provider or on their smartphones,
the cable companies argue. While FCC Chairman Tom Wheeler didn't mention Comcast by name, he said those other options don't deliver the
speeds that consumers need today. To reliably stream high-definition video, as consumers expect, providers must deliver speeds of at least 25
megabits per second, Wheeler said. In most areas, that means the only option is the local cable company. "At
25 Mbps, there is
simply no competitive choice for most Americans," the FCC chief said. "Stop and let that sink in. Three-quarters of
American homes have no competitive choice for the essential infrastructure for 21st century
economics and democracy. Included in that is almost 20 percent who have no service at all." The conclusion
doesn't bode well for Comcast's bid to buy Time Warner Cable. The deal would unite the top two cable providers, creating a new behemoth
controlling a large portion of the nation's high-speed Internet access. But Comcast frequently notes that its network doesn't overlap with Time
Warner Cable, meaning the merger would not actually create fewer choices for any consumers. Comcast didn't respond to a request to
comment. The speech could also have implications for the agency's net-neutrality regulations. Wheeler noted that, historically, the absence of
competition has "forced the imposition of strict government regulation in telecommunications." But he made it clear that he
would prefer
a competitive market with light regulation than heavy regulation of monopolies. One of the consequences
of past monopoly regulation was the "thwarting of the kind of innovation that competition stimulates,"
Wheeler said.
Fiber solves bandwidth
Forrest, 14 - Staff Writer for TechRepublic. (Conner, “Google's Fiber lottery: Predicting who's next and
how Google picks winners” Tech Republic, http://www.techrepublic.com/article/the-google-fiberlottery/)
Bandwidth is a serious issue for these kinds of small businesses, as well as entrepreneurs and highly-connected families. Mobile data,
streaming video, and advances in cloud services have put tremendous demands on bandwidth, and with internet service providers
experimenting with bandwidth throttling and bandwidth caps, it threatens to make internet usage a constrained resource.
Google, of course, wants people and companies to use the internet like it's a unlimited resource, because as the web's largest internet
advertising company, it makes more money the more everyone uses the internet.
Google Fiber is tackling this problem by putting a new face on a decades-old technology with the hopes
of using it to bring gigabit internet into businesses and homes -- that's over 10 times the capacity of
most of today's internet connections in US homes and small businesses. No new internet product has generated as much
excitement in the technology world as Google Fiber. It has piqued the interest of average consumers and left techies salivating.
When Google Fiber started in Kansas City, Kansas in 2012, it was difficult to determine how serious the search giant was about disrupting the
US internet. In 2013, it expanded the experiment to Austin, Texas and Provo, Utah, and the possibility began to emerge that this was going to
be a real thing. Google even released a checklist for potential Fiber cities. According to William Hahn, a principal analyst at Gartner, it's hard to
tell exactly what Google is up to.
"It's like those murder mysteries. The suspect would act exactly the same way, whatever their motive, up to this point," Hahn said. "If they were
trying to take a look at people's data and play in the sandbox, and were willing to subsidize for that reason, it would look a lot like them trying
to spur competitive response from the CSPs."
However, in
2014, Google suddenly looked a lot more serious about Fiber when it announced plans to
bring Fiber to 34 cities. That sounds a little more ambitious than it really is. It's actually only nine metro areas, but it's still a major
expansion of Google's Fiber plans.
The internet’s not key to any facet of the international order – their authors inflate
the threat
Ortagus ‘14
[Megan, Master’s in International Security from Johns Hopkins. May 2014,“The Internet’s Impacts on
Power Differentials in Security and Conflict”, master’s thesis submitted to Johns Hopkins University,
https://jscholarship.library.jhu.edu/bitstream/handle/1774.2/37255/ORTAGUS-THESIS2014.pdf?sequence=1]
It is quite remarkable how ICT has transformed commerce, global communications, and societal
interactions so dramatically in only twenty years since the modern Internet became widely accessible to
individuals. As a result, all states are presented with unprecedented security vulnerabilities, and their
response to shifting power differentials is paramount. This has led many analysts to proclaim that power
differentials have fundamentally changed and that cyberspace ultimately will render other forms of
warfare irrelevant. However, the Internet has neither fundamentally altered human nature nor the
desires and competitions that fuel conflict; it is transforming the experience of conflict, although not
necessarily the outcomes. This thesis has found no conclusive data to support the notion that ICT is
concurrently revolutionizing interstate, intrastate or extrastate conflict to the point whereby a weaker
adversary can achieve a desired political outcome through the unique use of cyberspace. If this were the
case, one would expect to see VNSAs, dissident movements, and fragile states solely using the Internet
to prevail against their more powerful adversaries. At present there are no such cases. To the contrary,
dominant nation states (especially authoritarians) have used ICT in concert with traditional security
forces to defeat those who challenge the normal order. The prediction that the fifth domain will make
other forms of warfare irrelevant, or that the Internet provides a competitive advantage for dissidents
and terrorists, has not yet come to fruition. While cyberspace adds a new virtual dimension to conflict,
much like airpower added a third dimension to military conflict after World War I, cyber weapons have
not yet developed to the point where they can replace weaponry in the physical domains. Some experts
argue that they never will. To extend the air power analogy further, aerial systems first provided
unparalleled reconnaissance capabilities before evolving into their more famous roles delivering deadly
payloads. Today, cyber weapons are significantly limited and cyber warfare has not proven to be an
adequate substitute for an air force, let alone an occupying force. Although as technology advances,
cyber weapons could transform from auxiliary to decisive in combat, much like airpower. Alternatively,
cyber warfare could be relegated to a category similar to chemical warfare: it inspires serious concerns,
but has not affected the global balance of power. The latter appears more likely because of the
Internet's inherent limitations in affecting the physical world.
--XT Squo Solves/Google Fiber
Telecom is answering demand now—fiber will go national no matter what the aff does
Canon, 14 (Scott, “AT&T might challenge Google Fiber with high-speed Internet service in KC” Kansas
City Star, 4/21,
Read more here: http://www.kansascity.com/news/business/article346078/ATT-might-challengeGoogle-Fiber-with-high-speed-Internet-service-in-KC.html#storylink=cpy)
AT&T Inc. took a swing at Google Inc. on Monday.
The telecommunications behemoth announced it may challenge the Internet search titan on turf that is
new to both — the sale of industrial-strength Internet hookups to the home.
Both might soon fight over bandwidth-hungry customers in Kansas City. AT&T said the market is one of
24 it is considering for expansion of broadband speeds reaching 1 gigabit per second. That would be
nearly 100 times faster than the national average for home consumers.
The two companies had already begun a low-stakes tussle over the fledgling market for high-speed
household Internet connections in Austin, Texas.
AT&T’s move Monday signaled a push to nationalize the market, possibly leapfrogging Google Fiber.
For years, the home Internet business has been the domain of phone and cable TV companies that
typically said they saw little evidence that ordinary consumers wanted so much broadband.
Google Fiber was seen as an attempt to goad those companies into offering swifter Internet
connections. If AT&T takes such a service nationwide, upgrading its U-verse into a service called
GigaPower, the rest of the industry could follow suit.
“The scope of this effort simply takes your breath away,” said technology industry analyst Jeff Kagan.
“This is the most ambitious plan we have seen to date.”
Cities that want AT&T, the company suggested, should consider cutting regulatory red tape the way
thatKansas City-area communities have for Google Fiber.
Google Fiber boosts innovation in every provider and it’s expanding rapidly
Conner, 14 - I am an entrepreneur and communications expert from Salt Lake City, and I am the founder
of Snapp Conner PR. I am also a frequent author and speaker on Business Communication (Cheryl
,”Google Fiber Plans Expansion To 34 New Cities (Including Salt Lake)” Forbes,
http://www.forbes.com/sites/cherylsnappconner/2014/02/20/google-fiber-plans-expansion-to-34-newcities-including-salt-lake/)
The race for the Internet gigabit space took another leap forward this week with Google GOOG +0.85%
Fiber’s announcement that it has targeted 34 more cities in 9 metro areas for access to Google internet
services at the increasingly popular 1Gps speed.
Salt Lake City is one of the additional regions Google is considering for network expansion along with
additional cities in Arizona, California, Georgia, Tennessee, North Carolina, Oregon and Texas. (Google
Fiber’s blog announcement includes a comprehensive list of the 34 additional sites in all states.)
Google expects to give final selection decisions to the 34 new candidate locations by the end of the year.
Of particular note to cities vying for future expansion, much of Google’s choice for current candidates is
dependent on cities’ ability to conduct their own legwork. Cities with existing infrastructure that is
pervasive and documented can gain a leg up in getting their infrastructure maps in order and making it
faster and easier for Google to make permit requests, knowing the company can put its fiber on the
cities’ existing Internet poles.
By targeting cities with existing infrastructure, Google is not only able to move forward more quickly,
but is able to minimize the disruption to recipient cities that is caused by digging up streets to establish
new conduits, the company said.
Of the selections, Google representative Angie Welling told representatives of Salt Lake City, “Google
chose to work with Salt Lake City because of how tech-savvy the area is. Google would love to see what
local entrepreneurs would do with a high-speed gig connection.”
While Google has previously said that Google Fiber’s launch is meant to also spur the growth of
competitive platfoms from other providers, the company’s fast expansion is making Google itself a
bigger competitive force than before. As I have previously reported, Chattanooga Tenn., has built its
own ultra high speed fiber network, and AT&T T +1.12% has launched a similar offering in Austin, Texas,
after Google’s announcement of plans to provide services there.
It’s changing the entire industry
Barr, 14 – staff at WSJ (Alistair, “Google Fiber Is Fast, but Is It Fair?” Wall Street Journal,
http://online.wsj.com/articles/google-fuels-internet-access-plus-debate-1408731700)
Frustrated by the hammerlock of U.S. broadband providers, Google Inc. GOOGL +0.92% has searched
for ways around them to provide faster Internet speeds at lower cost, via everything from high-speed
fiber to satellites.
In the process, it is changing how next-generation broadband is rolled out.
Telecom and cable companies generally have been required to blanket entire cities, offering connections
to every home. By contrast, Google is building high-speed services as it finds demand, laying new fiber
neighborhood by neighborhood.
Others including AT&T Inc. T +1.12% and CenturyLink Inc. CTL +0.59% are copying Google's approach,
underscoring a deeper shift in U.S. telecommunications policy, from requiring universal service to letting
the marketplace decide.
--XT No Bandwidth Crisis
No total collapse – too decentralized
Jonathan Strickland, 10 February 2010 senior writer for Discovery’s How Stuff Works, "What would happen if the Internet collapsed?" .
HowStuffWorks.com. <http://computer.howstuffworks.com/internet/basics/internet-collapse.htm>
Here's the good news -- a total collapse of the Internet would be almost impossible. The Internet isn't a
magic box with an on/off switch. It's not even a physical thing. It's a collection of physical things and it's
constantly changing. The Internet isn't the same entity from one moment to the next -- machines are
always joining or leaving the Internet. It's possible for parts of the Internet to go offline. In fact, this
happens all the time. Whether it's a particular server that crashes and needs to be rebooted or replaced
or a cable under the ocean gets snagged by an anchor, there are events that can disrupt Internet service.
But the effects tend to be isolated and temporary. While there is such a thing as the Internet backbone - a collection of cables and servers that carry the bulk of data across various networks -- it's not
centralized. There's no plug you could pull out from a socket or a cable you could cut that would cripple
the Internet. For the Internet to experience a global collapse, either the protocols that allow machines
to communicate would have to stop working for some reason or the infrastructure itself would have to
suffer massive damage. Since the protocols aren't likely to stop working spontaneously, we can rule out
that eventuality. As for the massive damage scenario -- that could happen. An asteroid or comet could
collide with the Earth with enough force to destroy a significant portion of the Internet's infrastructure.
Overwhelming gamma radiation or electromagnetic fluctuations coming from the sun might also do the
trick. But in those scenarios, the Earth itself would become a lifeless hulk. At that stage it hardly matters whether or
not you can log in to MySpace.
Demand not growing fast enough to cause collapse – consensus
Leslie Daigle et al 2010; Internet Society Chief Internet Technology Officer; Internet Society briefing paper, Growing Pains:
Bandwidth on the Internet http://www.isoc.org/isoc/conferences/bwpanel/docs/bp-growingp-201003-en.pdf
The Internet is continuously evolving. Some of the more profound recent changes have been caused by
the impact of broadband access networks. In the last decade, the number of broadband subscribers
worldwide has grown over one hundred times. Widespread broadband deployment has led to
tremendous innovation in Internet applications and huge increases in the average amount of bandwidth
consumed per user. The effects of these changes are now being felt around the globe. Stimulated by a
recent panel event organized by the Internet Society, we present the results of several recent studies,
which, when combined represent the most detailed and comprehensive picture of the contemporary
Internet available today. These studies show a consensus emerging about the gross amount of
bandwidth being used on the Internet, and the growth trends. The panel event hosted discussion of the
impacts of growth and application innovation on Internet service providers, and some of the actions that
the technical community is taking to address these ‘growing pains’. We draw a number of conclusions
from the data and the discussion: • The growth of Internet bandwidth globally is not about to cause
global problems. International and intercarrier links are not, in general, unable to cope with the
demands of growing bandwidth consumption.
Your impacts are consistently and hilariously empirically denied – prefer our evidence
Leslie Daigle et al 2010; Internet Society Chief Internet Technology Officer; Internet Society briefing paper, Growing Pains:
Bandwidth on the Internet http://www.isoc.org/isoc/conferences/bwpanel/docs/bp-growingp-201003-en.pdf
It is a truism that the Internet has grown tremendously since its inception, both in the scale of the
physical internetwork that underpins it and the scope of activity that it supports. The invention and
widespread dissemination of Internet technology marks an inflection point in human civilization
arguably as great as that wrought by Johannes Gutenberg. Unsurprisingly, given this sudden, striking,
and profound change, doom-laden predictions for the future of the Internet have never been hard to
find. In addition to concerns about the impact on human social norms and the implications for economic
activity, there have been regular forecasts of impending catastrophe based on fears that the technology
itself is simply unable to support the huge growth curve it has experienced and is experiencing.
ISP’s exaggerate massive data costs – internet traffic add tiny cost
Barry Collins (writer for PC Pro) October 2011 “ISPs "exaggerate the cost of data"”
http://www.pcpro.co.uk/news/broadband/370393/isps-exaggerate-the-cost-of-data
SPs are over-egging the costs of meeting the ever-increasing demand for data, according to a new report. Both
fixed and mobile providers have claimed that increased internet traffic has resulted in "ballooning" costs
for networks. Some ISPs have argued that content providers should pay them to help meet the cost of supplying bandwidth-intensive
services such as the BBC iPlayer. However, a new report commissioned by content providers - including the BBC,
Channel 4 and Skype - claims the costs of delivering additional internet traffic have been wildly
exaggerated by the ISPs. "Traffic-related costs are a small percentage of the total connectivity revenue,
and despite traffic growth, this percentage is expected to stay constant or decline," claims the report, written by
telecoms experts Plum Consulting. The report claims the cost of delivering additional gigabytes of data are mere
pennies. "Studies in Canada and in the UK... put the incremental cost of fixed network traffic at around €0.01-0.03 per GB." The report
concedes that the cost of adding capacity on mobile networks "are significantly higher than they are for fixed networks" because "the radioaccess network is shared by users". However, it claims forthcoming 4G technologies will significantly reduce those costs. "Forward-looking
estimates which take account of the transition to LTE [Long Term Evolution], additional spectrum and traffic subscriber growth... puts the cost
to the mobile network operators at under €1 per GB," Plum Consulting claims. As the report states, that cost is "well below existing
Describing claims of ballooning costs as a "myth", the report
concludes that "for fixed networks, traffic-related costs are low, falling on a unit basis and likely to fall
overall given declines in traffic growth and on-going cost-reducing technical progress".
smartphone data tariffs of around €10 per GB".
Telecoms solve bandwidth crunch now – status quo momentum sufficient
David Goldman (writer for CNN Money) February 2012 “4 ways to stave off the cell phone
apocalypse” http://money.cnn.com/2012/02/24/technology/spectrum_crunch_solutions/index.htm
It's easy to get frustrated about the effects of the spectrum crunch. Higher bills, fewer choices, and dismal service are enough to make even the
casual cell phone customer furious. Making things worse, none of the solutions for easing the spectrum shortage are inexpensive or easy.
There's no catch-all fix on the horizon. The
good news, though, is that options exist -- and carriers understand that
doing nothing would be disastrous. Here are the four primary ways they're going about staving off a spectrum crisis
and the resulting cell phone apocalypse. Reusing spectrum: One way to relieve capacity jams is "cell splitting,"
which involves either adding more cell sites or adding more radios to existing sites to increase the
number of connections that a network can handle. The problem is that it's expensive and tricky. "It would seem to some
people that you could infinitely reuse the spectrum you already have," says Dan Hays, a partner at PricewaterhouseCoopers' consultancy. "The
reality is a bit more complicated." As the number of bandwidth-hogging smartphones and tablets increases, carriers have to deploy more and
more towers. They face practical hurdles: no one wants a new antenna in their backyard. Interference is also a growing problem as more
towers get added. There
are, however, some innovative solutions being developed.
No short-term collapse – and your impacts are unsupported paranoia
Leslie Daigle et al 2010; Internet Society Chief Internet Technology Officer; Internet Society briefing
paper, Growing Pains: Bandwidth on the Internet
http://www.isoc.org/isoc/conferences/bwpanel/docs/bp-growingp-201003-en.pdf
At the macro level, bandwidth pressures at the international and intercarrier level would cause regional
problems. As described earlier, this does not appear to be on the horizon because gross traffic growth is
not going to exceed the anticipated growth in global network capacity anytime soon. While the
Internet did experience episodes of ‘congestion collapse’ more than 20 years ago, the mechanisms
implemented at that time to address the problem have largely stood the test of time. Despite this,
rumours of imminent network meltdown are never far away.
Growth scenarios are exaggerated by the IT industry – be skeptical
Peter Sevcik 2001; President of NetForecast in Andover, MA, and is a leading authority on Internet
traffic, performance and technology Internet Bandwidth: It’s Time for Accountability Net Forecasts –
Peter J. Sevcik BCR Volume 31, Number 1 January 2001
http://www.netforecast.com/Articles/bandwidth%20supply.pdf
The Internet has not been doubling every 3.5 months, despite what you might hear. Figure 1 shows how
far off that hyper-growth scenario is. But the myth continues because it’s useful -- it helps get money
out of investors and keep stock prices inflated. The realistic choices facing planners and investors is
reflected in Scenarios A and B in Figure 1. Looking at the evidence and evaluating the chances for those
scenarios, I think that Scenario A will prevail in 2001. The industry’s in for a tough year; we’re more likely
to see pessimism doubling every 3.5 months over the prospects for the Internet economy rather than
bandwidth doubling. However, long term, I think that Scenario B will emerge as the winning end game.
It’s ironic that one of the major benefits of the ‘Net - information transparency -- manifests itself in
many parts of the economy more than in the Internet business itself. The data in Figure 1 is very difficult
to gather and compile; it represents the best I could do from the sketchy data available. Most industry
players have an incentive to keep this data secret in order to bolster their market positions. Similarly,
the market research firms that continually issue glowing reports, seem to place a higher value on loyalty
to their clients than to realistic assessment of the situation. If we try to keep Internet planners and investors in the dark,
the New Economy will be adopting some of the worst characteristics of the Old Economy. It’s time for Internet service providers to supply data
about their capacity and demand to an impartial group that will compile and share it with the public. It is time for accountability.
--XT Innovation Inev
University research solves
NRC 12
National Research Council, principal operating agency of the National Academies, Winter 2012, “Optics
and Photonics: Essential Technologies for Our Nation,” 7-155
In contrast with the pattern of innovation, entry, and early-stage growth of many of these technologies in the 1950s and 1960s, the new
technological possibilities are being pursued by start-up firms, often in collaboration with U.S.
government laboratories or universities (see Figure 7.5, which shows the growing role of U.S. universities
in optoelectronics patenting). Moreover, the U.S. defense market often is a less central source of demand for innovative
technologies. The new approach to technology development that relies more heavily on universities and
small and medium-size firms for innovation, in which VC funding plays a more important role, may increase the importance of
mechanisms to support cross-industry and cross-institutional coordination in helping the United States to maintain leadership in photonics
innovation.
Innovation high and inevitable
Vivek Wadhwa 14, fellow at the Rock Center for Corporate Governance at Stanford University,
director of research at the Center for Entrepreneurship and Research Commercialization at Duke’s
engineering school and distinguished scholar at Singularity and Emory universities, “How the United
States is reinventing itself yet again”, 1/2/14,
http://www.washingtonpost.com/blogs/innovations/wp/2014/01/02/how-the-united-states-isreinventing-itself-yet-again/
And that’s not all the pessimists say. They also argue that while the United States continues to dominate in the emergence of new
technology powerhouses, the biggest IPO of the decade belongs to Facebook, a social network that is more media company than technology
innovator. Stifling red tape and regulations has driven costs of testing new medicines and medical devices so high that many drug
companies have shifted testing regimes and market focus to Europe and Asia. Despite mounting evidence that
skilled immigrant entrepreneurs have delivered a wildly disproportionate share of the country’s technology innovation and technology job
growth, the powers that be in Washington, D.C. have, even with broad bipartisan support, not mustered up the votes to reform the country’s
regressive and punitive immigration policies. Add to all of this an aging populace requiring more and more support from younger workers,
ballooning health costs and a tax structure that beggars the young to underwrite benefits for the aged, and
the United States looks
more and more like a historical footnote than a superpower.¶ Peel back the layers of the onion, and the
reality appears quite different. In fact, the United States stands on the cusp of a dramatic revival and
rejuvenation, propelled by an amazing wave of technological innovation. A slew of breakthroughs will
deliver the enormous productivity gains and the societal dramatic cost savings needed to sustain
economic growth and prosperity. These breakthroughs, mostly digital in nature, will complete the shift
begun by the Internet away to a new era where the precepts of Moore’s Law can be applied to virtually
any field.¶ Computer-assisted design and fabrication will reshape manufacturing forever. These technologies
will slash waste and replace nearly all conventional manufacturing with more environmentally friendly and cost-effective additive
manufacturing run with robots and computer programs. Complex systems resistant to modeling will succumb to advances in big data that allow
mankind to finally make sense and improve upon the most intricate multi-faceted interactions. Where big data fails, ubiquitous
crowd
sourcing will harness untapped brain cycles to train systems and solve problems, one small activity at a
time — on a global scale.¶ In this massively digital world, A/B testing or parallelization of R&D processes will become
commonplace for just about everything from airline design simulations to online advertising to artificial organ construction. This
will, in turn, allow for far more rigorous testing of products and processes. Dirt-cheap digital delivery platforms for
educational content and improvements in the understanding of the way the brain learns will yield a sea change
in how we gain knowledge. This will result in more open, flexible educational systems and structures — and a smarter,
more learned, constantly learning populace. While the world will benefit from these changes, the United States is
uniquely positioned to lead this sea change.
--XT Comcast Thumper
Comcast’s monopoly over the internet trumps
Lee 2014 (Timothy B [senior editor at Vox]; Comcast is destroying the principle that makes a
competitive internet possible; May 6; www.vox.com/2014/5/6/5678080/voxsplaining-telecom; kdf)
Conservatives love the internet. They don't just love using it, they also love to point to it as an example of the
power of free markets. And they're right. The internet has had a remarkable 20-year run of rapid innovation with minimal government
regulation. That was possible because the internet has a different structure than other communications networks.
Most networks, like the 20th century telephone market, are natural monopolies requiring close government supervision. But the internet
is organized in a way that allows markets, rather than monopolists or government regulators, to set prices. That
structure has been remarkably durable, but it's not indestructible. And unfortunately, it's now in danger. In recent years,
Comcast has waged a campaign to change the internet's structure to make it more like the monopolistic
telephone network that came before it, making Comcast more money in the process. Conservatives are naturally and properly
skeptical of government regulation. But this is a case where the question isn't whether to regulate, but what kind of
regulation is preferable. If federal regulators don't step in now to preserve the structures that make internet
competition possible, they will be forced to step in later to prevent the largest ISPs from abusing their
growing monopoly power.
Comcast is the biggest internal link to internet competition
Lee 2014 (Timothy B [senior editor at Vox]; Comcast is destroying the principle that makes a
competitive internet possible; May 6; www.vox.com/2014/5/6/5678080/voxsplaining-telecom; kdf)
The importance of market share Two factors tend to make the bill-and-keep model stable. One is competition in the consumer ISP market. If
customers can easily switch between broadband providers, then it would be foolish for a broadband
provider to allow network quality to degrade as a way to force content companies to the bargaining
table. The second factor is ISP size. When ISPs are relatively small, payments naturally flow from the edges of
the network to the middle because small edge networks need large transit networks to reach the rest of
the internet. Imagine, for example, if the Vermont Telephone Company, a tiny telecom company that recently started offering ultra-fast
internet services, tried to emulate Comcast. Suppose it began complaining that Netflix was sending it too much traffic and demanding that its
transit providers start paying it for the costs of delivering Netflix content to its subscribers. Netflix and the big transit companies that provide it
with connectivity would laugh at this kind of demand. It would be obvious to everyone that VTel needs transit service more than transit
providers need VTel. But when an ISP's market share gets large enough, the calculus changes. Comcast has 80 times as many subscribers as
Vermont has households. So
when Comcast demands payment to deliver content to its own customers, Netflix
and its transit suppliers can't afford to laugh it off. The potential costs to Netflix's bottom line are too large. This provides a
clear argument against allowing the Comcast/Time Warner merger. Defenders of the merger have argued that it won't reduce competition
because Comcast and Time Warner don't serve the same customers. That's true, but it ignores how the merger would affect the
interconnection market. A merged cable giant would have even more leverage to demand monopoly rents from companies across the internet.
A century ago, the Wilson administration decided not to press its antitrust case against AT&T, allowing the firm to continue the acquisition
spree that made it a monopoly. In retrospect, that decision looks like a mistake. Wilson's decision not to intervene in the market led to a
telephone monopoly, which in turn led to 70 years of regulation and a messy, 10-year antitrust case. Obviously, the combination of Comcast
and Time Warner would not dominate the internet the way AT&T dominated the telephone industry. But recent
events suggest that
Comcast is already large enough to threaten competition on the internet. Preventing the company
from getting even larger might avoid the need for a lot more regulation in the years ahead. Comcast declined
to comment for this story.
1nc Military Bandwidth
Either tech development in the squo solves because of demand for Netflix, Facebook,
etcetera OR the plan makes it worse because it rapidly increases demand on the
networks before capacity can be ramped up, turning the aff
New DOD initiatives solve
Slabodkin February 23, 2015 (Greg; JIE: How DOD is building a bigger network that's alos a smaller
target; defensesystems.com/Articles/2015/02/23/Joint-Information-Environment-JRSSsecurity.aspx?Page=4; kdf)
Dave Cotton, DOD’s acting deputy CIO for information enterprise, who is responsible for providing the leadership, strategy, and guidance for
JIE, said that the
JRSS foundational layer includes network standardization and optimization across DOD
networks, such as increasing bandwidth capabilities where necessary and switching upgrades through MultiProtocol Label Switching (MPLS) technology. MPLS, which enables higher bandwidth/throughput and faster routing capabilities,
allows the department to “stop leasing circuits and get away from the legacy-based circuits to a more IPbased infrastructure,” he said. “That provides the foundation then to put the security component in place.” MPLS routers are an
industry-standard for speeding and managing network traffic flow. JRSS is prompting a massive effort to expand capacity and increase
throughput across Army and Air Force bases with MPLS upgrades to the network backbone that will increase the bandwidth to 100 gigabytes
per second. According to Cotton, MPLS also enables DOD to route and secure network traffic for a specific mission instead of just for a
particular location, resulting in more focused and coherent command and control for missions. Unlike
the one-size-fits-all
networks that DOD currently operates, he says the JIE will provide operational commanders more freedom
to take cybersecurity risks with the networks since the risks can be contained to the decision support
and systems specifically needed for that mission. This is a significant change from today's DOD
networks which impose more operational constraints on commanders. The risk containment zones the SSA defines in the server computing
and the network will enable joint commanders to better contain cyber risks assumed by a particular mission from spilling over into other
missions, while sharing as broadly with external partners as a mission requires, Cotton said. In addition, users and systems will be able to trust
their connection with the assurance that the information and systems involved in a mission are correct and working even during a cyberattack.
Based on a single DOD-wide IT architecture and key enabling enterprise services, JIE is “a more secure, defendable, responsible, and more
command and controllable, integrated network for the Department of Defense information exchange environment,” Cotton said. The
idea
is to bring together all the capabilities that will enable “a more coherent, more secure, interoperable and less
costly capability”—efficiencies that will be achieved through economies of scale and eliminating
duplication. A big part of that is cloud computing, which is a critical component of the JIE and DOD’s IT modernization efforts.
New suitcase internet set up solves
McCaney June 5, 2014 (Kevin; Army boosts bandwidth with new suitcase-sized satellite terminals;
defensesystems.com/articles/2014/06/05/army-t2c2-high-bandwidth-satellite-terminals.aspx; kdf)
Portable network access for soldiers in the field is about to get a lot faster with the Army’s latest
satellite kit in a suitcase. The Transportable Tactical Command Communications, or T2C2, boosts the
bandwidth for small detachments and teams connecting to the Army’s battlefield network, thus
increasing the situational awareness and functionality of early-entry teams and helping to improve
communications throughout the tactical edge, the Army said in a release. T2T2 comes in two flavors: a
larger transportable dish that serves company-level operations and the smaller T2C2 Lite, which the
Army said is about the size of carry-on luggage and which can be set up and working in about 10
minutes. The small model is similar to the Global Rapid Response Information Package, or GRRIP, which
soldiers have been using in Afghanistan, for example, as network infrastructure leaves with the
drawdown. But GRIPP uses only the L Band in the satellite communications spectrum, limiting
transmission to kilobits per second. T2C2 Lite adds the Ka and X bands, boosting performance to
megabits per second and allowing soldiers to use advanced applications. Last month, T2C2 was
designated a program of record (GRRIP is not), enabling the Army to institutionalize training on the
system. The equipment connects to the Army’s battlefield network, the Warfighter Information
Network-Tactical, via the military’s Wideband Global SATCOM constellation, and will work as a
companion to the Enroute Mission Command Capability, a WIN-T program that gives rapid-response
forces a view of their drop zones and allows for mission planning while in flight. For the Army, the bigger
bandwidth, combined with T2C2’s portability, advances the cause of seamless, mobile battlefield
communications.
New antennas solve
Hamilton 2015 (Alex; US Army's new high bandwidth inflatable antenna; Jan 11;
www.governmentfishbowl.com/2015/01/11/us-armys-new-high-bandwidth-inflatable-antenna/; kdf)
The US Army deployed an inflatable ground satellite antenna that comes in a small package for simple
deployment. CHECK OUT: U.S. Naval Ships Now Shoot Lasers The theater of war has shifted from massive armies confronting each other over
vast tracts of land to more isolated “surgical” engagements. As much
a battleground as land, sea and air, control of the
digital spectrum is vital to military dominance. To assist in anywhere access to key networks, enter Project Manager
Warfighter Information Network-Tactical (WIN-T), home of the inflatable satellite antenna used by Special Operations, airborne and
conventional forces. Blown Into Proportion The communications device is known as Ground Antenna Transmit & Receive (GATR). The
inflatable antenna can adjust in size, weight and power, conforming to the needs of military personnel.
Leonard Newman, the Army product manager for Satellite Communications said, “The GATR allows you to deploy high-bandwidth
communications anywhere in the smallest possible package.” It weighs just 25 pounds and inflates into a sphere for resistance of wind up to 60
mph (97 kph). It also boasts a 6 hour backup battery. The setup takes just 30 minutes.
AT: Internet Freedom
1NC AT: Internet Freedom – terminally impossible
Private companies and algorithms ensure Internet freedom is literally impossible
Maus 2015 (Gregory; Eye in the Skynet; Jul 1; https://www.foreignaffairs.com/articles/china/2015-0701/eye-skynet; kdf)
Dictators constantly face a dilemma: crushing dissent to terrify (but anger) the populace or tolerating protests and offering reforms to keep the
public at bay (but embolden dissidents in the process). Instead of relying on gut instinct, experience, or historical precedent, autocrats
now have advances in data analytics and ubiquitous passive data to thank for letting them develop new,
scientifically validated methods of repression. By analyzing the dynamics of resistance with a depth
previously impossible, autocrats can preemptively crush dissent more reliably and carefully. With
machine learning and social network analysis, dictators can identify future troublemakers far more
efficiently than through human intuition alone. Predictive technologies have outperformed their human counterparts: a project from
Telenor Research and MIT Media Lab used machine-learning techniques to develop an algorithm for targeted marketing, pitting their algorithm
against a team of topflight marketers from a large Asian telecom firm. The
algorithm used a combination of their targets’
social networks and phone metadata, while the human team relied on its tried-and-true methods. Not
only was the algorithm almost 13 times more successful at selecting initial purchasers of the cell phone plans, their purchasers were 98 percent
more likely to keep their plans after the first month (as opposed to the marketers’ 37 percent). Comparable algorithms to target people
differently have shown promise somewhat more ominously. For example, advanced
social network algorithms developed by
the U.S. Navy are already being applied to identify key street gang members in Chicago and
municipalities in Massachusetts. Algorithms like these detect, map, and analyze the social networks of
people of interest (either the alleged perpetrators or victims of crimes). In Chicago, they have been used to identify those most likely to
be involved in violence, allowing police to then reach out to their family and friends in order to socially leverage them against violence. The
data for the models can come from a variety of sources, including social media, phone records, arrest
records, and anything else to which the police have access. Some software programs along this line also integrate geotags from the other data in order to create a geographic map of events. Programs like these have proven effective in
evaluating the competence of Syrian opposition groups, in identifying improvised explosive device creation and distribution
networks in Iraq, in helping police target gangs, and in helping police better target criminal suspects for investigation. Related breakthroughs in
computer algorithms have proven effective in forecasting future civil unrest. Since November 2012, computer scientists have worked on Early
Model Based Event Recognition using Surrogates (EMBERS), an algorithm developed with funding from the Intelligence Advanced Research
Projects Activity that uses publicly available tweets, blog posts, and other factors to forecast protests and riots in South America. By 2014, it
forecasted events at least a week in advance with impressive accuracy. The algorithm learned steadily from its successes and failures, adjusting
how it weighed variables and data with each successive attempt. In Russia, the pro-Kremlin Center for Research in Legitimacy and Political
Protest think tank claims to have developed a similar software system, called Laplace’s Demon, which monitors social media activity for signs of
protest. According to the center’s head, Yevgeny Venediktov, social scientists, researchers, government officials, and law enforcement agencies
that use the system “will be able to learn about the preparation of unsanctioned rallies long before the information will appear in the media.”
Venediktov considers the tool a vital security measure for curbing protests, stating, “We are now facing a serious cyber threat—the
mobilization of protest activists in Russia by forces located abroad,” necessitating “active and urgent measures to create a Russian system of
monitoring social networks and [develop] software that would warn Russian society in advance about approaching threats.” Authoritarian
governments, of course, have access to much more data about their citizens than a telecom company, a local
police department, or Laplace’s Demon could ever hope for, making it all the easier for them to ensure that their people never escape the quiet
surveillance web of trouble-spotting algorithms. Classic Orwellian standbys such as wiretapping, collecting communication metadata, watching
public areas through cameras (with ever-improving facial recognition), monitoring online activity (especially true in China, which has direct
control over network providers and surveillance tools built directly into social media services), tracking purchase records, scanning official
government records, and hacking into any computer files that cannot be accessed directly will become only more effective through the use of
new technologies and algorithms. There are many new surveillance methods available at the touch of a button. For example, former Ukraine
President Viktor Yanukovych sent a passive-oppressive mass text to those near a protest, warning them that they were registered as
participants in a mass riot. Governments can monitor their citizens’ locations through their phones, and the future of tracking people through
wearable computers and smart appliances is still on the way. With a steady stream of data available from nearly every citizen, automated
sifters such as EMBERS can steadily learn which data are valuable and prioritize appropriately. Machines have already shown that they are
competent in deriving a variety of private traits through Facebook likes, using social media profiles to forecast whether groups will stick
together, identifying personality traits through phone data and Twitter activity, determining the stage of one’s pregnancy through purchase
behavior, or ascertaining how likely one is to take a prescribed medication based on a variety of seemingly unrelated factors. At
the same
time that mass surveillance is becoming less obtrusive, outright mass censorship, once a standby tool of
repressive regimes worldwide, may have a more effective alternative thanks to analytics. Not only can
blatant censorship provoke a backlash, it also complicates the ability of states to monitor their people by
encouraging them either to use communication channels that are harder to watch or to figure out how
to cleverly evade notice by using coded language or symbols. The Grass-Mud Horse, for example, is an entirely fictional
creature popularized on the Chinese Internet because its pronunciation sounds like an incredibly vulgar swear word that the Communist Party’s
automatic censors would normally catch. However, the text itself seems harmless, so the censors couldn't easily clamp down on it. Indeed,
Chinese Internet users have developed very extensive systems of code phrases to evade the automated detection of certain sentiments.
Authoritarian regimes have been getting smarter at how they influence the public dialogue. Russia
boasts a well-organized army of paid anonymous online commenters. These agents seek to covertly influence opinion
both internally and internationally, posting on Russian and English forums and social media outlets that feature news about the nation, items
on Ukraine, or criticisms of Russian President Vladimir Putin. Reports also link the group to attempts to manipulate global opinion of U.S.
President Barack Obama, as well as the perpetuation of several serious online hoaxes, including false reports in the United States of a chemical
plant explosion, an Ebola virus outbreak, and the lethal shooting of an unarmed black woman by police in the wake of the shooting in Ferguson,
Mo.
--XT Algorithms t/o solvency
Governments will never cede control
Maus 2015 (Gregory; Eye in the Skynet; Jul 1; https://www.foreignaffairs.com/articles/china/2015-0701/eye-skynet; kdf)
The ability of autocrats to fend off regime change may be refined further through careful analysis of how
news and ideas spread. Academics have been able to track the diffusion of ideas (automatically
clustering distinctive words and phrases into unified memes) across millions of news sites since 2009
and have since been creating quantitative models of the diffusion. Since 2012, scholars have developed
mathematical models to infer how information flows from one group to another across millions of blogs
and news sites, without even having direct intelligence on how it was transmitted. These breakthroughs
can be used to turn phone metadata and online activity into complex models that depict how ideas
spread. When coupled with psychological profiles of specific subjects made by algorithms, governments
can forecast how ideas will spread and also steer them as they see fit. Even a difference as subtle as the
order in which a search engine returns results has been found to dramatically impact the formation of
political opinions: most Web users will click the first search results and ignore later results, suggesting
that a great deal of latitude can be had in influencing beliefs through subtle, calculated nudges.
Similarly, even the color of text can impact behavior and attitude, as evidenced in a recent study of
online gaming traits. With these advances either at-hand or in the near future, it would seem that
regimes will be able to steadily nudge their societies into an ideal of submissive police states, isolating
their subjects from any factors that could influence their thoughts towards rebellion. By identifying and
removing the “glitches” that cause dissent, these regimes could slowly, but steadily reengineer
humanity into the perfect machine-servants. Thanks to advances in computer science, autocracies can
be made more secure than ever before.
1NC – Democracy Turn
A free interent allows for authoritarian governments to use it as a means of greater
control—turns the case
Deibert, 15- (Ron Deibert is director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. He is the author of Black
Code: Surveillance, Privacy, and the Dark Side of the Internet (2013). He was a co-founder and principal investigator of the OpenNet Initiative
(2003–14).) “Cyberspace Under Siege” Journal of Democracy Volume 26, Number 3, July 2015, Project Muse, //droneofark
Third-generation controls are the hardest to document, but may be the most effective. They involve
surveillance, targeted espionage, and other types of covert disruptions in cyberspace. While firstgeneration controls are defensive and second-generation controls probe deeper into society, thirdgeneration controls are offensive. The best known of these are the targeted cyberespionage campaigns that emanate from China.
Although Chinese spying on businesses and governments draws most of the news reports, Beijing uses the same tactics to target human-rights,
prodemocracy, and independence movements outside China. A
recent four-year comparative study by Citizen Lab and
ten participating NGOs found that those groups suffered the same persistent China-based digital attacks
as governments and Fortune 500 companies.12 The study also found that targeted espionage campaigns can
have severe consequences including disruptions of civil society and threats to liberty. At the very least,
persistent cyberespionage attacks breed self-censorship and undermine the networking advantages that
civil society might otherwise reap from digital media. Another Citizen Lab report found that China has employed a new
attack tool, called “The Great Cannon,” which can [End Page 68] redirect the website requests of unwitting foreign users into denial-of-service
attacks or replace web requests with malicious software.13 While
other states may not be able to match China’s
cyberespionage or online-attack capabilities, they do have options. Some might buy off-the-shelf espionage
“solutions” from Western companies such as the United Kingdom’s Gamma Group or Italy’s Hacking Team—each of which Citizen Lab research
has linked to dozens of authoritarian-government clients.14 In
Syria, which is currently the site of a multisided, no-holdsbarred regional war, security services and extremist groups such as ISIS are borrowing cybercriminals’
targeted-attack techniques, downloading crude but effective tradecraft from open sources and then
using it to infiltrate opposition groups, often with deadly results.15 The capacity to mount targeted digital attacks is
proving particularly attractive to regimes that face persistent insurgencies, popular protests, or other standing security challenges. As these
techniques become more widely used and known, they create a chilling effect: Even without particular
evidence, activists may avoid digital communication for fear that they are being monitored. Thirdgeneration controls also include efforts to aim crowdsourced antagonism at political foes. Governments
recruit “electronic armies” that can use the very social media employed by popular opposition
movements to discredit and intimidate those who dare to criticize the state.16 Such online swarms are meant to
make orchestrated denunciations of opponents look like spontaneous popular expressions. If the activities of its electronic armies come under
legal question or result in excesses, a regime can hide behind “plausible deniability.” Examples of progovernment e-warriors
include Venezuela’s Chavista “communicational guerrillas,” the Egyptian Cyber Army, the pro-Assad Syrian Electronic Army, the pro-Putin
bloggers of Russia, Kenya’s “director of digital media” Dennis Itumbi plus his bloggers, Saudi Arabia’s antipornography “ethical hackers,” and
China’s notorious “fifty-centers,” so called because they are allegedly paid that much for each progovernment comment or status update they
post. Other
guises under which third-generation controls may travel include not only targeted attacks on
Internet users but wholesale disruptions of cyberspace. Typically scheduled to cluster before and during
major political events such as elections, anniversaries, and public demonstrations, “justin-time”
disruptions can be as severe as total Internet blackouts. More common, however, are selective disruptions. In Tajikistan,
SMS services went down for several days leading up to planned opposition rallies in October 2014. The government blamed technical errors;
others saw the hand of the state at work.17 Pakistan blocked all mobile services in its capital, Islamabad, for part of the day on 23 March 2015
in order to shield national-day parades from improvised explosive devices.18 During the 2014 prodemocracy demonstrations in Hong Kong,
China closed access to the photo-sharing site Instagram. Telecommunications companies in the Democratic Republic of Congo were ordered to
shut down all mobile [End Page 69] and SMS communications in response to antigovernment protests. Bangladesh ordered a ban on the
popular smartphone messaging application Viber in January 2015, after it was linked to demonstrations. To
these three generations,
we might add a fourth. This comes in the form of a more assertive authoritarianism at the international
level. For years, governments that favor greater sovereign control over cyberspace have sought to assert
their preferences—despite at times stiff resistance—in forums such as the International
Telecommunication Union (ITU), the Internet Governance Forum (IGF), the United Nations (UN), and the
Internet Corporation for Assigned Names and Numbers (ICANN).19 Although there is no simple division of “camps,”
observers tend to group countries broadly into those that prefer a more open Internet and a limited role for states and those that prefer a
state-led form of governance, probably under UN auspices. The
United States, the United Kingdom, Europe, and the
Asian democracies line up most often behind openness, while China, Iran, Russia, Saudi Arabia, and
various other nondemocracies fall into the latter group. A large number of emerging-market countries, led by Brazil, India,
and Indonesia, are “swing states” that can go either way. Battle lines between these opposing views were becoming sharper around the time of
the December 2012 World Congress on Information Technology (WCIT) in Dubai—an event that many worried would mark the fall of Internet
governance into UN (and thus state) hands. But the WCIT process stalled, and lobbying by the United States and its allies (plus Internet
companies such as Google) played a role in preventing fears of a state-dominated Internet from coming true. If recent proposals on
international cybersecurity submitted to the UN by China, Russia, and their allies tell us anything, future rounds of the cybergovernance forums
may be less straightforward than what transpired at Dubai. In January 2015, the Beijing- and Moscow-led Shanghai Cooperation Organization
(SCO) submitted a draft “International Code of Conduct for Information Security” to the UN. This document reaffirms many of the same
principles as the ill-fated WCIT Treaty, including greater state control over cyberspace. Such
proposals will surely raise the ire of
those in the “Internet freedom” camp, who will then marshal their resources to lobby against their
adoption. But will wins for Internet freedom in high-level international venues (assuming that such wins are in the
cards) do anything to stop local and regional trends toward greater government control of the online
world? Writing their preferred language into international statements may please Internet-freedom
advocates, but what if such language merely serves to gloss over a ground-level reality of more rather
than less state cyberauthority? It is important to understand the driving forces behind resurgent authoritarianism in cyberspace if
we are to comprehend fully the challenges ahead, the broader prospects facing human rights and democracy [End Page 70] promotion
worldwide, and the reasons to suspect that the authoritarian resurgence in cyberspace will continue. A
major driver of this
resurgence has been and likely will continue to be the growing impetus worldwide to adopt
cybersecurity and antiterror policies. As societies come to depend ever more heavily on networked
digital information, keeping it secure has become an ever-higher state priority. Data breaches and cyberespionage
attacks—including massive thefts of intellectual property—are growing in number. While the cybersecurity realm is replete
with self-serving rhetoric and threat inflation, the sum total of concerns means that dealing with
cybercrime has now become an unavoidable state imperative. For example, the U.S. intelligence community’s official
2015 “Worldwide Threat Assessment” put cyberattacks first on the list of dangers to U.S. national security.20 It is crucial to note how
laws and policies in the area of cybersecurity are combining and interacting with those in the antiterror
realm. Violent extremists have been active online at least since the early days of al-Qaeda several decades ago. More recently, the rise of
the Islamic State and its gruesome use of social media for publicity and recruitment have spurred a new
sense of urgency. The Islamic State atrocities recorded in viral beheading videos are joined by (to list a few) terror attacks such as the
Mumbai assault in India (November 2008); the Boston Marathon bombings (April 2013); the Westgate Mall shootings in Kenya (September
2013); the Ottawa Parliament shooting (October 2014); the Charlie Hebdo and related attacks in Paris (January 2015); repeated deadly assaults
on Shia mosques in Pakistan (most recently in February 2015); and the depredations of Nigeria’s Boko Haram. Horrors
such as these
underline the value of being able to identify, in timely fashion amid the wilderness of cyberspace, those
bent on violence before they strike. The interest of public-safety officials in data-mining and other hightech surveillance and analytical techniques is natural and understandable. But as expansive laws are rapidly passed
and state-security services (alongside the private companies that work for and with them) garner vast new powers and resources, checks and
balances that protect civil liberties and guard against the abuse of power can be easily forgotten. The
adoption by liberal
democracies of sweeping cybercrime and antiterror measures without checks and balances cannot help
but lend legitimacy and normative support to similar steps taken by authoritarian states. The headlong
rush to guard against extremism and terrorism worldwide, in other words, could end up providing the
biggest boost to resurgent authoritarianism.
--xt-> Authoritarianism
The Cybersecurity market demand increases incentives for authoritarian governments
to re-enforce state control and broaden anti-democratic regimes.
Deibert, 15- (Ron Deibert is director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. He is the author of Black
Code: Surveillance, Privacy, and the Dark Side of the Internet (2013). He was a co-founder and principal investigator of the OpenNet Initiative
(2003–14).) “Cyberspace Under Siege” Journal of Democracy Volume 26, Number 3, July 2015, Project Muse, //droneofark
A third driving factor has to do with the rapid growth of digital connectivity in the global South and
among the populations of authoritarian regimes, weak states, and flawed democracies. In Indonesia the
number of Internet users increases each month by a stunning 800,000. In 2000, Nigeria had fewer than a quartermillion Internet users; today, it has 68 million. The Internet-penetration rate in Cambodia rose a staggering 414 percent from January 2014 to
January 2015 alone. By the end of 2014, the number of mobile-connected devices exceeded the number of people on Earth. Cisco Systems
estimates that by 2019, there will be nearly 1.5 mobile devices per living human. The same report predicts that the steepest rates of growth in
mobile-data traffic will be found in the Middle East and Africa.23 Booming
digital technology is good for economic growth,
but it also creates security and governance pressure points that authoritarian regimes can squeeze. We
have seen how social media and the like can mobilize masses of people instantly on behalf of various
causes (prodemocratic ones included). Yet many of the very same technologies can also be used as tools of
control. Mobile devices, with their portability, low cost, and light physical-infrastructure requirements, are how citizens in the developing
world connect. These handheld marvels allow people to do a wealth of things that they could hardly have dreamt of doing before. Yet all
mobile devices and their dozens of installed applications emit reams of highly detailed information
about peoples’ movements, social relationships, habits, and even thoughts—data that sophisticated
agencies can use in any number of ways to spy, to track, to manipulate, to deceive, to extort, to
influence, and to target. The market for digital spyware described earlier needs to be seen not only as a
source of material and technology for countries who demand them, but as an active shaper of those
countries’ preferences, practices, and policies. This is not to say that companies are persuading policy
makers regarding what governments should do. Rather, companies and the services that they offer can
open up possibilities for solutions, be they deep-packet inspection, content filtering, cellphone tracking,
“big-data” analytics, or targeted spyware. SkyLock, a cellphone-tracking solution sold by Verint Systems of Melville, New York,
purports to offer governments “a cost-effective, new approach to obtaining global location information concerning known targets.” Company
brochures obtained by the Washington Post include “screen shots of maps depicting location tracking in what appears to be Mexico, Nigeria,
South Africa, Brazil, Congo, [End Page 73] the United Arab Emirates, Zimbabwe, and several other countries.”24 Large
industry trade
fairs where these systems are sold are also crucial sites for learning and information exchange. The best
known of these, the Intelligence Support Systems (ISS) events, are run by TeleStrategies, Incorporated, of McLean, Virginia. Dubbed the
“Wiretappers’ Ball” by critics, ISS events are exclusive conventions with registration fees high enough to exclude most attendees other than
governments and their agencies. As one recent study noted, ISS serves to connect registrants with surveillance-technology vendors, and
provides training in the latest industry practices and equipment.25 The March 2014 ISS event in Dubai featured one session on “Mobile
Location, Surveillance and Signal Intercept Product Training” and another that promised to teach attendees how to achieve “unrivaled attack
capabilities and total resistance to detection, quarantine and removal by any endpoint security technology.”26 Major corporate
vendors of lawful-access, targeted-surveillance, and data-analytic solutions are fixtures at ISS meetings
and use them to gather clients. As cybersecurity demands grow, so will this market. Authoritarian policy
makers looking to channel industrial development and employment opportunities into paths that
reinforce state control can be expected to support local innovation. Already, schools of engineering, computer
science, and data-processing are widely seen in the developing world as viable paths to employment and economic sustainability, and within
those fields cybersecurity is now a major driving force. In Malaysia, for example, the British defense contractor BAE Systems agreed to
underwrite a degree-granting academic program in cybersecurity in partial fulfillment of its “defense offsets” obligation.27 India’s new
“National Cyber Security Policy” lays out an ambitious strategy for training a new generation of experts in, among other things, the fine points
of “ethical hacking.” The goal is to give India an electronic army of high-tech specialists a half-million strong. In a world where “Big Brother” and
“Big Data” share so many of the same needs, the political economy of cybersecurity must be singled out as a major driver of resurgent
authoritarianism in cyberspace.
xt -> Localization
Democracy promotion bolsters internet localization- turns the case
Deibert, 15- (Ron Deibert is director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. He is the author of Black
Code: Surveillance, Privacy, and the Dark Side of the Internet (2013). He was a co-founder and principal investigator of the OpenNet Initiative
(2003–14).) “Cyberspace Under Siege” Journal of Democracy Volume 26, Number 3, July 2015, Project Muse, //droneofark
December 2014 marked the fourth anniversary of the Arab Spring. Beginning
in December 2010, Arab peoples seized the
attention of the world by taking to the Internet and the streets to press for change. They toppled regimes once
thought immovable, including that of Egyptian dictator Hosni Mubarak. Four years later, not only is Cairo’s Tahrir Square
empty of protesters, but the Egyptian army is back in charge. Invoking the familiar mantras of
antiterrorism and cybersecurity, Egypt’s new president, General Abdel Fattah al-Sisi, has imposed a suite
of information controls.1 Bloggers have been arrested and websites blocked; suspicions of mass surveillance cluster
around an ominous-sounding new “High Council of Cyber Crime.” The very technologies that many
heralded as “tools of liberation” four years ago are now being used to stifle dissent and squeeze civil
society. The aftermath of the Arab Spring is looking more like a cold winter, and a potent example of
resurgent authoritarianism in cyberspace. Authoritarianism means state constraints on legitimate
democratic political participation, rule by emotion and fear, repression of civil society, and the
concentration of executive power in the hands of an unaccountable elite. At its most extreme, it encompasses
totalitarian states such as North Korea, but it also includes a large number of weak states and “competitive authoritarian” regimes.2 Once
assumed to be incompatible with today’s fast-paced media environment, authoritarian systems of rule
are showing not only resilience, but a capacity for resurgence. Far from being made obsolete by the
Internet, authoritarian regimes are now actively shaping cyberspace to their own strategic advantage.
This shaping includes technological, legal, extralegal, and other targeted information [End Page 64] controls. It also includes regional
and bilateral cooperation, the promotion of international norms friendly to authoritarianism, and the
sharing of “best” practices and technologies. The development of several generations of information controls has resulted in a
tightening grip on cyberspace within sovereign territorial boundaries. A major impetus behind these controls is the growing
imperative to implement cybersecurity and antiterror measures, which often have the effect of
strengthening the state at the expense of human rights and civil society. In the short term, the disclosures by Edward
Snowden concerning surveillance carried out by the U.S. National Security Agency (NSA) and its allies must also be cited as a factor that has
contributed, even if unintentionally, to the authoritarian resurgence. Liberal
democrats have wrung their hands a good deal
lately as they have watched authoritarian regimes use international organizations to promote norms
that favor domestic information controls. Yet events in regional, bilateral, and other contexts where authoritarians learn from
and cooperate with one another have mattered even more. Moreover, with regard to surveillance, censorship, and
targeted digital espionage, commercial developments and their spinoffs have been key. Any thinking
about how best to counter resurgent authoritarianism in cyberspace must reckon with this reality.
Mention authoritarian controls over cyberspace, and people often think of major Internet disruptions such as Egypt’s shutdown in late January
and early February 2011, or China’s so-called Great Firewall. These are noteworthy, to be sure, but they do not capture the full gamut of
cyberspace controls. Over time, authoritarians have developed an arsenal that extends from technical measures, laws, policies, and regulations,
to more covert and offensive techniques such as targeted malware attacks and campaigns to coopt social media. Subtler and thus more likely to
be effective than blunt-force tactics such as shutdowns, these measures reveal a considerable degree of learning. Cyberspace authoritarianism,
in other words, has evolved over at least three generations of information controls.3
SQ solves
Squo solves—net neutrality
Garside March 3, 2015 (Juliette; Net neutrality is like free speech – and the internet needs rules, says
FCC boss; www.theguardian.com/technology/2015/mar/03/net-neutrality-free-speech-fcc-tomwheeler; kdf)
The US’s top media regulator hit back at critics of new net neutrality rules voted into law last week, comparing them to the first amendment
and saying neither
government nor private companies had the right to restrict the openness of the
internet. The Federal Communications Commission chairman, Tom Wheeler, was speaking in Barcelona at Mobile World Congress, the
world’s largest telecoms trade show, just as European governments are meeting to thrash out their own principles for keeping the internet
open. “This
is no more regulating the internet than the first amendment regulates free speech in our
country,” Wheeler said. “If the internet is the most powerful and pervasive platform in the history of the planet, can it exist without a
referee? There needs to be a referee with a yardstick, and that is the structure we have put in place. A set
of rules that say activity should be just and reasonable, and somebody who can raise the flag if they
aren’t.” Telecoms companies across Europe and America have railed against Wheeler’s reforms, saying they will
discourage investment in better cable and wireless networks and simply benefit bandwidth-hungry
services like Netflix and YouTube, which do not normally pay for their content to be carried across the internet. In the US, Verizon and AT&T,
the two largest mobile operators, have said they will try to reverse the new rules in the courts. Meanwhile, Wheeler told conference attendees
in Barcelona: “Those who were opposed to the open internet rules like to say this is Depression-era monopoly regulation. We built our model
for net neutrality on the regulatory model that has been wildly successful in the US for mobile.” The FCC rules will treat telecoms companies in
a similar way to utilities such as electricity. Internet service providers will
be explicitly prohibited from blocking, throttling or
prioritising internet traffic for commercial reasons. Where complaints are raised, the FCC will decide on a case-by-case basis whether
what network owners are doing is “fair and just”. The FCC has said it would not intervene areas such as pricing, network unbundling and
technical operating requirements. The
European parliament is in the midst of negotiations with member states
and network operators over final net neutrality rules, which could be published later this spring. A
source at one of Europe’s largest mobile carriers said the fear was that Europe would introduce similar
rules, only to find itself out of step when the FCC is forced to back down by a legal challenge or a change of president.
No backsliding—experts
Berkman, 14—writer for The Daily Dot, an e-magazine focused on key internet issues
Fran, “Tech experts discuss the greatest threats to Internet freedom,” July 4,
http://www.dailydot.com/politics/threats-to-internet-freedom/
Oh how the Internet has grown. What was once a small village of interconnected networks has grown into a booming digital metropolis with
billions of users. Like any prominent place, the Internet is continuously being shaped, for better or worse, by institutional forces. To get a better
sense for where this is all leading, the
Pew Research Center asked thousands of Internet experts their thoughts
on what the Internet will be like in 2025. Pew published a report titled “Net Threats,” detailing its findings, on Thursday. The
experts’ responses were generally optimistic; 65 percent of the 1,400 experts who responded said there would
not be “significant changes for the worse and hindrances to the ways in which people get and share
content online.” Whether they answered with optimism or pessimism, the experts were asked to elaborate on potential risks to Internet
freedom. Perhaps unsurprisingly, the experts cited government censorship and surveillance, as well as commercialization, as the greatest
threats to the Internet we’ve come to know and love. “Because of governance issues (and the international implications of the NSA reveals),
data sharing will get geographically fragmented in challenging ways,” said Microsoft research scientist danah boyd, one of the respondents
quoted in the Pew report. “The next few years are going to be about control.” boyd is referring to the past 13 months of revelations about the
National Security Agency’s (NSA) vast digital surveillance capabilities, as revealed through documents leaked by former NSA contractor Edward
Snowden. On the topic of censorship, Pew notes that the Internet has shown it has the power to take down governments, as displayed during
the Arab Spring. This has caused dictatorial regimes to react by working to censor Internet access. But as one of Pew’s experts points out,
censorship is not a trend that’s limited to just China and Syria. “Governments worldwide are looking for more power over the Net, especially
within their own countries,” said Dave Burstein, editor of Fast Net News. “Britain, for example, has just determined that ISPs block sites the
government considers ‘terrorist’ or otherwise dangerous.” Indeed, a recent report found that British ISP filters are blocking one-fifth of the
100,000 of the country’s most popular webpages, including political blogs and medical information sites. As for commercialization, the last of
the three threats to Internet freedom detailed by the Pew experts, the respondents highlighted debates about net neutrality and copyright law
as key battlegrounds. It
certainly wasn’t all doom and gloom for the Internet. Google executive Vint Cerf,
one of the Internet’s founding fathers, responded to Pew with a bit more optimism. “Social norms will
change to deal with potential harms in online social interactions,” he said. “The Internet will become far
more accessible than it is today.”
Diplomacy doesn’t solve internet freedom
Wagstaff, 14—writer for NBC citing a report by the Pew Research Internet Project
Keith, “These Are the Four Biggest Threats to the Internet: Pew Report,”
http://www.nbcnews.com/tech/internet/these-are-four-biggest-threats-internet-pew-report-n147391
More people are going online than ever, but Internet
freedom could be seriously at risk, according to a new report from the
Pew Research Internet Project. It identified four main threats. The first is the prospect of more nations cracking down
on access to the Web and mobile apps, like Turkey’s recent Twitter ban and China’s long-standing “Great Firewall.”
The next is a backlash against government surveillance programs in the wake of revelations about the U.S.
National Security Agency (NSA) and its British equivalent, the Government Communications Headquarters (GCHQ). Also
mentioned was the “pressures businesses are under to monetize Internet” — especially when it comes to “net
neutrality” and restrictive patent laws that could stifle innovation. The final threat to Internet freedom could be that we share too much
information, making us reliant on the algorithms of companies like Google and Facebook to find information,
filters that are often set with business considerations in mind.
--XT No Solve Internet Freedom
Silk Road conviction has undermined internet freedom –slippery slope
Maza 2015 [Cristina Maza, Staff writer, What guilty verdict in Silk Road trial might mean for Internet
freedom, Christian Science Monitor, http://www.csmonitor.com/USA/USA-Update/2015/0205/Whatguilty-verdict-in-Silk-Road-trial-might-mean-for-Internet-freedom]
On Wednesday, a jury
decided that Ross Ulbricht is the “Dread Pirate Roberts,” the pseudonym used by the
architect of the Silk Road underground drug bazaar. Before it was shut down by the federal government in 2013, Silk Road
was considered the largest marketplace for finding illegal drugs online. The site was also used to sell fake IDs and other illegal goods using
bitcoin, an online currency that operates with no central authority or banks. The prosecution said that Mr. Ulbricht was a “kingpin” who
received a portion of every transaction that occurred on the site. Ulbricht will be sentenced in May and faces a minimum of 20 years in prison.
He could also be handed a life sentence. The defense has attempted to paint Ulbricht as a naïve kid who was framed after his Frankenstein
monster grew out of control. It is expected to appeal the decision. The
case is broadly important, experts say, because it
could have implications for Internet freedom. It explores not only the legal question of whether a website
operator can be held accountable for how his site is used by others but also how the government ferrets
out illegal Internet activity. Along the way, the proceedings have provided an unvarnished look at the Internet's dark side, perhaps for
the first time. "What's most interesting about this case is that it is the first case in its enormity involving the Dark Net and
it's going to be a wakeup for anyone using the Dark Net thinking they have anonymity. You cannot
remain anonymous on the Internet," Darren Hayes, assistant professor and director of cyber security at Pace University, told
CNBC. Ulbricht was arrested after the Federal Bureau of Investigation discovered a server in Iceland that linked
him to Silk Road. But how the FBI discovered the server has been a point of contention. Ulbricht’s defenders
claim that the government used illegal methods to locate Silk Road, violating his constitutional right to privacy, though a judge denied that line
of defense. The anonymity protections provided by the cryptographic software Tor mean that law enforcement would need to obtain a search
warrant to discover the the location of Silk Road's servers, Ulbricht's defenders say. The lack of a warrant taints the evidence found in the
subsequent investigation, the defense stated in a memo. The FBI stated that it located the server due to a misconfiguration of Silk Road’s
CAPTCHA system – the string of letters and numbers that helps protect a site from spam. This error inadvertently revealed the server's IP
address, the FBI said. But
experts claim that it would be impossible to use the CAPTCHA to find the server.
Some suggest that the National Security Agency might have had a hand in locating the server. “My guess is
that the NSA provided the FBI with this information. We know that the NSA provides surveillance data to
the FBI and the DEA, under the condition that they lie about where it came from in court,” wrote Bruce
Schneier, Chief Technology Officer of Co3 Systems and a fellow at Harvard's Berkman Center, on his blog. Meanwhile, the
idea of charging a website’s operator with wrongdoing when a user conducts illegal activity raises
interesting questions about Internet freedom, says Hanni Fakhoury, an attorney at the Electronic
Frontier Foundation. "The main issue, the main Internet freedom issue is at what point are website operators
accountable for what happens on their site? In Silk Road, it's an easy case because they were catering to illegal activity. But
what is interesting is that you start with easy cases and then you start to go towards some of the borderline
cases," he said to CNBC. In Ulbricht’s case, the jury decided that, as the mastermind behind a site catering to the sale of nefarious content, he
should be held accountable. The evidence against Ulbricht, most of which was located on his laptop, was overwhelming and included digital
chat records, traced bitcoin transactions, and a diary he kept detailing the tribulations he faced while running the site. The jury deliberated for
under four hours before it found Ulbricht guilty on seven counts, including money laundering, drug trafficking, and computer hacking, among
others.
Alt cause –Silk Road conviction set a precedent for hypocrisy and violation of interent
freedom
Knibbs 2014 [Kate Knibbs, How The Silk Road Trial Set A Dangerous Legal Precedent, Gizmodo,
http://www.gizmodo.com.au/2015/02/the-silk-road-trial-set-a-dangerous-legal-precedent/]
The Silk
Road trial is over. A jury found Ross Ulbricht guilty on all seven charges, including money
laundering, drug trafficking, and the “kingpin” charge. That’s not just bad news for Ulbricht, who faces life in prison. His
trial has set a dangerous precedent, which could allow law enforcement to gather evidence illegally. While
many watching the trial were fascinated by all the ways that Ulbricht’s identity was definitively linked to the pseudonymous digital drug bazaar
runner Dread Pirate Roberts, they overlooked something crucial. The
FBI never had to explain how it located and
infiltrated the Silk Road’s hidden servers. The fact that the evidence law enforcement provided from
those servers was admitted despite the lack of clarity about their sources is troubling. Privacy advocates
suspect the government’s search and seizure was not entirely above board, arguing the agency hacked into the anonymous site without a
warrant. As Adam Clark Estes wrote shortly before the trial: Both sides are clashing over one specific detail regarding how the FBI located the
hidden Silk Road server. Put simply, they hacked the site’s login page with a (potentially illegal) brute force attack. Or the NSA did it for them —
that part’s a little bit unclear. Neither of the government agencies had a warrant, of course. The defence says that this
sort of intrusion
represents a clear violation of the Fourth Amendment. Just imagine if the FBI had broken into and
searched Ulbricht’s house instead of his server. That’s a reasonable concern, though it didn’t do the defence any good in
court. Judge Katherine Forrest rejected the argument on a technicality during the trial, and so the defence was not allowed to explore this line
of questioning. Without a clear answer, there’s no proof that the government upheld the Fourth Amendment and obtained the information
legally. The defence instead tried to run with the argument that the FBI had initially suspected someone else of running the Silk Road, Mt. Gox
CEO Mark Karpeles. But the prosecution shut down this line of questioning, and the defence was pretty much screwed. The prosecution had
obtained a damning pile of evidence, from Ulbricht’s diaries to a report tracing $US13.4 million Bitcoin from the Silk Road into Ulbricht’s
personal digital wallet. While defence lawyer Robert Dratel kept arguing about the
slipperiness of digital identity, it wasn’t enough
to sway the jury. What’s at stake here is a lot more than Ulbricht’s innocence or guilt. This trial set
precedents that will affect future defendants, too. The fact is that law enforcement was allowed to
present damning digital evidence without explaining where it came from. That’s bad news for our civil
liberties. It means that police and other law enforcement officers working digital crime cases may not have to worry as much about obeying
the law anymore when it comes to gathering evidence. Corruption would surely follow. Before the verdict came in, I talked to Ryan E. Long, a
lawyer affiliated with Stanford’s Center on Internet and Society, about the potential impact of this case
on future internet-related trials. He zeroed in on the importance of authenticating the evidence that
the government showed, and making sure it was obtained without violating the Constitution. “How did they
get this information, and did they breach the law by getting it? I think that will set the precedent with future electronic
cases about how the government got the information and whether they did it legally,” he said. The issue is,
he continued, “whether the government obtained the evidence that they wish to use to prove this narrative,
[Ulbricht's guilt] such as the identity of the server, in a lawful way consistent with the Fourth
Amendment, among other things.” That doesn’t mean Ulbricht did not do the things he’s now convicted of doing. It doesn’t mean
the Silk Road kingpin doesn’t belong behind bars. But it does mean, unambiguously, that the feds were allowed to present evidence that may
have been obtained unlawfully. In the legal world, there’s a metaphor called “fruit of the poisonous tree.” It’s used to describe
tainted evidence, evidence that comes from breaking the law. It’s not supposed to be admissible in court. But now, thanks to the Silk Road
verdict, it is.
--Net Neutrality
Net neutrality now with coming FCC rules
Liebelson, 2015 (Dana, “Stunning Victory Within Reach For Net Neutrality Advocates” Huffington Post,
http://www.huffingtonpost.com/2015/01/27/net-neutrality-fcc_n_6555036.html)
Next month, a wonky government agency will rule on the fate of the Internet. The Federal
Communications Commission (FCC) is expected to grant a major victory to net neutrality advocates, a
stunning turnaround following years of conventional wisdom to the contrary.
But advocates aren't celebrating yet. Instead, they're watching to see if the FCC will create rules that are
strong and enforceable, or that leave gaping holes for telecom and cable companies to drive through.
They are also eyeing a Republican-backed proposal that, they say, will undermine a free and open
Internet.
For months, the battle over net neutrality has centered on whether the FCC will reclassify consumer
broadband Internet as a utility under Title II of the Telecommunications Act. Reclassification would
empower the FCC to block Internet service providers, or ISPs, from charging content providers like
Netflix more for reliable Internet access -- thereby hampering, for example, a person's ability to quickly
and affordably stream "House of Cards." (ISPs maintain that they won't create a second network for
faster service.)
FCC Chairman Tom Wheeler has indicated that he supports Title II -- a proposal backed by President
Barack Obama -- and it's widely believed that Wheeler will go that route. Republicans contend that such
a move would qualify as government overreach, and they have introduced legislation that would
essentially gut the agency's authority. That bill's fate is unclear, given that it's unpopular among many
Democrats but still makes big net neutrality concessions that telecom and cable companies might not
favor.
Regardless, advocates say that Title II authority won't mean much unless the FCC creates enforceable
rules and doesn't allow loopholes.
"Right now, the big carriers are simply looking for a loophole," said Marvin Ammori, a lawyer who
advises major tech companies and supports net neutrality. He noted that there are multiple loopholes -like writing exceptions for mobile or specialized services -- that could undermine the whole FCC rule.
"They only need one," he said.
Still, it's not clear how much wiggle room Wheeler's rules will leave. He has said that he favors standards
that are "just and reasonable," not simply favorable to the ISPs.
Engstrom told HuffPost that even if the FCC only decides on Title II in this round of rulemaking, and
doesn't clarify additional rules until afterward, "that's certainly preferable to the proposals coming out
of Congress."
FCC rules will be strong, no loopholes and ISPs hate it
Brodkin, 1/8/15 - Ars Technica's senior IT reporter (Jon, “On net neutrality, Internet providers are
betrayed by one of their own” Ars Technica, http://arstechnica.com/business/2015/01/on-netneutrality-internet-providers-are-betrayed-by-one-of-their-own/)
When President Obama picked Tom Wheeler to lead the Federal Communications Commission in May
2013, our headline was, “Uh-oh: AT&T and Comcast are ecstatic about the FCC’s new chairman.”
They’re not happy anymore, especially not after Wheeler yesterday all but confirmed at the Consumer
Electronics Show (CES) that he will propose reclassifying Internet providers as common carriers in order
to impose net neutrality rules. This would expose broadband to some of the FCC’s strongest powers
contained in Title II of the Communications Act, usually reserved for wireline phone service.
Yet it seemed in 2013 that Internet providers had every reason to be pleased: Wheeler formerly led the
biggest trade associations representing the cable and wireless industries. Wheeler was CEO of the
National Cable Television Association (NCTA) from 1979 to 1984 and CEO of the Cellular
Telecommunications & Internet Association (CTIA) from 1992 to 2004.
Wheeler’s first stab at net neutrality in May 2014 didn't cause much concern in the industry, which
under that proposal would have remained a lightly regulated “information service” and been free to
charge Web services for priority access to consumers. But the proposal was widely condemned by
consumers and various advocacy groups. Eventually, Obama called on Wheeler to go with Title II for
both fixed Internet service and mobile, and it appears Wheeler will do just that.
If he does, Wheeler would show that Washington’s revolving door doesn’t always guarantee that
regulators do the bidding of the regulated. Former FCC Chairman Michael Powell, who made sure that
ISPs would face little regulation, now leads the NCTA and has repeatedly called on Wheeler to avoid
using Title II. Former FCC Commissioner and current CTIA CEO Meredith Attwell Baker has also lobbied
against such a move.
There were signs shortly after Wheeler’s swearing-in that he might not hold the same views as the
current heads of the cable and wireless trade groups he used to lead. For one thing, he hired prominent
consumer advocate Gigi Sohn as his Special Counsel for External Affairs. Wheeler admires Abraham
Lincoln's “team of rivals” approach, and for the past year and a half, Sohn has been instrumental in
laying groundwork for a likely Title II reclassification, according to an article in The Hill yesterday.
Wheeler has also repeatedly pointed to his past as a venture capitalist and entrepreneur, saying he
learned from experience that networks must be open to spur innovation.
Yup, Verizon's mad
Title II’s utility-style rules have long been applied to the traditional telephone system, but the rules
Internet providers face likely won’t be as strict. Obama urged the FCC to forbear from imposing rate
regulation and similar restrictions. But the FCC would use Title II to prevent ISPs from blocking or
throttling Web services or prioritizing services in exchange for payment.
Wheeler will circulate proposed rules to fellow commissioners on February 5 and hold a vote on
February 26, he said yesterday. We contacted the major ISPs and telecommunications industry groups
today, and their reactions were predictably negative.
GOP bill dead on arrival
Crawford, 1/28/15 – visiting professor at Harvard (Susan “The Net Neutrality Bait and Switch”
https://medium.com/backchannel/the-net-neutrality-bait-and-switch-cedb65f1a1cd
That same shorthand applies to a new “Internet openness” draft bill to amend the Communications Act
of 1934, introduced by Sen. John Thune (R-SD) and Rep. Fred Upton (R-MI), the new leaders of the
Senate and House committees charged with oversight of the Federal Communications Commission.
Although calculated to address concerns about online fairness, its real thrust is to remove or constrain
the FCC’s authority in a host of areas. The bill will draw a swift presidential veto.
As well it should. The bill is full of problems. It would prevent the FCC from going after any new schemes
that position carriers like Comcast or Verizon as gatekeepers online. In cases where carriers are
subsidized to provide communications services in hard-to-reach places (like rural areas and tribal land),
it would raise barriers to the FCC’s ability to ensure that those carriers actually use those funds to offer
high-speed Internet access. It would bar the FCC from using its existing statutory authority to protect
consumers against privacy abuses and other exploits — like being billed for unauthorized charges. And
rather than allowing the FCC to create clear rules that set the terms of engagement in advance, it would
put the burden on consumers and businesses to prove problems through prolonged, expensive, case-bycase wrangling after the fact.
The GOP leadership has to know they’ve lost the PR wars on net neutrality. The bill so transparently
shackles the FCC that it doesn’t stand a chance in the open air—and even if it does, of course, the
President’s veto pen will be ready.
AT: Crowe
Squo solves
Crowe 14 (Tyler; The internet of things: our greatest shot at battling climate change; Feb 15;
www.fool.com/investing/general/2014/02/15/this-technology-is-our-only-real-shot-at-addressin.aspx;
kdf)
The Internet of Things is still very much in its infancy, but it's taking off fast. The pending boom in
machine-to machine communication helps explain why Google (NASDAQ: GOOGL ) shelled out more
thah $3.2 billion for smart-thermostat company Nest Labs. Its ability allows customers to better manage
heating and cooling in households and instantly provide feedback to utilities in order to better manage
energy demand during peak load hours. Sure, estimates put the total number of machine-to-machine
capable devices in the billions, but for the Internet of things to be truly effective, everything needs to be
connected. Estimates for total connected devices around the globe could reach into the trillions. This
could lead to an industry with annual revenues of a whopping $948 billion.
The big players in the technology world, like Google and Intel (NASDAQ: INTL ) , will undoubtedly be
major players in this fast-growing market. Aside from its investment with Nest for smarter home energy
use, Google is also getting into the transportation game with its Open Auto Alliance, a group of
automakers and technology companies that will establish common practices such that vehicles from
different manufacturers can communicate with each other -- the building block for self driving vehicles.
With that much money on the line, can you really blame these companies for diving into this market?
What a Fool believes
The Internet of Things trend is approaching ... fast. For investors, it could be an amazing opportunity to
get in on the ground floor of a new market with trillion dollar potential, but it is so much more than that.
Increased productivity and elimination of wasteful energy consumption through smart devices could be
the one and only key to cutting greenhouse gas emission enough to reduce the chances of significant
climate change. So go ahead and continue arguing about the use of fossil fuels or alternative energy -the investors who will really be betting on reducing carbon emissions will be putting their money here.
AT: Eagleman
Eagleman’s a hack and internet won’t save civilization
Mnookin 12
Seth Mnookin teaches science writing at MIT and blogs at the Public Library of Science, Download the
Universe, March 23, 2012, "The Frozen Future of Nonfiction",
http://www.downloadtheuniverse.com/dtu/2012/03/why-the-net-matters-how-the-internet-will-savecivilization-by-david-eagleman-canongate-books-2010-for-ipad-by-set.html
At least, that’s what I assumed before I read Why The Net Matters, Eagleman’s frustrating 2010 e-book
about how and why the Internet will save civilization. (I reviewed the $7.99 iPad version, which is the
platform it was designed for; a stripped-down, text-based version is available on the Kindle for the
portentous price of $6.66.) The problems start with Eagleman’s premise, which is so vague and broad as
to be practically meaningless. There are, he writes, just “a handful of reasons” that civilizations collapse:
“disease, poor information flow, natural disasters, political corruption, resource depletion and economic
meltdown.” Lucky for us (and Eagleman does offer readers “[c]ongratulations on living in a fortuitous
moment in history”), the technology that created the web “obviates many of the threats faced by our
ancestors. In other words...[t]he advent of the internet represents a watershed moment in history that
just might rescue our future.”
On the other hand, it just might not: In order to make his point, Eagleman either ignores or doesn’t
bother to look for any evidence that might undercut it. The first of six “random access” chapters that
make up the bulk of Why The Net Matters is devoted to “Sidestepping Epidemics,” like the smallpox
outbreak that helped bring down the Aztec Empire. In the future, Eagleman writes, the “protective net,”
in the form of telemedicine, telepresence (“the ability to work remotely via computer”), and
sophisticated information tracking, will save us from these outbreaks. That all sounds lovely, but what of
the fact that we’re currently experiencing a resurgence in vaccine-preventable diseases such as
measles...a resurgence which is fueled in no small part by misinformation spread over that very same
“protective net”?
A few chapters later, in a section celebrating the benefits of the hive mind, Eagleman invokes Soviet
pseudoscientist Trofim Lysenko, a famed quack who took over the U.S.S.R.’s wheat production under
Stalin. Because the Soviet Union spanned 13 time zones, Eagleman writes, “central rule-setting was
disastrous for wheat production. … Part of the downfall of the USSR can be traced to this centralization
of agricultural decisions.” That sounds nice, and might even be true—but it’s not a point that’s
supported by Lysenko, whose main shortcoming was not that he believed in a one-size-fits-all approach;
it was that he was a fraud.
Moving to the present day, Eagleman addresses wildfires that swept through Southern California in
2007, which, he writes, “brought into relief the relationship between natural disasters and the internet.”
At the beginning of the outbreak in October, Californians were glued to their television screens, hoping
to determine if their own homes were in danger. But at some point they stopped watching the
televisions and turned to other sources. A common suspicion arose that the news stations were most
concerned with the fate of celebrity homes in Malibu and Hollywood; mansions that were consumed by
the flames took up airtime in proportion to their square footage, which made for gripping video but a
poor information source about which areas were in danger next. So people be-gan to post on Twitter,
upload geotagged cell phone photos to Flickr, and update Facebook.
I had been fairly obsessed with the wildfires, and since I didn’t remember this “common suspicion,” I
decided to check the article Eagleman cites as the source of this info, which was a Wired blog post titled
“Firsthand Reports from California Wildfires Pour Through Twitter.” It contained no references to a
celebrity-obsessed news media; instead, the piece described how “the local media [was] overwhelmed.”
It also talked about a San Diego resident who was “[a]cting as an ad hoc news aggregator of sorts” by
“watching broadcast television news, listening to local radio reports and monitoring streaming video on
the web” and then posting information, along with info gleaned from IMs, text messages, and e-mails,
to his Twitter account.
AT: Genachowski
Genachowski was the worst—reject their ev
Gustin 13 [Sam Gustin, reporter at TIME focused on business, technology, and public policy, FCC
Chairman Julius Genachowski Stepping Down After Contentious Term, TIME,
http://business.time.com/2013/03/22/fcc-chairman-julius-genachowski-stepping-down-aftercontentious-term-reports/]
Federal Communications Commission Chairman Julius Genachowski is stepping down, he announced Friday.
Genachowski, who became chairman in 2009, has presided over an agency that has grappled with contentious issues like U.S. broadband policy,
cable and telecom industry competition, and media consolidation. In seeking to strike a centrist balance, Genachowski managed
to
alienate both public interest groups that have pushed for a more activist FCC on issues like media
ownership and Internet openness, as well as industry giants, particularly AT&T, which had proposed buying T-Mobile
before the FCC objected. Verizon Wireless is currently suing the FCC in federal court over the agency’s “network neutrality” rules.
Genachowski’s announcement, which was expected, comes just days after another FCC commissioner, Robert McDowell, announced his plan to
leave the agency. Their departures create two vacancies on the commission, which will be filled by candidates nominated by President Obama.
The job of FCC chairman is particularly important, because the position wields significant power in shaping U.S. telecom regulatory policy. A
spokesman for the FCC’s office of the chairman declined to comment on the reports of Genachowski’s impending departure, but Reuters
reported that he informed his staff of his decision on Thursday. Genachowski, a former Internet executive at media mogul Barry Diller’s
IAC conglomerate, attended Harvard Law School with President Obama and later raised money for Obama. When
he was appointed,
public interest groups were optimistic that he would champion the open Internet principles at the heart
of “network neutrality,” the idea that Internet providers shouldn’t discriminate against rival services. But
public interest groups were dismayed when Genachowski ultimately settled on a compromise originally
crafted by Google and Verizon Wireless, which ensured net neutrality on wired networks, but did not
extend the principle to wireless networks. “When Julius Genachowski took office, there were high hopes that he would use his
powerful position to promote the public interest,” Craig Aaron, president and CEO of public interest group Free Press, said in a statement. “But
instead of acting as the people’s champion, he’s catered to corporate interests. He claimed to be a
staunch defender of the open Internet, but his Net Neutrality policies are full of loopholes and offer no
guarantee that the FCC will be able to protect consumers from corporate abuse in the future.” It’s easy to take
the idea of net neutrality for granted, but all Web users and companies have equal access to the Internet, in the same way that all Americans
have the right to travel anywhere in the 50 states without a passport. Companies and institutions have closed networks, but the main public
internet is accessible by all. Without this open access, net neutrality advocates argue, startups like Google, Facebook, Twitter, and thousands of
others could never have emerged to become the commercial and communications powerhouses they are today.
Genachowski also infuriated public interest groups with his decision to approve Comcast’s purchase of
NBCUniversal, which critics said concentrated too much power with one company. “Though President Obama
promised his FCC chairman would not continue the Bush administration’s failed media ownership policies, Genachowski offered the exact same
broken ideas that Bush’s two chairmen pushed,” Aaron said. “He
opposition to his plans.”
never faced the public and ignored the overwhelming
AT: McDowell
McDowell is all rhetoric—but he does say appointments and lack of platform
outweigh
McDowell, 13
(Chair-FCC, 2/15, “Commissioner McDowell Congressional Testimony,”
http://www.fcc.gov/document/commissioner-mcdowell-congressional-testimony)
Thank you Chairman Upton, Ranking Member Waxman, Chairman Royce, Ranking Member Engel, Chairman Walden, Ranking Member Eshoo,
Chairman Poe, Ranking Member Sherman, Chairman Smith and Ranking Member Bass. It is an honor to be before you during this rare joint
hearing. Thank you for inviting me. It is a privilege to testify before such a rare meeting of three subcommittees and beside such a distinguished
group on this panel. Ladies and gentlemen, the
Internet is under assault. As a result, freedom, prosperity and the
potential to improve the human condition across the globe are at risk. Any questions regarding these assertions are
now settled. Last year’s allegations that these claims are exaggerated no longer have credibility. In my testimony today, I will make five
fundamental points: 1) Proponents of multilateral intergovernmental control of the Internet are patient and persistent incrementalists who will
never relent until their ends are achieved; 2) The recently concluded World Conference on International Telecommunications (“WCIT”) ended
the era of an international consensus to keep intergovernmental hands off of the Internet in dramatic fashion, thus radically twisting the oneway ratchet of even more government regulation in this space; 3) Those
who cherish Internet freedom must immediately
redouble their efforts to prevent further expansions of government control of the Internet as the
pivotal 2014 Plenipotentiary meeting of the International Telecommunication Union (“ITU”)1 quickly draws nearer; 4)
Merely saying “no” to any changes is – quite obviously – a losing proposition; therefore we should work to offer alternate proposals such as
improving the longstanding and highly successful, non-governmental, multi-stakeholder model of Internet governance to include those who
may feel disenfranchised; and 5) Last year’s bipartisan and unanimous Congressional resolutions clearly opposing expansions of international
powers over the Internet reverberated throughout the world and had a positive and constructive effect. I. Proponents of multilateral
intergovernmental control of the Internet are patient and persistent incrementalists who will never relent until their ends are achieved. First, it
is important to note that as far back as 2003 during the U.N.’s Summit on the Information Society (“WSIS”), the U.S. found itself in the lonely
position of fending off efforts by other countries to exert U.N. and other multilateral control over the Internet. In both 2003 and 2005, due to
the highly effective leadership of my friend Ambassador David Gross – and his stellar team at the Department of State – champions of Internet
freedom were able to avert this crisis by enhancing the private sector multi-stakeholder governance model through the creation of entities such
as the Internet Governance Forum (“IGF”) where all stakeholders, including governments, could meet to resolve challenges. Solutions should be
found through consensus rather than regulation, as had always been the case with the Internet’s affairs since it was opened up for public use in
the early 1990’s.2 Nonetheless, countries
such as China, Russia, Iran, Saudi Arabia and scores of their allies never
gave up their regulatory quest. They continued to push the ITU, and the U.N. itself, to regulate both the
operations, economics and content of the Net. Some proposals were obvious and specific while others were insidious and
initially appeared innocuous or insignificant. Many defenders of Internet freedom did not take these proposals seriously at first, even though
some plans explicitly called for: • Changing basic definitions contained in treaty text so the ITU would have unrestricted jurisdiction over the
Internet;3 • Allowing foreign phone companies to charge global content and application providers internationally mandated fees (ultimately to
be paid by all Internet consumers) with the goal of generating revenue for foreign government treasuries;4 • Subjecting cyber security and data
privacy to international control, including the creation of an international “registry” of Internet addresses that could track every Internetconnected device in the world;5 • Imposing unprecedented economic regulations of rates, terms and conditions for currently unregulated
Internet traffic swapping agreements known as “peering;”6 • Establishing ITU dominion over important non-profit, private sector,
multistakeholder functions, such as administering domain names like the .org and .com Web addresses of the world;7 • Subsuming into the ITU
the functions of multi-stakeholder Internet engineering groups that set technical standards to allow the Net to work;8 • Centralizing under
international regulation Internet content under the guise of controlling “congestion,” or other false pretexts; and many more.9 Despite these
repeated efforts, the unanimously adopted 1988 treaty text that helped insulate the Internet from international regulation, and make it the
greatest deregulatory success story of all time, remained in place. Starting in 2006, however, the ITU’s member states (including the U.S.) laid
the groundwork for convening the WCIT.10 The purpose of the WCIT was to renegotiate the 1988 treaty. As such, it became the perfect
opportunity for proponents of expanded regulation to extend the ITU’s reach into the Internet’s affairs. In fact, in 2011, thenRussian Prime
Minister Vladimir Putin summed it up best when he declared that his goal, and that of his allies, was to establish “international control over the
Internet” through the ITU.11 Last month in Dubai, Mr. Putin largely achieved his goal. II. December’s WCIT ended the era of international
consensus to keep intergovernmental hands off of the Internet in dramatic fashion. Before the WCIT, ITU leadership made three key promises:
1) No votes would be taken at the WCIT; 2) A new treaty would be adopted only through “unanimous consensus;” and 3) Any new treaty would
not touch the Internet.12 All three promises were resoundingly broken.13 As a result of an 89-55 vote, the ITU now has unprecedented
authority over the economics and content of key aspects of the Internet.14 Although the U.S. was ultimately joined by 54 other countries in
opposition to the new treaty language, that figure is misleading. Many countries, including otherwise close allies in Europe, were willing to vote
to ensnare the Internet in the tangle of intergovernmental control until Iran complicated the picture with an unacceptable amendment. In
short, the
U.S. experienced a rude awakening regarding the stark reality of the situation: when push
comes to shove, even countries that purport to cherish Internet freedom are willing to surrender. Our
experience in Dubai is a chilling foreshadow of how international Internet regulatory policy could
expand at an accelerating pace. Specifically, the explicit terms of the new treaty language give the ITU policing powers over
“SPAM,” and attempt to legitimize under international law foreign government inspections of the content of Internet communications to assess
whether they should be censored by governments under flimsy pretexts such as network congestion.15 The
bottom line is, countries
have given the ITU jurisdiction over the Internet’s operations and content. Many more were close to
joining them. More broadly, pro-regulation forces succeeded in upending decades of consensus on the
meaning of crucial treaty definitions that were universally understood to insulate Internet service
providers, as well as Internet content and application providers, from intergovernmental control by
changing the treaty’s definitions.16 Many of the same countries, as well as the ITU itself,17 brazenly argued that the old treaty text
from 1988 gave the ITU broad jurisdiction over the Internet.18 If these regulatory expansionists are willing to conjure ITU
authority where clearly none existed, their control-hungry imaginations will see no limits to the ITU’s
authority over the Internet’s affairs under the new treaty language. Their appetite for regulatory
expansionism is insatiable as they envision the omniscience of regulators able to replace the billions of
daily decisions that allow the Internet to blossom and transform the human condition like no other
technology in human history. At the same time, worldwide consumer demand is driving technological
convergence. As a result, companies such as Verizon, Google, AT&T, Amazon, Microsoft, Netflix, and many more in the U.S. and in
other countries, are building across borders thousands of miles of fiber optics to connect sophisticated
routers that bring voice, video and data services more quickly to consumers tucked into every corner of
the globe. From an engineering perspective, the technical architecture and service offerings of these companies look the same. Despite this
wonderful convergence, an international movement is growing to foist 19th Century regulations designed for railroads, telegraphs and
vanishing analog voice phone monopolies onto new market players that are much different from the monoliths of yore. To
be blunt,
these dynamic new wonders of the early 21st Century are inches away from being smothered by
innovation-crushing old rules designed for a different time. The practical effect of expanded rules would
be to politicize engineering and business decisions inside sclerotic intergovernmental bureaucracies. If
this trend continues, Internet growth would be most severely impaired in the developing world. But even
here, as brilliant and daring technologists work to transform the world, they could be forced to seek bureaucratic permission to innovate and
invest. In sum, the
dramatic encroachments on Internet freedom secured in Dubai will serve as a stepping
stone to more international regulation of the Internet in the very near future. The result will be devastating
even if the United States does not ratify these toxic new treaties. We must waste no time fighting to prevent further
governmental expansion into the Internet’s affairs at the upcoming ITU Plenipotentiary in 2014. Time is
of the essence. While we debate what to do next, Internet freedom’s foes around the globe are working
hard to exploit a treaty negotiation that dwarfs the importance of the WCIT by orders of magnitude. In
2014, the ITU will conduct what is literally a constitutional convention, called a “plenipotentiary”
meeting, which will define the ITU’s mission for years to come. Its constitution will be rewritten and a new Secretary
General will be elected. This scenario poses both a threat and an opportunity for Internet freedom. The
outcome of this massive treaty negotiation is uncertain, but the momentum favors those pushing for
more Internet regulation. More immediately, the World Telecommunications Policy/ICT Forum (“WTPF”), which convenes in Geneva
this May, will focus squarely on Internet governance and will shape the 2014 Plenipotentiary. Accordingly, the highest levels of the U.S.
Government must make this cause a top priority and recruit allies in civil society, the private sector and diplomatic circles around the world.
The effort should start with the President immediately making appointments to fill crucial vacancies in our
diplomatic ranks. The recent departures of my distinguished friend, Ambassador Phil Verveer, his legendary deputy Dick Beaird, as well as WCIT
Ambassador Terry Kramer, have left a hole in the United States’ ability to advocate for a constructive – rather than destructive – Plenipot.
America and Internet freedom’s allies simply cannot dither again. If we do, we will fail, and global freedom and prosperity will suffer. We
should work to offer constructive alternative proposals, such as improving the highly successful multistakeholder model of Internet governance to include those who feel disenfranchised. As I warned a year
ago, merely saying “no” to any changes to the multi-stakeholder Internet governance model has
recently proven to be a losing proposition.19 Ambassador Gross can speak to this approach far better than can I, but using the
creation of the IGF as a model, we should immediately engage with all countries to encourage a dialogue among
all interested parties, including governments, civil society, the private sector, non-profits and the ITU, to
broaden the multi-stakeholder umbrella to provide those who feel disenfranchised from the current structure with a meaningful
role in shaping the evolution of the Internet. Primarily due to economic and logistical reasons, many developing
world countries are not able to play a role in the multi-stakeholder process. This is unacceptable and
should change immediately. Developing nations stand to gain the most from unfettered Internet
connectivity, and they will be injured the most by centralized multilateral control of its operations and
content. V. Last year’s bipartisan and unanimous Congressional resolutions clearly opposing expansions of
international powers over the Internet reverberated around the world and had a positive and
constructive effect, but Congress must do more. In my nearly seven years of service on the FCC, I have been amazed by how
closely every government and communications provider on the globe studies the latest developments in
American communications policy. In fact, we can be confident that this hearing is streaming live in some countries, and is being
blocked by government censors in others. Every detail of our actions is scrutinized. It is truly humbling to learn that even my statements have
been read in Thailand and Taiwan, as well as translated into Polish and Italian. And when
Congress speaks, especially when it
speaks with one loud and clear voice, as it did last year with the unanimous and bipartisan resolutions
concerning the WCIT, an uncountable number of global policymakers pause to think. Time and again, I have
been told by international legislators, ministers, regulators and business leaders that last year’s resolutions had a positive effect on the
outcome of the WCIT. Although Internet freedom suffered as a result of the WCIT, many even more corrosive proposals did not become
international law in part due to your actions.20 IV. Conclusion. And so, I ask you in the strongest terms possible, to take
action and take
action now. Two years hence, let us not look back at this moment and lament how we did not do enough. We have but one chance. Let
us tell the world that we will be resolute and stand strong for Internet freedom. All nations should join us. Thank
you for having me appear before you today. I look forward to your questions.
AT: Minton
Minton is writing for Breitbart which is bad
Source Watch no date – accessed 10/12 (Center for Media and Democracy,
http://www.sourcewatch.org/index.php?title=Andrew_Breitbart#Sourcewatch_resources)
Race baiting
Breitbart was behind the July 2010 attempt to smear Department of Agriculture employee Shirley Sherrod by
heavily editing a video of a speech she gave to make it appear she was confessing to being racist. The
story she told, in its entirety, was exactly the opposite -- it was a story of redemption in which Sherrod explained how she had
overcome feelings of racism to realize everyone needed to be treated equally.
Media Matters described the episode this way:
In a July 19 BigGovernment.com post -- headlined "Video Proof: The NAACP Awards Racism -- 2010" -- Breitbart purported to provide "video
evidence of racism coming from a federal appointee and NAACP award recipient." The heavily edited video clip Breitbart posted shows Shirley
Sherrod, then the USDA Georgia Director of Rural Development, speaking at an NAACP Freedom Fund dinner in Georgia, and stating that she
didn't give a "white farmer" the "full force of what I could do" because "I was struggling with the fact that so many black people have lost their
farmland, and here I was faced with having to help a white person save their land." Breitbart characterized Sherrod's comments as her
"describ[ing] how she racially discriminates against a white farmer."
Full video vindicates Sherrod, destroys Breitbart's accusations of racism. On July 20, the NAACP posted the full video of Sherrod's
remarks, exposing how the clip Breitbart posted had taken Sherrod out of context. The heavily edited clip included her statements that she
initially did not help the farmer, but removed her statements indicating that she ultimately did help him save his farm and learned that "it's not
just about black people, it's about poor people."
Immediately prior to the portion of Sherrod's speech included in Breitbart's clip, Sherrod says that she originally made a "commitment" "to
black people only," but that "God will show you things and he'll put things in your path so that you realize that the struggle is really about poor
people." Immediately following the portion of the video included in the clip, Sherrod detailed her extensive work to help the farmer save his
farm. She then said, "working with him made me see that it's really about those who have versus those who don't," adding "they could be
black, and they could be white, they could be Hispanic. And it made me realize then that I needed to work to help poor people -- those who
don't have access the way others have." She later added, "I couldn't say 45 years ago, I couldn't stand here and say what I'm saying -- what I will
say to you tonight. Like I told, God helped me to see that its not just about black people, it's about poor people. And I've come a long way."
Breitbart portrayed Sherrod as a member of the Obama administration when she made the comments, which wasn't the case. The video of her
speech was made in 1986, many years prior to the Obama Administration.[3][4]
Distortion
Breitbart was also behind the coordinated release of heavily edited undercover videos that misrepresented
the activities of the community group ACORN. Media Matters writes,
On September 10, 2009, conservative activist and videographer James O'Keefe posted an entry to BigGovernment.com in which he revealed
that he and fellow activist Hannah Giles had posed as a pimp and prostitute at a Baltimore ACORN Housing office and secretly filmed their
meetings with ACORN staffers. As O'Keefe wrote, their intention was to take "advantage of ACORN's regard for thug criminality by posing the
most ridiculous criminal scenario we could think of and seeing if they would comply -- which they did without hesitation," the "scenario" being
the "trafficking of young helpless girls and tax evasion." O'Keefe would later release similar recordings of their interactions with ACORN and
ACORN Housing employees at several other ACORN offices nationwide. Breitbart
authored a separate September 10
BigGovernment.com post "introducing" O'Keefe and making it clear that he and BigGovernment.com would play a central role in the
distribution of O'Keefe and Giles' videos. But as Breitbart, O'Keefe, and Giles released and promoted the "heavily edited" videos, their
allegations about ACORN and its employees were undermined by numerous falsehoods and distortions. Subsequent
investigations revealed no pattern of intentional, illegal misconduct by ACORN, and no criminality by ACORN personnel. It did, however, find
the videos had been heavily edited to cast ACORN in a negative light. [5]
AT: Democracy
Their internal links are anecdotal
Bailard 2014 (Catie [Assist Prof of Media and Pubic Affairs @ George Washington; Catie received her
doctorate in political science from UCLA with concentrations in American Politics, Formal and
Quantitative Methods, and International Relations]; The other Facebook Revolution;
www.foreignaffairs.com/articles/142351/catie-bailard/the-other-facebook-revolution?cid=rss-rss_xmlthe_other_facebook_revolution-000000; kdf)
Empirical testing confirms that the Internet has clear and consistent influence on how citizens feel about their governments. As one might
expect, the mirror-holding and window-opening mechanisms boost public satisfaction with government in advanced democracies and public
dissatisfaction in nations with weak democratic practices. However, research also demonstrates that the
Internet’s effect is
neither automatic nor uniform—one democratic gain, such as more critical evaluations of poor-performing governments, does
not automatically set off a domino effect of entirely pro-democratic gains in citizens’ attitudes and
behaviors. Take Tanzania, for example, where I conducted a randomized field experiment to test the effect of Internet use on
evaluations of the 2010 general election. Although the Internet offered plentiful information about the
questionable integrity of a then-upcoming national election, the results of the experiment revealed that
Tanzanians with access to that information also became less likely to vote. After all, the belief that an election
would not be fair can produce two very divergent responses—although some people may feel inclined to respond by taking to the streets,
others may simply throw up their hands and stay home. Meanwhile, another
randomized field experiment that I conducted
in Bosnia and Herzegovina revealed that Internet users there who became more dissatisfied with the
quality of democratic practices in their country also became more likely to consider alternative forms of
government as preferable for their country. Taken as a whole, then, this research reveals that the Internet’s influence is
complex, and that in some instances it will have ambiguous effects for democracy and democratization. The effects of Internet use
on political evaluations tend to be particularly profound in hybrid regimes—governments that, despite being firmly
authoritarian, allow some form of so-called elections for various offices. In many cases, such elections are exercises in futility, the outcome
already determined by the ruling party regardless of what the ballots say. Although
outsiders may take for granted that
these elections are largely shams, however, citizens living in these countries often invest significant value in
them. This was demonstrated in the build-up to the Egyptian Revolution of 2011, during which a segment of the public that
was originally angered by police brutality became further incensed by ostensibly rigged parliamentary elections, eyewitness accounts of which
were amplified by videos uploaded and distributed online. It wasn't long before citizens began expressing their discontent by protesting in the
streets and demanding a change in the regime. Moreover, even in instances that do not result in tangible political activity, the effects of
Internet use on political evaluations and satisfaction have important implications for the day-to-day business of governance. Quite simply,
governments—democratic, democratizing, and nondemocratic alike—are aware that they have lost some degree of control over information
compared to what they enjoyed in the era of traditional media. As a result, they know that there is greater potential for their decisions and
actions to be broadcast on the national, and even international, stage, a venue and context that they have diminished control over. Thus,
leaders are forced, to varying degrees, to consider the potential activation of latent public opinion when making political decisions in ways that
they never had to previously. It is regrettable, if not entirely surprising, that, aside from a handful of notable exceptions, scholars
and
other political observers mostly failed to anticipate the Arab Spring. Many tried to make up for it by
focusing renewed effort on the role played by the Internet in the wave of political upheaval that
subsequently swept across the Middle East and North Africa. But they would be wise to focus on what
has largely remained a blind spot in scholarly research: the effects of Internet use on the very political
evaluations that can, and sometimes do, precipitate political action and organization.
--xt No Democracy
Bush family proves that democracy is non-existent
Sanders 2015 (Bernie; Email to Kurt Fifelski -- This is not democracy; Jul 10)
Kurt - Yesterday afternoon, Jeb Bush announced that a relatively small number of wealthy donors have
contributed over one hundred million dollars to his Super PAC. This is not a democracy. This is
oligarchy. Unfortunately, Jeb Bush is not alone. Almost all of our opponents have embraced this model of
fundraising — begging billionaire benefactors who have bought up the private sector to try their hand at buying a presidential election. One
of those Super PACs is already running ads against our campaign. Let me be clear: I am more than aware our opponents will outspend us, but
we are going to win this election. They have the money, but we have the people. Add your $3 contribution to our campaign today and help fuel
the political revolution this moment requires. The economic and political systems of this country are stacked against ordinary Americans. The
rich get richer and use their wealth to buy elections. It’s
answering the call. Bernie Sanders
up to us to change the course for our country. Thank you for
AT: Economy
Internet not key to growth
Lowrey 2011 (Annie; Freaks, geeks, and the GDP; Mar 8;
www.slate.com/articles/business/moneybox/2011/03/freaks_geeks_and_gdp.html; kdf)
If you have attended any economists' cocktail parties in the past month or so—lucky you!—then you have probably heard chatter about Tyler Cowen's e-book, The
Great Stagnation. The book seeks to explain why in the United States median wages have grown only slowly since the 1970s and have actually declined in the past
decade. Cowen points to an innovation problem: Through the 1970s, the country had plenty of "low-hanging fruit" to juice GDP growth. In the past 40 years, coming
up with whiz-bang, life-changing innovations—penicillin, free universal kindergarten, toilets, planes, cars—has proved harder, pulling down growth rates across the
industrialized world. But wait! you might say. In the 1970s, American businesses started pumping out amazing, life-changing computing technologies. We got
graphing calculators, data-processing systems, modern finance, GPS, silicon chips, ATMs, cell phones, and a host of other innovations. Has
the Internet, the
nothing for GDP growth? The
answer, economists broadly agree, is: Sorry, but no—at least, not nearly as much as you would expect. A
most revolutionary communications technology advance since Gutenberg rolled out the printing press, done
quarter century ago, with new technologies starting to saturate American homes and businesses, economists looked around and expected to find computer-fueled
growth everywhere. But signs of increased productivity or bolstered growth were few and far between. Sure, computers
and the Web
transformed thousands of businesses and hundreds of industries. But overall, things looked much the
same. The GDP growth rate did not tick up significantly, nor did productivity. As economist Robert Solow put it in 1987:
"You can see the computer age everywhere but in the productivity statistics." An overlapping set of theories emerged to explain the phenomenon, often termed the
"productivity paradox." Perhaps the new technologies advantaged some firms and industries and disadvantaged others, leaving little net gain. Perhaps computer
systems were not yet easy enough to use to reduce the amount of effort workers need to exert to perform a given task. Economists also wondered whether it might
just take some time—perhaps a lot of time—for the gains to show up. In the past, information technologies tended to need to incubate before they produced gains
in economic growth. Consider the case of Gutenberg's printing press. Though the technology radically transformed how people recorded and transmitted news and
information, economists have failed to find evidence it sped up per-capita income or GDP growth in the 15th and 16th centuries. At one point, some economists
thought that an Internet-driven golden age might have finally arrived in the late 1990s. Between 1995 and 1999, productivity growth rates actually exceeded those
during the boom from 1913 to 1972—perhaps meaning the Web and computing had finally brought about a "New Economy." But that high-growth period faded
quickly. And some studies found the gains during those years were not as impressive or widespread as initially thought. Robert Gordon, a professor of economics at
Northwestern, for instance, has found that computers and the Internet mostly helped boost productivity in durable goods manuf acturing—that is, the production of
things like computers and semiconductors. "Our central theme is that computers and the Internet do not measure up to the Great Inventions of the late nineteenth
and early twentieth century, and in this do not merit the label of Industrial Revolution," he wrote. Gordon's work leads to another theory, one espoused by Cowen
himself. Perhaps the Internet is just not as revolutionary as we think it is. Sure, people might derive endless pleasure from it—its tendency to improve people's
quality of life is undeniable. And sure, it might have revolutionized how we find, buy, and sell goods and services. But that still does not necessarily mean it is as
transformative of an economy as, say, railroads were. That is in part because
the Internet and computers tend to push costs
toward zero, and have the capacity to reduce the need for labor. You are, of course, currently reading this article for free on a
Web site supported not by subscriptions, but by advertising. You probably read a lot of news articles online, every day, and
you probably pay nothing for them. Because of the decline in subscriptions, increased competition for
advertising dollars, and other Web-driven dynamics, journalism profits and employment have dwindled
in the past decade. (That Cowen writes a freely distributed blog and published his ideas in a $4 e-book rather than a $25 glossy airport hardcover should
not go unnoted here.) Moreover, the Web- and computer-dependent technology sector itself does not employ that many people. And it does not look set to add
workers: The Bureau of Labor Statistics estimates that employment in information technology, for instance, will be lower in 2018 than it was in 1998. That
the
Internet has not produced an economic boom might be hard to believe, Cowen admits. "We have a collective
historical memory that technological progress brings a big and predictable stream of revenue growth
across most of the economy," he writes. "When it comes to the web, those assumptions are turning out to be wrong or misleading. The revenueintensive sectors of our economy have been slowing down and the big technological gains are coming in revenue-deficient sectors." But revenue is not always the
end-all, be-all—even in economics. That brings us to a final explanation: Maybe it is not the growth that is deficient. Maybe it is the yardstick that is deficient. MIT
professor Erik Brynjolfsson * explains the idea using the example of the music industry. " Because
you and I stopped buying CDs, the
music industry has shrunk, according to revenues and GDP. But we're not listening to less music. There's more music consumed than before." The
improved choice and variety and availability of music must be worth something to us—even if it is not easy to put into numbers. "On paper, the way GDP is
calculated, the music industry is disappearing, but in reality it's not disappearing. It is disappearing in revenue. It is not disappearing in terms of what you should
care about, which is music." As more of our lives are lived online, he wonders whether this might become a bigger problem. "If everybody focuses on the part of the
economy that produces dollars, they would be increasingly missing what people actually consume and enjoy. The disconnect becomes bigger and bigger." But
providing an alternative measure of what we produce or consume based on the value people derive from Wikipedia or Pandora proves an extraordinary challenge—
indeed, no economist has ever really done it. Brynjolfsson says it is possible, perhaps, by adding up various "consumer surpluses," measures of how much
consumers would be willing to pay for a given good or service, versus how much they do pay. (You might pony up $10 for a CD, but why would you if it is free?) That
might give a rough sense of the dollar value of what the Internet tends to provide for nothing—and give us an alternative sense of the value of our technologies to
us, if not their ability to produce growth or revenue for us. Of course, if our most radical and life-altering technologies are not improving incomes or productivity or
growth, then we still have problems. Quality-of-life improvements do not put dinner on the table or pay for Social Security benefits. Still, even
Cowen
does not see all doom and gloom ahead, with incomes stagnating endlessly as we do more and more
online and bleed more and more jobs and money. Who knows what awesome technologies might be just around the bend?
AT: Telemedicine
Telemedicine booming now
Hixon 10/22 (Todd; Why is Telemedicine Suddenly Hot;
www.forbes.com/sites/toddhixon/2014/10/22/why-is-telemedicine-suddenly-hot/; kdf)
Google's GOOGL +1.49% recent announcement that it will provide telemedicine services was the crescendo to
a swelling volume of recent interest: e.g., articles in VentureBeat, U.S. News, and The Economist. Telemedicine has been around
for a generation. Why is this happening now? Rising use of telemedicine takes different forms. Traditionally telemedicine has
played the biggest role in rural areas where visits to doctors are difficult and in consultations with specialists like radiologists and oncologists
where value is created by connecting a patient to the best expert. This
is expanding because broadband network coverage
is improving, patients and doctors are more comfortable with computers, pressure for cost savings is
increasing, and an emerging policy consensus favors telemedicine. This all makes sense. But, these forces have
been at play for a decade or more and hence don’t account for the current inflection point (1) of interest in telemedicine. The new
driving force is the rebirth of relationship medicine. By “relationship medicine” I mean a paradigm of medical practice that
puts the relationship between the patient and the doctor at the center. The most important relationship is with the primary care doctor,
because that relationship is life-long, and the primary care doctor is most concerned with the patient’s total health status and long term
prospects. This is how much of medicine was done in the 1950s, but it declined as Medicare and health insurers “industrialized” medicine,
slicing doctors’ time finer and finer and putting patients on a medical assembly line that moves them past doctors for ever-shorter office visits.
This echoes Henry Ford’s industrializion of car assembly. In the relationship medicine paradigm, care is based on a long-term conversation
between patient and physician about both long term health maximization and acute issues. That conversation occurs through a variety of
encounters. Some encounters are typical office visits. Once the relationship is established, many of these encounters can be remote.
Telepresence (e.g., Skype) can be very powerful, but remote encounters do not need to be high-tech: often a phone call, email, or even a text
can do the job. Remote encounters are usually more efficient and convenient for both patient and physician. For example, I had a serious toe
infection earlier this year, went in for an office visit, and came home with antibiotics which I took as prescribed. The next week I had to go
traveling and the toe was still swollen. I took a picture with my phone and sent it to the doctor. He wrote back, “Don’t worry, your toe is
mending”, and I went on with my trip. [I'm resisting the temptation to jazz up this post with the picture of my swollen toe.] This got the job
done and avoided a second office visit. Medicare and
states such as Massachusetts are holding hospitals responsible for
readmission rates. As one hospitalist doctor put it [paraphrase], “we used to think we were responsible for patients’ condition while they
were in the hospital, and now we realize we are responsible for their condition all the time!” In other words, the doctor and the patient need an
ongoing relationship and conversation, and telemedicine helps. Incentives play a big role, as the prior paragraph suggests. But the true driving
force here is better health and better use of medical resources. The VA medical system has embraced telemedicine, although its doctors are
salaried. My primary care doctor is not supposed to give me his email address and he does not get paid for looking at the picture of my toe, but
he did both gladly on request. It is fair to say, however, that aligning incentives correctly will accelerate the growth of relationship medicine.
The direct primary care movement (e.g, www.dpcare.org) advocates moving primary care doctors from the pay-for-procedure compensation
system created by Medicare and health insurers to payments that are fixed per patient or outcome-based. This encourages doctors to design
encounters and use their resources in the manner that creates the best outcomes with the best efficiency. Direct primary care is growing very
fast now as both plan sponsors and doctors come to believe that it offers major advantage in both quality of care and overall healthcare cost.
Their author is writing about net-neutrality
Trotter, healthcare specialist, ‘14
Fred, founder of the DocGraph Journal, a healthcare data journalist and author, the founder of CareSet
Systems and DocGraph journal, testified in the original hearings on the definition of Meaningful Use—
the standard in the Affordable Care Act for the effective use of electronic medical records “Reply
Comments of Fred Trotter, of the DocGraph Journal,” 8/5/14, http://engine.is/wpcontent/uploads/Reply-Comments-of-Fred-Trotter-of-the-DocGraph-Journal.pdf
Why? We all know healthcare costs are crippling this country. The costs for healthcare under Medicare
(mostly for old people, some of whom can no longer drive) and Medicaid (mostly for poor people, some
of whom cannot afford a car) are crippling our economy. A central tenet of healthcare reform is to
enable treatment of patients in their homes, using broadband Internet to allow for remote monitoring.
Pretty ironic, isn’t it? Telemedicine is the solution to our current real-world fast lane/slow lane problem.
Using telemedicine, we can get the same high levels of treatment to people no matter if they own a car
or not. But all of these programs, presume an Internet built with net neutrality. If we abandon net
neutrality, someone is going to have to pay the fast lane tax for patients who want telemedicine
solutions to really work. That means either patients are going to pay, or doctors are going to have to
pay. Having an Internet slow lane will ensure that poor patients will not be able to have video
telemedicine appointments (which operate just like streaming video) because their doctors do not have
the technical expertise or budget to afford the Internet fast lane. Think I am kidding? Already the Office
of the National Coordinator of Health IT(ONC) has seen that hospitals and practices that serve in
minority communities are late adopters of healthcare technology.4
AT: War
Internet doesn’t solve conflict
Elias 12
Phillip Elias, board member of the New Media Foundation, 20 January 2012, “Will humanity perish
without the internet?,”
http://www.mercatornet.com/articles/view/will_humanity_perish_without_the_internet
The new Encyclopaedists make the opposite mistake about the future. Inherent
in their worldview is the idea that setting
up a system where information can be shared quickly, widely, and freely will somehow eliminate
corruption, greed and violence from the world. It is almost as though human foibles were glitches in the
software of society. But human vices can never be reduced to social viruses. They come from deep
within us and can find their way into the most scientific settings.
Do Wikipedians think themselves immune from the temptation to wield their power towards their own ends?
Free access to information for everyone could be said to be the Wikipedian creed. It encapsulates the Enlightenment values of
liberty and equality. But, like the French terror of the 1790s, it neglects that other ideal needed to give them gumption -a genuine concern for other human beings.
But fraternité
is not achieved by giving everyone more information, more freedom and more equality. And
it is what is so often lacking on the internet, on blogs, and in other forms of web communication. Online
interaction is so often vitriolic it is unreadable, and it is at its worst when the tech-savvy confront each
other. I have seen very few geeks who try to love their enemies.
Fraternité comes from empathising with others. This is difficult to learn online. But without it, how can we
understand the point of view of those who have different concepts of freedom or equality, or of
troglodytes who don’t blog, or of nematodes who don’t have access to the internet. Believe it or not, there is a
life offline and wisdom is wider than the web.
AT: Internet--Governance
No Governance – Alt cause
US has officially backed out of its internet governance role
Hyman 2015 (Leonard [former Google Public Policy Fellow]; U.S. To Scale Back Its Role In Internet
Governance; techcrunch.com/2015/02/19/1120736/; kdf)
Even though the Internet has long been an international community, the United States has always been
at its center. However, that all may be about to change as the U.S. Department of Commerce scales back its
role in Internet governance. The transition is a gradual one, but by the end of the year, the DOC is expected to give up its
oversight of the Internet Corporation for Assigned Names and Numbers (ICANN) to the international community.
The concept of “Internet governance” may seem like a bizarre one since it often seems like the Wild West out there. The most tangible example
of ICANN‘s impact on Internet governance is management of the Internet Assigned Numbers Authority (IANA) functions: When you type a
domain name in your browser (e.g. TechCrunch.com), it connects you with the long, multi-digit IP address that would otherwise be impossible
to remember. On its face, it may not seem like a big deal who manages this process. As long as TechCrunch.com actually gets you to
TechCrunch.com, does it really matter if it’s the U.S., ICANN, or some random guy who’s behind it? But that question assumes that your URL
actually gets you to your destination. If a foreign government doesn’t want you accessing a certain URL, why not redirect you into a dead end?
After all, naysayers argue, some countries already have robust firewalls, so why give them more control? The Department of Commerce claims
that by scaling back its role, it will be promoting “innovation and inclusion.” After all, if the Internet supposedly belongs to the world, shouldn’t
it actually belong to the world? Further, they maintain that it won’t relinquish control until safeguards are in place to prevent that from
happening. (Will it live up to that promise? We’ll see!) At the same time, U.S. leadership in this area was called into question — perhaps
justifiably — after Snowden’s NSA surveillance leaks. This is one of the factors that has nudged the U.S. toward giving up its contract. Maybe
the international community would do a better job than we have. As unfortunate as censorship would
be for foreign countries, the bigger challenge for the average American may be managing the domains
themselves. Over 1,000 generic Top Level Domains (e.g. dot-search, dot-eco, dot-docs, etc.) are slated to go live in the coming months. It
could easily be a headache for corporations to buy the thousands of domains related to their brand. (Imagine if amazon.buy took you to the
wrong site.) Of course, it could be an even bigger hassle for the budding startup, not to mention ICANN itself overseeing this entire process
without the support of the U.S. government. The Department of Commerce’s process of fully handing over the reins won’t be complete until
later this year; its contract with ICANN expires in September. In the meantime, ICANN is slated to begin its next round of sessions in Buenos
Aires in June. And because it’s a multi-stakeholder process, public participation is welcomed. If you’re concerned about the impact ICANN’s
increasing independence could have on a free and open Internet — and you fancy a trip to South America — I hear Argentina is lovely that time
of year.
No impact – Cyber war
Cyber war not existential
Healey 2013 (Jason [director of the Cyber Statecraft Initiative at the Atlantic Council]; No,
Cyberwarfare Isn't as Dangerous as Nuclear War; March 20, 2013;
www.usnews.com/opinion/blogs/world-report/2013/03/20/cyber-attacks-not-yet-an-existential-threatto-the-us; jw)
America does not face an existential cyberthreat today, despite recent warnings. Our cybervulnerabilities are
undoubtedly grave and the threats we face are severe but far from comparable to nuclear war. The most recent alarms come in a
Defense Science Board report on how to make military cybersystems more resilient against advanced threats (in short,
Russia or China). It warned that the "cyber threat is serious, with potential consequences similar in some ways to the nuclear threat of the Cold
War." Such fears were also expressed by Adm. Mike Mullen, then chairman of the Joint Chiefs of Staff, in 2011. He called cyber "The single
biggest existential threat that's out there" because "cyber actually more than theoretically, can attack our infrastructure, our financial systems."
While it is true that cyber
attacks might do these things, it is also true they have not only never happened but are far
more difficult to accomplish than mainstream thinking believes. The consequences from cyber threats may be similar in
some ways to nuclear, as the Science Board concluded, but mostly, they are incredibly dissimilar. Eighty years ago, the generals of the U.S.
Army Air Corps were sure that their bombers would easily topple other countries and cause their populations to panic, claims which did not
stand up to reality. A study of the 25-year history of cyber conflict, by the Atlantic Council and Cyber Conflict Studies Association, has shown a
similar dynamic where the impact of disruptive cyberattacks has been consistently overestimated. Rather than
theorizing about future cyberwars or extrapolating from today's concerns, the history of cyberconflict that have actually been fought, shows
that cyber incidents have so far tended to have effects that are either widespread but fleeting or persistent but narrowly focused. No
attacks, so far, have been both widespread and persistent. There have been no authenticated cases of anyone dying
from a cyber attack. Any widespread disruptions, even the 2007 disruption against Estonia, have been short-lived causing no significant
GDP loss. Moreover, as with conflict in other domains, cyberattacks can take down many targets but keeping them down over time in the face
of determined defenses has so far been out of the range of all but the most dangerous adversaries such as Russia and China. Of course, if the
United States is in a conflict with those nations, cyber will be the least important of the existential threats policymakers should be worrying
about. Plutonium
trumps bytes in a shooting war.
Cyber war not real – their rhetoric leads to less security
Mirani 2014 (Leo [reporter for Quartz]; Worrying about cyberwar is making countries less safe;
December 3, 2014; qz.com/305598/worrying-about-cyberwar-is-making-countries-less-safe/; jw)
Ten days ago, on Nov. 24, online security firms revealed the existence of a powerful computer virus called Regin. A tool of espionage (pdf), the
bug displayed all the hallmarks of nation-state backing, researchers said. Suspicion immediately fell on the US and Israel. The following day
came news of a massive intrusion into the systems of Sony Pictures Entertainment. Several pre-release films were leaked, along with detailed
personal records and communications of employees. An estimated 100 terabytes of data were stolen, and some 40 gigabytes have so far been
leaked. Investigators pointed the finger at North Korea (paywall). Unsurprisingly,
there has since been much hand-wringing
about cyberwarfare, with one prominent right-wing American website declaring that “The first cyber war is under way.” It is
precisely this sort of hype that Thomas Rid, a professor of security studies at King’s College London, and Robert M. Lee, an activeduty US Air Force cyber-warfare operations officer, warn against in their paper “OMG Cyber!” (pdf), published in the most recent issue of RUSI
Journal, a well-regarded peer-reviewed academic journal of defense and security topics. Cyber-riches Rid
and Lee argue that hype
makes for bad policy. As defense budgets have shrunk, cyber is one area where funding has grown. That leads to
perverse incentives, encouraging worry in order to gain and preserve funding. Since cyber is where the money is, all threats are relabelled cyber-something. That means “it is ever harder to say when something clearly is not cyber-related,” the authors write. “What we
are seeing is espionage and practices and techniques that are easy to understand both technically and politically,” says Lee. “By
hyping them into something they are not we fail to respond appropriately. Our policies, our technologies,
our education, [and] our military’s readiness are being focused on a classification and understanding of the problem that
does not align with the reality.” Such reinterpretation of traditional threats can escalate conflict. A NATO
official said earlier this year a cyber-attack would be covered by Article 5 of the treaty, which calls upon all member states to come to the
defense of any member under attack. However, the official did not say what would count as an attack and what the response would be,
suggesting it is meant as a deterrent. But that creates confusion. Does intrusion count? Espionage? From the paper: [T]he vast majority of
cyber-attacks also do not fall into NATO’s remit in the first place: espionage and cyber-crime are problems for intelligence agencies and law
enforcement, not for a military alliance. For militants and the Kremlin, the subtext is clear: cyber matters; better up your game. NATO—among
others—is escalating a problem that someone else will have to solve. More than the usual suspects The cyberwarfare hype does not arise solely
from defense officials attempting to protect their turf and budgets. Security
vendors have a vested interest in making
cyber-threats seem pervasive in order to sell their products. And some of the responsibility for creating the hype falls on
privacy activists and journalists who have helped give GCHQ, Britain’s signals intelligence agency, a profile and mystique matched only by James
Bond, says Rid. “[Edward] Snowden
and the journalists covering this in a rather naïve way helped created the image that
GCHQ and NSA [the US National Security Agency] are all-powerful, perfectly efficient surveillance machines that can
see everything, penetrate everything, and know everything they want,” says Rid. “And that’s just
laughable.”
AT: Economy Advantage
No link – Internet not k2 econ
Internet not key to growth
Lowrey 2011 (Annie; Freaks, geeks, and the GDP; Mar 8;
www.slate.com/articles/business/moneybox/2011/03/freaks_geeks_and_gdp.html; kdf)
If you have attended any economists' cocktail parties in the past month or so—lucky you!—then you have probably heard chatter about Tyler Cowen's e-book, The
Great Stagnation. The book seeks to explain why in the United States median wages have grown only slowly since the 1970s and have actually declined in the past
decade. Cowen points to an innovation problem: Through the 1970s, the country had plenty of "low-hanging fruit" to juice GDP growth. In the past 40 years, coming
up with whiz-bang, life-changing innovations—penicillin, free universal kindergarten, toilets, planes, cars—has proved harder, pulling down growth rates across the
industrialized world. But wait! you might say. In the 1970s, American businesses started pumping out amazing, life-changing computing technologies. We got
graphing calculators, data-processing systems, modern finance, GPS, silicon chips, ATMs, cell phones, and a host of other innovations. Has
the Internet, the
nothing for GDP growth? The
answer, economists broadly agree, is: Sorry, but no—at least, not nearly as much as you would expect. A
most revolutionary communications technology advance since Gutenberg rolled out the printing press, done
quarter century ago, with new technologies starting to saturate American homes and businesses, economists looked around and expected to find computer-fueled
growth everywhere. But signs of increased productivity or bolstered growth were few and far between. Sure, computers
and the Web
transformed thousands of businesses and hundreds of industries. But overall, things looked much the
same. The GDP growth rate did not tick up significantly, nor did productivity. As economist Robert Solow put it in 1987:
"You can see the computer age everywhere but in the productivity statistics." An overlapping set of theories emerged to explain the phenomenon, often termed the
"productivity paradox." Perhaps the new technologies advantaged some firms and industries and disadvantaged others, leaving little net gain. Perhaps computer
systems were not yet easy enough to use to reduce the amount of effort workers need to exert to perform a given task. Economists also wondered whether it might
just take some time—perhaps a lot of time—for the gains to show up. In the past, information technologies tended to need to incubate before they produced gains
in economic growth. Consider the case of Gutenberg's printing press. Though the technology radically transformed how people recorded and transmitted news and
information, economists have failed to find evidence it sped up per-capita income or GDP growth in the 15th and 16th centuries. At one point, some economists
thought that an Internet-driven golden age might have finally arrived in the late 1990s. Between 1995 and 1999, productivity growth rates actually exceeded those
during the boom from 1913 to 1972—perhaps meaning the Web and computing had finally brought about a "New Economy." But that high-growth period faded
quickly. And some studies found the gains during those years were not as impressive or widespread as initially thought. Robert Gordon, a professor of economics at
Northwestern, for instance, has found that computers and the Internet mostly helped boost productivity in durable goods manuf acturing—that is, the production of
things like computers and semiconductors. "Our central theme is that computers and the Internet do not measure up to the Great Inventions of the late nineteenth
and early twentieth century, and in this do not merit the label of Industrial Revolution," he wrote. Gordon's work leads to another theory, one espoused by Cowen
himself. Perhaps the Internet is just not as revolutionary as we think it is. Sure, people might derive endless pleasure from it—its tendency to improve people's
quality of life is undeniable. And sure, it might have revolutionized how we find, buy, and sell goods and services. But that still does not necessarily mean it is as
transformative of an economy as, say, railroads were. That is in part because
the Internet and computers tend to push costs
toward zero, and have the capacity to reduce the need for labor. You are, of course, currently reading this article for free on a
Web site supported not by subscriptions, but by advertising. You probably read a lot of news articles online, every day, and
you probably pay nothing for them. Because of the decline in subscriptions, increased competition for
advertising dollars, and other Web-driven dynamics, journalism profits and employment have dwindled
in the past decade. (That Cowen writes a freely distributed blog and published his ideas in a $4 e-book rather than a $25 glossy airport hardcover should
not go unnoted here.) Moreover, the Web- and computer-dependent technology sector itself does not employ that many people. And it does not look set to add
workers: The Bureau of Labor Statistics estimates that employment in information technology, for instance, will be lower in 2018 than it was in 1998. That
the
Internet has not produced an economic boom might be hard to believe, Cowen admits. "We have a collective
historical memory that technological progress brings a big and predictable stream of revenue growth
across most of the economy," he writes. "When it comes to the web, those assumptions are turning out to be wrong or misleading. The revenueintensive sectors of our economy have been slowing down and the big technological gains are coming in revenue-deficient sectors." But revenue is not always the
end-all, be-all—even in economics. That brings us to a final explanation: Maybe it is not the growth that is deficient. Maybe it is the yardstick that is deficient. MIT
professor Erik Brynjolfsson * explains the idea using the example of the music industry. "Because
you and I stopped buying CDs, the
music industry has shrunk, according to revenues and GDP. But we're not listening to less music. There's more music consumed than before." The
improved choice and variety and availability of music must be worth something to us—even if it is not easy to put into numbers. "On paper, the way GDP is
calculated, the music industry is disappearing, but in reality it's not disappearing. It is disappearing in revenue. It is not disappearing in terms of what you should
care about, which is music." As more of our lives are lived online, he wonders whether this might become a bigger problem. "If everybody focuses on the part of the
economy that produces dollars, they would be increasingly missing what people actually consume and enjoy. The disconnect becomes bigger and bigger." But
providing an alternative measure of what we produce or consume based on the value people derive from Wikipedia or Pandora proves an extraordinary challenge—
indeed, no economist has ever really done it. Brynjolfsson says it is possible, perhaps, by adding up various "consumer surpluses," measures of how much
consumers would be willing to pay for a given good or service, versus how much they do pay. (You might pony up $10 for a CD, but why would you if it is free?) That
might give a rough sense of the dollar value of what the Internet tends to provide for nothing—and give us an alternative sense of the value of our technologies to
us, if not their ability to produce growth or revenue for us. Of course, if our most radical and life-altering technologies are not improving incomes or productivity or
growth, then we still have problems. Quality-of-life improvements do not put dinner on the table or pay for Social Security benefits. Still, even
Cowen
does not see all doom and gloom ahead, with incomes stagnating endlessly as we do more and more
online and bleed more and more jobs and money. Who knows what awesome technologies might be just around the bend?
No Internal – No US Leadership
No US economic leadership—litany of alt causes
FT 2015 (America's wobbly economic leadership; Apr 23; www.ft.com/cms/s/0/35af0bbe-e8f5-11e487fe-00144feab7de.html#axzz3fVSr9rsv; kdf)
That is why so many
countries have rushed to join the AIIB and why the World Bank and the Asian
Development Bank have welcomed the new arrival. There is more than enough demand to go around. The concern is that the AIIB will
not adhere to best practices. At a time when the US is reluctant to fulfil its obligations to Bretton Woods
institutions, let alone join any new ones, US companies will find it tough to win a slice of the pie in Asia
and elsewhere. Exim’s standards are among the best in the world. It serves as a check on the crony capitalism practised by China and
others. Closing it would sound another US retreat. The concern is that Congress is too polarised to reverse the trend.
Most Republicans disdain global bodies and most Democrats revile trade deals. Congress continues to block the 2010 US-led
reforms of the International Monetary Fund. That is one reason China is setting up its own institutions. There are signs Capitol
Hill may be preparing to pass the fast track negotiating authority the Obama administration needs to wrap up trade deals in the Pacific and the
Atlantic. That would be welcome. But Barack Obama will first need to take on sceptics in his own party. Hillary Clinton, his likely successor, has
questioned the merits of another trade deal. Jeb Bush, her likely opponent, said he would close Exim. There
was a time when US
gridlock imposed a price on others. Now others are imposing a price on the US. The world is no longer waiting on
Washington’s prevarications.
No Internal – US Not Key
The US isn’t key to the global economy
Kenny 2015 (Charles; Why the Developing World Won't Catch the U.S. Economy's Cold; May 4;
www.bloomberg.com/news/articles/2015-05-04/why-the-developing-world-won-t-catch-the-u-seconomy-s-cold; kdf)
Last week the U.S. Commerce Department announced that first-quarter
GDP growth for 2015 was an anemic 0.2 percent. This
fears that a U.S. slowdown could lead to a global recession. But the cliché about
America sneezing and the rest of the world catching the cold doesn’t hold like it used to . The U.S. isn’t as
contagious as it was, and developing countries in particular are far more robust to economic shocks. That’s good
news for everyone. It means less volatility in Asia, Africa, and Latin America, which contributes to happier people, greater political
stability, and stronger long-term growth—all of which should help lift the U.S. out of its own doldrums. A team of IMF researchers
has looked at the long-term record of the world’s economies when it comes to growth and recession.
immediately sparked
They measured how long economies expanded without interruption, as well as the depth and length of downturns. Over the past two decades,
low and middle-income economies have spent more time in expansions, while downturns and recoveries have become shallower and shorter.
This suggests countries have become more resilient to shocks. In the 1970s and '80s, the median developing economy took more than 10 years
after a downturn to recover to the GDP per capita it had prior to that slump. By the early 2000s, that recovery time had dropped to two years.
In the 1970s and '80s, countries of the developing world spent more than a third of their time in downturns, but by the 2000s they spent 80
percent of their time in expansions. The first decade of the 21st century was the first time that developing economies saw more expansion and
shorter downturns than did advanced economies: Median growth in the developing world was at its highest since 1950 and volatility at its
lowest. Developing countries still face a larger risk of deeper recession when terms of trade turn against them, capital flows dry up, or advanced
economies enter recessions themselves. But the scale of that risk has diminished. That’s because low and middle-income economies have
introduced policy reforms that increase resilience: flexible exchange rates, inflation targeting, and lower debt. Economies with inflationtargeting regimes see recovery periods less than a third as long as economies without targeting, for example. Larger reserves are associated
with longer expansions. And median reserves in developing countries more than doubled as a percentage of GDP between the 1990s and 2010.
Median external debt has dropped from 60 percent to 35 percent of GDP over that same period. Such policy changes account for two-thirds of
the increased recession-resilience of developing countries since the turn of the century, suggest the IMF researchers—leaving external factors,
such as positive terms of trade, accounting for just one-third. That’s good news for the developing world—not least because volatile growth is
particularly bad for poorer people, who are most at risk of falling into malnutrition or being forced to take children out of school, which has
long-term consequences for future earnings. That might help explain the relationship between growth volatility, slower reductions in poverty,
and rising inequality. Sudden negative income shocks can also be a factor in sparking violence: When rains fail, the risk of civil war in Africa
spikes, and when coffee prices in Colombia fall, municipalities cultivating more coffee see increased drug-related conflict. The African analysis
suggests that a five percentage-point drop in income growth is associated with a 10 percent increase in the risk of civil conflict in the following
year. Finally,
because volatility increases the uncertainty attached to investments, it can also be a drag on
overall long-term economic performance. Viktoria Hnatkovska and Norman Loayza of the World Bank estimated that moving
from a comparatively stable to a relatively volatile growth trajectory is associated with a drop in average annual growth of as much as 2 percent
of GDP. Lower volatility
in the developing world and its associated long-term growth performance is also
good news for the U.S. A strong global economy is still a positive force for growth in every country, including developed nations. And
with the developing world accounting for about one-third of trade and GDP at market rates, as well as three-fifths of U.S. exports, its role in
supporting American economic performance has never been greater. Those
hoping for a recovery in U.S. output should be
grateful for stronger economic immune systems in the rest of the world.
—xt no Internal
The global economy determines the US economy, not vice versa
Rasmus 2015 (Jack; US Economy Collapses Again; May 14; www.counterpunch.org/2015/05/14/useconomy-collapses-again/; kdf)
The problem of weak, stop-go, recovery in the U.S. today is further exacerbated by a global economy that
continues to slow even more rapidly and, in case after case, slip increasingly into recessions or stagnate at best.
Signs of weakness and stress in the global economy are everywhere and growing. Despite massive money injections by its central bank in 2013,
and again in 2014, Japan’s economy has fallen in 2015, a fourth time, into recession. After having experienced two recessions since 2009,
Europe’s economy is also trending toward stagnation once more after it too, like Japan, just introduced a
US$60 billion a month central bank money injection this past winter. Despite daily hype in the business press, unemployment in the
Eurozone is still officially at 11.4 percent, and in countries like Spain and Greece, still at 24 percent. Yet we hear Spain is now the
‘poster-boy’ of the Eurozone, having returned to robust growth. Growth for whom? Certainly not the 24 percent still jobless, a rate that hasn’t
changed in years. Euro businesses in Spain are doing better, having imposed severe ‘labor market reforms’ on workers there, in order to drive
down wages to help reduce costs and boost Spanish exports. Meanwhile, Italy
remains the economic black sheep of the
Eurozone, still in recession for years now, while France officially records no growth, but is likely in recession as
well. Elites in both Italy and France hope to copy Spain’s ‘labor market reforms’ (read: cut wages, pensions, and
make it easier to layoff full time workers). In order to boost its growth, Italy is considering, or may have already decided, to redefine its way to
growth by including the services of prostitutes and drug dealers as part of its GDP. Were the USA to do the same redefinition, it would no doubt
mean a record boost to GDP. Across
the Eurozone, the greater economy of its 18 countries still hasn’t reached
levels it had in 2007, before the onset of the last recession. Unlike the U.S.’s ‘stop-go’, Europe has been ‘stop-gostop’.
Impact inevitable -- Tech Bubble
Tech bubble collapse is inevitable, letting it happen now ensures a soft-landing
Mahmood 2015 (Tallot; The Tech Industry Is In Denial, But The Bubble Is About To Burst; Jun 26;
techcrunch.com/2015/06/26/the-tech-industry-is-in-denial-but-the-bubble-is-about-to-burst/; kdf)
In the face of these trends, a small group
of well-respected and influential individuals are voicing their concern.
They are reflecting on what happened in the last dot-com bust and identifying fallacies in the current unsustainable
modus operandi. These relatively lonely voices are difficult to ignore. They include established successful entrepreneurs, respected VC and
hedge fund investors, economists and CEOs who are riding their very own unicorns. Mark Cuban is scathing in his personal blog, arguing that
this tech bubble is worse than that of 2000, because, he states, that unlike in 2000, this time the
“bubble comes from private
investors,” including angel investors and crowd funders. The problem for these investors is there is no liquidity in their
investments, and we’re currently in a market with “no valuations and no liquidity.” He was one of the fortunate ones who exited his company,
Broadcast.com, just before the 2000 boom, netting $5 billion. But he saw others around him not so lucky then, and fears the same this time
around. A number of high-profile investors have come out and said what their peers all secretly must know. Responding to concerns raised by
Bill Gurley (Benchmark) and Fred Wilson (Union Square Ventures), Marc Andreessen of Andreessen Horowitz expressed his thoughts in an 18tweet tirade. Andreessen agrees with Gurley and Wilson in that high cash burn in startups is the cause of spiralling valuations and
underperformance; the availability of capital is hampering common sense. The
tech startup space at the moment resembles
the story of the emperor with no clothes. As Wilson emphasizes, “At some point you have to build a real business, generate real
profits, sustain the company without the largess of investor’s capital, and start producing value the old fashioned way.” Gurley, a stalwart
investor, puts the discussion into context by saying “We’re in a risk bubble … we’re taking on … a level of risk that we’ve never taken on before
in the history of Silicon Valley startups.” The
tech bubble has resulted in unconventional investors, such as hedge funds,
in privately owned startups. David Einhorn of Greenlight Capital Inc. stated that although he is bullish on the tech sector, he
believes he has identified a number of momentum technology stocks that have reached prices beyond
any normal sense of valuation, and that they have shorted many of them in what they call the “bubble
basket.” Meanwhile, Noble Prize-winning economist Robert Shiller, who previously warned about both the dot-com and
housing bubbles, suspects the recent equity valuation increases are more because of fear than exuberance. Shiller believes that
“compared with history, US stocks are overvalued.” He says, “one way to assess this is by looking at the CAPE (cyclically
adjusted P/E) ratio … defined as the real stock price (using the S&P Composite Stock Price Index deflated by CPI) divided by the ten-year
average of real earnings per share.” Shiller says this has been a “good predictor of subsequent stock market returns, especially over the long
run. The CAPE ratio has recently been around 27, which is quite high by US historical standards. The only other times it is has been that high or
higher were in 1929, 2000, and 2007 — all moments before market crashes.” Perhaps the most surprising contributor to the debate on a
looming tech bubble is Evan Spiegel, CEO of Snapchat. Founded in 2011, Spiegel’s company is a certified “unicorn,” with a valuation in excess of
$15 billion. Spiegel
believes that years of near-zero interest rates have created an asset bubble that has led
people to make “riskier investments” than they otherwise would. He added that a correction was inevitable.
--xt Bubble will collapse
Bubble will collapse
Mahmood 2015 (Tallot; The Tech Industry Is In Denial, But The Bubble Is About To Burst; Jun 26;
techcrunch.com/2015/06/26/the-tech-industry-is-in-denial-but-the-bubble-is-about-to-burst/; kdf)
The fact that we are in a tech bubble is in no doubt. The fact that the bubble is about to burst, however,
is not something the sector wants to wake up to. The good times the sector is enjoying are becoming
increasingly artificial. The tech startup space at the moment resembles the story of the emperor with no
clothes. It remains for a few established, reasoned voices to persist with their concerns so the majority
will finally listen.
AT: E-commerce k2 economy
a) Ecommerce through the roof - Facebook
Adler 1/13/15 (Tim; Ecommerce sales through social media triple in 2013 for biggest US retailers;
business-reporter.co.uk/2015/01/13/e-commerce-sales-through-social-media-triple-in-2013-for-biggestus-retailers/; kdf)
The top 500 retailers in the United States earned $2.69 billion from social shopping in 2013, according to
the Internet Retailer’s Social Media 500 – up more than 60 per cent over 2012 – while the e-commerce
market as a whole grew only by 17 per cent. Growth is sure to accelerate and conversion rates should
improve as Twitter and Facebook roll out “Buy” buttons, predicts BI Intelligence. Buy buttons enable
social media users to buy by clicking on a retailer’s post or tweet. Facebook began testing buy buttons in
July, Twitter in September. Facebook is the clear leader for social-commerce referrals and sales. This is
partly because of the sheer size of its audience – 71 per cent of US adult internet users are on Facebook.
A Facebook share of an e-commerce post translates to an average $3.58 in revenue from sales
compared to just 85 cents on Twitter. But other social media sites are gaining on Facebook and Twitter.
Customers buying through fashion and style platform Polyvore spend on average $66.75 per order,
according to Shopify. Pinterest sees $65. Facebook by comparison trails at $55 per average order value
(AOV).
b) Ebay deal
Seetharaman 1/21/15 (Deepa; EBay's breakup plans may open door for e-commerce M&A;
www.reuters.com/article/2015/01/22/us-ebay-sale-idUSKBN0KV06Z20150122; kdf)
EBay Inc's plans to break up into three different companies could accommodate would-be suitors, signaling a potential
merger fight after the breakup. The company plans to spin off its payments division, PayPal, from its core marketplace division in
the second half of the year, making two standalone publicly traded companies that some analysts say could be worth more than the combined
entity. On Wednesday, eBay added that it will sell or prepare a public offering of its eBay Enterprise unit, which the company bought for $2.4
billion roughly four years ago. The announced moves are intended to give each business the ability to consider all their alternatives, including a
sale, eBay Chief Executive Officer John Donahoe said. "No one knows what's going happen down the road," Donahoe said in an interview on
Wednesday, after eBay reported fourth-quarter earnings. "But each business will have the flexibility they need to do what they need to do to
win." The moves come as Wall Street analysts question how long eBay
and PayPal can withstand growing competition
from online rivals such as Amazon.com Inc, Google Inc and Alibaba Group Holding Ltd, as well as retailers such as Wal-Mart
Stores Inc which are investing in their own e-commerce and payments platforms. As part of the moves announced on Wednesday, eBay agreed
to adopt a number of corporate governance changes championed by activist investor Carl Icahn that would limit PayPal board's ability to
prevent a takeover once it splits from eBay. Any investor who owns 20 percent of PayPal will be able to call special meetings of shareholders,
Icahn said in a separate statement that coincided with eBay's release. EBay also outlined plans to cut 7 percent of its workforce, or 2,400
positions, in the current quarter. "I
don't think that is the primary goal, but in general these moves could make for
a cleaner, or more attractive, merger or acquisition," said Baird analyst Colin Sebastian, who has previously said Google
could be a suitor for eBay. The eBay Marketplaces unit is now going after so-called "avid" shoppers hungry for a
bargain. Its enterprise division, which advises companies on how to grow online, will strengthen its relationships with top retailers and
brands. Potential buyers of eBay Enterprise include companies focused on building ties with other businesses, such as Salesforce.com Inc, IBM
Corp, Demandware Inc, Adobe Systems Inc or startup Bigcommerce, some experts said. Salesforce declined to comment, while the other
companies were not immediately available for comment.
AT: Cloud Computing
Turn: Warming
The cloud uniquely makes warming worse
Matthews 2013 (Richard; How environmentally sustainable is cloud computing and storage?; Sep 12;
globalwarmingisreal.com/2013/09/12/sustainable-cloud-computing/; kdf)
Critique The cloud industry has also been called secretive, slow to change its practices, and overly
optimistic in its environmental assessments. The massive energy requirement of cloud computing can
create environmental problems. According to a 2012 report in the New York Times, data centers use 30
billion watts of electricity per year globally and the U.S. is responsible for one-third of that amount (10
billion watts). A Gartner report indicated that the IT industry is responsible for as much greenhouse gas
generation as the aviation industry (2 percent of the world’s carbon emissions). Just one of these
massive server farms can consume the energy equivalent of 180 000 homes. According to a McKinsey &
Company report commissioned by the Times, between 6 and 12 percent of that energy powers actual
computations; the rest keeps servers running in case of a surge or crash. “This is an industry dirty
secret,” an anonymous executive told the Times. However, cloud supporters counter that this may be
better understood as a necessary evil if data companies are to ensure that they are able to provide
reliable service at all times. Greenpeace has published a report, “A Clean Energy Road Map for Apple,”
that follows up on the organization’s April “How Clean is Your Cloud?” report. These studies indicate
that many cloud providers use energy sources that are neither clean nor sustainable. The Greenpeace
analysis showed that tech companies like Akamai and Yahoo! are the most environment-friendly while
companies like Amazon, Apple and Microsoft each rely heavily on power from fossil fuels. Cloud
computing is almost directly responsible for the carbon intensity increase at Apple, which gets 60
percent of its power from coal. Although Apple is increasing the amount of renewable energy used to
power its cloud computing, the company has been criticized by Greenpeace for moving slowly. In May
2013, Apple said that its North Carolina data center will be exclusively reliant on renewable power by
year’s end, and that all three of its major data centers will be coal-free by the end of this year. Solutions
Despite all of this convincing data, it is important to understand that saving energy does not always
mean that you are reducing your GHG emissions. To be environmentally sustainable these centers
must draw their power from renewable sources of energy. The location of cloud servers is the key issue
that determines whether this is a truly sustainable option. Ideally, cloud computing centers should be
located in places where the grid portfolio is clean. (It would be even better if these data centers
generated power themselves from renewable sources.)
Climate Change is a threat magnifier—policy making must focus on finding the best
avenue to avert disaster
Pascual and Elkind 2010 (Carlos [US Ambassador to Mexico, Served as VP of foreign policy @
Brookings]; Jonathan [principal dep ass sec for policy and int energy @ DOE]; Energy Security; p 5; kdf)
Climate change is arguably the greatest challenge facing the human race. ¶ It poses profound risks to the
natural systems that sustain life on Earth and¶ consequently creates great challenges for human lives, national economies,¶ nations' security,
and international governance. New scientific reports¶ emerging from one year to the next detail ever more alarming
potential¶ impacts and risks.¶ It is increasingly common for analysts and policymakers to refer to ¶ climate change as a threat multiplier, a
destructive force that will exacerbate¶ existing social, environmental, economic, and humanitarian
stresses .¶ The warming climate is predicted to bring about prolonged droughts¶ in already dry regions, flooding along coasts and even inland rivers, an¶ overall increase in severe weather events, rising seas, and the
Such impacts may spark conflict in¶ weak states, lead to the displacement of
millions of people, create environmental¶ refugees, and intensify competition over increasingly scarce¶
resources.¶ One of the great challenges of climate change is, indeed, the scope of¶ the phenomenon. The ongoing warming of the globe results chiefly from¶ one of the most ubiquitous of human practices, the conversion
of fossil fuels¶ into energy through simple combustion. Halting and reversing climate¶ change, however, will require both unproven-perhaps even unimaginedtechnology¶ and sustained political commitment. We must
change living¶ habits in all corners of the globe over the course of the next several decades.¶ We must
resist the impulse to leave the problem for those who follow us¶ or to relax our efforts if we achieve a few years of promising progress. The¶
profound challenge will lie in the need for successive rounds of sustained¶ policymaking, successive
waves of technological innovation, and ongoing¶ evolution of the ways in which we live our lives.
spread of¶ disease, to cite just a few examples.
Cloud Computing – Bad
Cloud computing capabilities are all hype
Marks 13 - Publisher of six best-selling books on small business management (Gene, 10/21/13, "The
Embarrassing Truth about the hybrid cloud" www.forbes.com/sites/quickerbettertech/2013/10/21/theembarrassing-truth-about-the-hybrid-cloud/)
Why the growth in hybrid cloud technology? Well, that’s the embarrassing secret no one wants to admit.
Some may say it’s validation of the cloud’s role in a company’s infrastructure. I’m not so sure. In my opinion, it actually represents the
limitations of the cloud. The
cloud has received a lot of hype over the past few years. But now smarter people
are starting to better understand its reality. “IT departments are starting to rationalize the cloud as just
part of an infrastructure,” says Mike Maples, managing partner at Palo Alto-based FLOODGATE Fund. “You can’t just let all
the bits of your enterprise go to the cloud. It’s not all or nothing. The world is becoming a more hybrid
enterprise.” Cloud based applications have exploded over the past few years. Collaboration services, mobile apps,
customer relationship management systems and document storage offerings have literally changed the
lives of consumers and employees at companies, big and small. I am accessing my customers’ data from a smartphone on a
plane at 30,000 feet. A roofer is creating a work-order for a new job while holding onto a chimney and entering the data into his tablet. A
college kid sits on a train from New York to Boston and catches up on the latest episodes of Walking Dead on her iPad. It’s glorious. It’s mindblogging. And it’s maddening too. Because with
all the hype, with all the excitement, with all the money thrown at
it, the cloud has been disappointingly and embarrassingly imperfect. Yes, I am accessing my customers’
data from 30,000 feet but the connection is so slow and drops so many times that it takes me ten times
as long to retrieve the information I’m looking for. The customer’s credit card information that the roofer is entering into his
tablet is being snagged by the guy three streets over who has hacked into his connection. That college kid audibly groans as the episode freezes
and her screen goes black, time and time again, eventually pulling out a book. The
cloud will be wondrous and fast and secure
and reliable…one day. Today, it is not. And until that day comes we have the hybrid cloud. Why else
would Carbonite, whose model has been built around delivering a cloud based backup service, release
an on-premise storage device to complement their online service? Why would VMWare and Microsoft
MSFT -0.2% duplicate data delivery to multiple servers? Why would venture capital firms plough millions into a software
base service like Egnyte so that users can get the same data that is stored in different locations? It’s because the cloud is useless unless we can
get to our data fast. The
cloud is useless if it’s not making us more productive and enabling us to do things
quicker than before. It’s useless if our data is less secure than when it was stored on our own servers.
And without hybrid cloud technologies, many companies are learning that this is very much the case. So
over the course of technology history our data has travelled from server to desktop to cloud and now back to the server again. It’s not a 360
degree turnaround. It’s a partial turnaround. A hybrid solution to make up for the cloud’s defects. The
cloud is great. But the
enormous growth of hybrid cloud technologies only proves that it still has a long way to go before it’s
fast and secure. “In the end, customers and users don’t even care about the cloud,” says Maples. “They
just have a job to do. It’s performance and convenience that an all-or-nothing cloud approach can’t
deliver.” Can’t we all admit that embarrassing truth?
Cloud computing bad – no one uses
Cloud computing is unreliable
CCA ’15 (Cloud Computing Advices, Cloud Computing advices is the one of the best leading cloud
computing blogs, where you can access the tutorials on cloud computing, breaking news, security issues,
top cloud computing providers, certifications, training programs and jobs opportunities for freshers and
experienced IT Professionals, “Cloud Computing Disadvantages”,
http://cloudcomputingadvices.com/disadvantages-cloud-computing/, 2/20/2015)//HW
Negative effects and Disadvantages of cloud computing:¶ The Greenpeace NGO announces, in its 2010
report on the ecological impact of the IT industry, the negative impacts of cloud computing.In the below
list you can see the 5 disadvantages of cloud computing as per the report.¶ 1.The main drawback is the
security issues related to storing of confidential information in the cloud. As all information is available
via internet if taken to the cloud, there may be concerns with breach of confidential information.¶
2.There is a tendency for some firms to lose their control over the piled up information in the cloud.¶
3.The legal issues including ownership of abstraction on the location data of cloud computing.¶ 4.Cloud
computing also poses problems in terms of insurance, especially when a company submits an operating
loss due to failure of the supplier. Where one company covering a risk, the insurance company offering
the cloud architecture takes more, slowing sharply compensation.¶ 5.The customer service of cloud
computing becomes dependent on the quality of the network to access this service. No cloud service
provider can guarantee 100% availability.
--xt: People don’t use the cloud
Lots of drawbacks to cloud computing – people won’t switch over
Ward ’11 (Susan, business writer and experienced business person; she and her partner run Cypress
Technologies, an IT consulting business, providing services such as software and database development,
“5 Disadvantages of Cloud Computing”, About Money,
http://sbinfocanada.about.com/od/itmanagement/a/Cloud-Computing-Disadvantages.htm,
11/8/2011)//HW
5 Disadvantages of Cloud Computing¶ 1) Possible downtime. Cloud computing makes your small
business dependent on the reliability of your Internet connection. When it's offline, you're offline. If
your internet service suffers from frequent outages or slow speeds cloud computing may not be suitable
for your business. And even the most reliable cloud computing service providers suffer server outages
now and again. (See The 10 Biggest Cloud Outages of 2013.)¶ 2) Security issues. How safe is your data?
Cloud computing means Internet computing. So you should not be using cloud computing applications
that involve using or storing data that you are not comfortable having on the Internet. Established cloud
computing vendors have gone to great lengths to promote the idea that they have the latest, most
sophisticated data security systems possible as they want your business and realize that data security is
a big concern; however, their credibility in this regard has suffered greatly in the wake of the recent NSA
snooping scandals.¶ Keep in mind also that your cloud data is accessible from anywhere on the internet,
meaning that if a data breach occurs via hacking, a disgruntled employee, or careless
username/password security, your business data can be compromised.¶ Leaving aside revelations about
the NSA, switching to the cloud can actually improve security for a small business, says Michael Redding,
managing director of Accenture Technology Labs. "Because large cloud computing companies have more
resources, he says, they are often able to offer levels of security an average small business may not be
able to afford implementing on its own servers" (Outsource IT Headaches to the Cloud (The Globe and
Mail).¶ 3) Cost. At first glance, a cloud computing application may appear to be a lot cheaper than a
particular software solution installed and run in-house, but you need to be sure you're comparing apples
and apples. Does the cloud application have all the features that the software does and if not, are the
missing features important to you?¶ You also need to be sure you are doing a total cost comparison.
While many cloud computer vendors present themselves as utility-based providers, claiming that you're
only charged for what you use, Gartner says that this isn't true; in most cases, a company must commit
to a predetermined contract independent of actual use. To be sure you're saving money, you have to
look closely at the pricing plans and details for each application.¶ In the same article, Gartner also points
out that the cost savings of cloud computing primarily occur when a business first starts using it. SaaS
(Software as a Service) applications, Gartner says, will have lower total cost of ownership for the first
two years because SaaS applications do not require large capital investment for licenses or support
infrastructure. After that, the on-premises option can become the cost-savings winner from an
accounting perspective as the capital assets involved depreciate.¶ Cloud computing costs are constantly
changing, so check current pricing.¶ 4) Inflexibility. Be careful when you're choosing a cloud computing
vendor that you're not locking your business into using their proprietary applications or formats. You
can't insert a document created in another application into a Google Docs spreadsheet, for instance.
Also make sure that you can add and subtract cloud computing users as necessary as your business
grows or contracts.¶ 5) Lack of support. In These Issues Need to be Resolved Before Cloud Computing
Becomes Ubiquitous, (OPEN Forum) Anita Campbell writes, "Customer service for Web apps leaves a lot
to be desired -- All too many cloud-based apps make it difficult to get customer service promptly – or at
all. Sending an email and hoping for a response within 48 hours is not an acceptable way for most of us
to run a business".
Aff Answers
Innovation Addon
Internet K2 Innovation
Internet freedom is key to innovation – China proves
Hoffman 14 - Professor of Communication and Political Science, University of Delaware
Lindsay Hoffman, 2/5/2014, The Huffington Post, “Internet Censorship: A Threat to Economic Progress in
China?”, http://www.huffingtonpost.com/lindsay-hoffman/internet-censorship-a-thr_b_4395167.html,
7/18/2015, \\BD
Social media platforms such as Twitter and Facebook have helped to ignite an information revolution by
allowing individuals around the world to use the Internet for communicating, learning, teaching, and
protesting. However, these endless possibilities pose a threat to oppressive governments, and as a
result, technology use has been severely limited in some nations. The Chinese government's strict
regulation of Internet exemplifies these limitations within the context of an increasingly powerful
nation. While the incredible economic progress of China over the past several decades suggests it is a
threat to the status of the United States as the world's superpower, censorship may stop upward
progress in its tracks.∂ The expansion of the Internet in recent years has rendered this technology
necessary to the day-to-day lives of people throughout China and the world, and that dependence has
become a significant tool of power for oppressive governments. Beyond establishing a great firewall to
block thousands of sites from being accessed within China, the government also works to prevent
opposition on social media websites and blogs. The government listens to what citizens are saying
online, thereby enabling officials "to address issues and problems before they get out of control" (see
Rebecca MacKinnon's book, "Consent of the Networked"). In early September, a Chinese judge reinterpreted Internet restrictions so that any individual spreading "slanderous rumors" on the Internet
that are seen by 5,000 people or shared by 500 people could face up to 10 years in prison. This stricter
interpretation of Internet limitations indicates that an open Internet China is not on the immediate
horizon.∂ Google Chairman Eric Schmidt recently made headlines when he visited Hong Kong and
suggested that China's prevention of free expression online may pose a threat to continuing economic
progress for the country. Although many people may not connect the Internet to economic success,
Schmidt suggests that the limitations placed on online speech by Chinese officials will prevent the
country from overcoming the "middle-income trap." This occurs when countries move up from a place
of poverty but are unable to further progress, leaving them trapped on a plateau below higher-income
nations. Schmidt seems to be a celebrant, as his words echo the notion that the Internet "has the power
to determine outcomes" for people, countries, and the entire world, although McChesney argues that
this perspective is "ultimately unsatisfactory" in a complex reality (see McChesney's "Digital
Disconnect").∂ Schmidt criticized the 500-repost rule as well as other restrictions placed on citizens'
words and behavior on the Internet by the Chinese government. He suggested that in order to solve
economic problems such as unemployment, nations require the "entrepreneurs" and "innovation" that
an open Internet encourages. As the Chairman for such an economically successful company as Google
understands, individuals must be allowed to think of fresh ideas when they use their technology.
Extensive firewalls and harsh punishments for certain forms of expression prevent citizens from being
able to make creative and helpful economic contributions through the Internet. Schmidt's warning to
the Chinese government seems intended to persuade the Chinese government that there may be
negative consequences of a closed and restrictive Internet that they had not previously considered. The
tireless attempts to maintain power over citizens through Internet regulation and censorship may
actually be threatening the economic power of the nation in an increasingly technological world. The
Chinese government may soon discover that when you hold on to something too tightly, it is far more
likely to slip right out of your hands.
AT: Internet Bad K
State action key
Policy change is the only method to achieve internet freedom – their author
Power and Jablonski 2015 (Shawn M [Assistant Professor of Communication at Georgia State
University] and Michael [attorney and presidential fellow in communication at Georgia State University];
The Real Cyber War; University of Illinois Press; p. 198; kdf)
Despite the fury, the
private sector and technologists still depend on state actions for long-term solutions to
privacy online. While AOL, Apple, Facebook, Google, LinkedIn, Microsoft, Twitter, Yahoo! and others condemn undue
surveillance activities, their solution is to call for policy reform.60 Technologists have promised to try and
beat the government’s invasive techniques, but even the best cryptographers in the world agree that it
will take a tremendous amount of human effort, and years of work, to combat the NSA’s surveillance
programs. As Twitter’s former head of cybersecurity Moxie Marlinspike explains, “We all have a long ways to go,” adding, “[and] it’s going to
take all of us.”61 Outraged governments—fueled by their outraged publics—are calling for greater control over the international information
flows, not less. While
it is easy for many in the United States and in parts of Europe to decry such
perspectives as government censorship, or a power grab by international institutions (see chapters 4 and 5), the reality is
that accepting some level of shared internet regulation is a far superior option to an internet splintered
along geographical and national boundaries. This is exactly what will happen if current policies remain unchanged. Amid an
onslaught of rhetoric that highlights how new technologies are changing societies and institutions
around the world, it may be helpful to look back to how states navigated similar technological
revolutions in the past, assess if and how those approaches worked, and determine their relevance to the challenges today’s ICTs
present. The history of interstate cooperation and rulemaking is, actually, neatly intertwined with
developments in international communication. The first two intergovernmental organizations were created in order to
coordinate the rules by which information flowed across national borders. The International Telegraph Convention established the first
organization in 1865. After the invention and widespread adoption of radio technology, it was renamed the International Telecommunications
Union (ITU) to encompass all types of transnational telecommunication issues.
Perm Solves
The permutation solves
Fish 2014 (Adam; Beyond surveillance fridges and socialized power drills: social media and the
financialization of everyday life; Mar 29; savageminds.org/2014/03/29/beyond-surveillance-fridges-andsocialized-power-drills-social-media-and-the-financialization-of-everyday-life/; kdf)
Meanwhile, Jeremy Rifkin
sees Morozov’s “Internet of Things” not as a horror of surveillance and eversharper financial practices, but as the birth of a maker movement. When the net cost of production not just of digitized
information like music and movies but of physical objects approaches zero, he claims, capitalism faces a fundamental challenge,
one in which the winners will be found in the nonprofit sector. All those networked fridges and 3D printers, he says, are
enabling a second economy to grow up alongside capitalist production, an economy based on sharing of
goods and information, where we live “partly beyond markets,” in “an increasingly interdependent
global commons.” Well, which will it be, dental espionage or ride-sharing our way into a global village? We’ve gone out into the field to
try to find out, by examining new companies who’re trying to combine big data and the sharing economy,
and asking hard questions of their managers and of the people who’re turning to them as alternatives to
old-school consumerist products and services. In our project, “Third Party Dematerialization and Rematerialization of Capital,” funded by the
Engineering and Physical Sciences Research Council’s “Digital Economy Research In The Wild” initiative, we are researching Zopa Limited, the
sort of financial innovator Morozov has in mind when he speaks of Silicon Valley’s ability to “disrupt” Wall Street with “better data and better
engineers.” Zopa is a “non-bank” – as regulation designed to discourage upstarts and protect the market share of slow-to-innovate and too-bigto-fail firms limits the use of the value-laden term “bank” – a “peer-to-peer lender.” Zopa uses a proprietary algorithm to evaluate credit risk,
and then matches individual borrowers of relatively small sums with potential investors of a bit of spare cash. Zopa claims that their highly
stringent credit-evaluating algorithm, their lack of legacy infrastructure, both buildings and IT, and their individual evaluation of potential
borrowers – rather than trusting entirely to automated processes – enable them to offer better rates to borrowers and lenders than high street
banks can bother with. Zopa is a successful financial firm with only one top executive from the financial industry – their risk analyst. With Big
Data experts and social marketing managers, Zopa explicitly applies Silicon Valley logics to a segment of what once was a UK high street banking
Zopa neither deploys fleets of drones or
the latest gimmicks of “gamification” – the techniques developed from the realization that we’ll do nearly anything for the quick
hit of an endorphin rush from “rewards” as ephemeral as points or levels in a colorful game interface. While gamification is often
claimed as the missing link between financialization and social mediatization – we’ll do anything for rewards, and
we want all our friends to see our status, so we’ll click to create the data for others to profit from – today’s reality is remarkably
more old-fashioned. The twin challenges of social financialization are managing and marketing trust and risk. Once solely the province of
monopoly – short to medium-term unsecured consumer lending and borrowing. Yet
banks, who used neoclassical architecture, three-piece suits, and free toasters to convey social messages of high trust and low risk, the largely
dematerialized companies of social financialization necessarily use social media and internet user interfaces to do the same job. The trendsurfers and hipsters of the world aren’t Zopa’s clients: rather Zopa works to appeal to the newly financialized: older people with a bit of extra
money who are neither wealthy nor connected enough to be worth the time of innovation-challenged, blue-blooded UK banks, and young
families yet to see the “recovery” talked up on the newly-ubiquitous financial media. Zopa designers see their job as creating an online
presence that looks enough like a bank to convey messages of trustworthiness and low risk, while simultaneously appealing to a demographic
that feels abandoned by banks in their oscillations between high risk/high return algorithm-driven trading and “credit crunch” unwillingness to
lend to anyone who might actually have a need for funds. It
is in these everyday, slightly dowdy design choices that
social financialization is being built, in a process of connecting the dots between a lost age of bricks-andmortar rhetorics of trustworthiness – a trustworthiness coupled with incentives against too much financial literacy, too much
desire to look behind the neoclassical facades to interrogate actual banking practices – and Morozov’s all too likely future of
trying to level up our gamified toothbrushes to lower our dental insurance premiums. We need the
cautionary tales of the dystopias we’re building and the utopian visions of data power to the people, but
more, we need to know if our gateway drugs of social financialization really are harmless hits and
performance enhancements, or whether they will lead inevitably to refrigerator madness. One thing we suspect is true:
we can’t “Just Say No.”
Yes – Internet-> Democracy
The thesis of the K is wrong—Free Internet helps promote democracy movements—it
is key to tackling authoritarian government—studies Prove
OSU 12—Ohio State University (“Internet use promotes democracy best in countries that are already
partially free” April 4, 2012 http://www.sciencedaily.com/releases/2012/04/120404152004.htm)//JLee
Although use of the internet has been credited with helping spur democratic revolutions in the Arab world and
elsewhere, a new multinational study suggests the internet is most likely to play a role only in specific
situations. Researchers at Ohio State University found that the internet spurs pro-democratic attitudes
most in countries that already have introduced some reforms in that direction. "Instead of the internet
promoting fundamental political change, it seems to reinforce political change in countries that already
have at least some level of democratic freedoms," said Erik Nisbet, lead author of the study and assistant professor of
communication at Ohio State University. "Internet use is a less effective means to mobilize citizens for democracy
in extremely authoritarian countries." In addition, demand for democracy is highest in a country when
more people are connected to the internet and, most importantly, when they spend more time online. "Internet
penetration in a country matters in terms of how much people want democratic reforms, but it is even
more important that people are spending greater amounts of time on the internet and that they are connected
to other people in their community," said Elizabeth Stoycheff, a co-author of the study and doctoral student in communication at Ohio State.
Nisbet and Stoycheff conducted the study with Katy Pearce of the University of Washington. Their study appears in the April 2012 issue of the
Journal of Communication, a special issue dedicated to social media and political change. The
researchers analyzed previously
collected data on 28 countries in sub-Saharan Africa and Asia. This included surveys of 37,549 people
who participated in the 2008 Afrobarometer and 2006-2008 Asian Barometer surveys. Included were questions that evaluated how
much the citizens in each country demanded democracy and their frequency of internet use. In addition, the researchers looked at
country-level data that measured how democratic each country was, and their levels of internet penetration,
international bandwidth per internet user and other sociodemographic factors. The results suggest that the internet is most likely to
play a role in democratization in countries that have a moderate to high internet penetration and that
have at least a partly democratic political regime. In countries ruled by authoritarian regimes, people
may have access to the internet, but the rulers may control the content available, how users may interact with
each other, and whether they may get information from outside their own country, Stoycheff said. "The internet's effect on citizen
demand for democracy is somewhat contingent on both the technological context and the political
context," Stoycheff said. Based on the results of the study, Nisbet said there are some countries that currently appear to have the right
political and technological mix for the internet to play a role in social and political change. Those countries include Kenya, Senegal, Uganda,
Singapore and Zambia. But countries in the survey that are run by highly authoritarian regimes, such as Vietnam and Zimbabwe, are not likely
to see democracy flourishing anytime soon, regardless of use of the internet, the findings suggest. Other countries,
like
Mozambique and Tanzania, are partly free but have a low citizen demand for democracy and little
internet penetration, Nisbet said. But if internet use grows in these countries, it has the potential to encourage people there to
challenge their autocratic regimes. "Our results suggest that the internet can't plant the seed of democracy in a country," Nisbet said.
"However,
the internet may help democracy flourish if it has already started to grow."
Internet Capitalism Good
Internet makes capitalism good—creates low cost revenue and is easier to trade
Rifkin 14—Jeremy is the author of The Zero Marginal Cost Society: The Internet of
Things, The Collaborative Commons, and The Eclipse of Capitalism. He is an adviser to
the European Union and to heads of state around the world, and president of the
Foundation on Economic Trends in Washington, DC (“Capitalism is making way for the
age of free” March 31, 2014
http://www.theguardian.com/commentisfree/2014/mar/31/capitalism-age-of-freeinternet-of-things-economic-shift)//JLee
In a capitalist market, governed by the invisible hand of supply and demand, sellers are constantly searching
for new technologies to increase productivity, allowing them to reduce the costs of producing their goods and services so they
can sell them cheaper than their competitors, win over consumers and secure sufficient profit for their investors. Marx never asked
what might happen if intense global competition some time in the future forced entrepreneurs to introduce ever
more efficient technologies, accelerating productivity to the point where the marginal cost of production approached zero,
making goods and services "priceless" and potentially free, putting an end to profit and rendering the market exchange
economy obsolete. But that's now beginning to happen. Over the past decade millions of consumers have become
prosumers, producing and sharing music, videos, news, and knowledge at near-zero marginal cost and
nearly for free, shrinking revenues in the music, newspaper and book-publishing industries. Some of the US's leading economists are
waking up to the paradox. Lawrence Summers, former US treasury secretary, and J Bradford DeLong, professor of
economics at the University of California, Berkeley, addressed this in August 2001, in a speech delivered before the Federal Reserve Bank of
focused their presentation on the new communication technologies that were
already reducing the marginal (per-unit) cost of producing and sending information goods to near zero. They
began by acknowledging that "the most basic condition for economic efficiency: [is] that price equal marginal
cost", and further conceded that "with information goods the social marginal cost of distribution is close to zero". They then went to
the crux of the problem. "If information goods are to be distributed at their marginal cost of production – zero – they cannot be
created and produced by entrepreneurial firms that use revenues obtained from sales to consumers to cover their [fixed setup] costs … [companies] must be able to anticipate selling their products at a profit to someone." Summers and DeLong opposed
government subsidies to cover up-front costs, arguing that they destroy the entrepreneurial spirit. Instead
they supported short-term monopolies to ensure profits, declaring that this is "the reward needed to spur private enterprise
to engage in such innovation". They realised the trap this put them in, recognising that "natural monopoly does not meet the most
Kansas City. Summers and DeLong
basic condition for economic efficiency: that price equal marginal cost" but nonetheless concluded that in the new economic era, this might be
the only practical way to proceed. The
pair had come up against the catch-22 of capitalism that was already
freeing a growing amount of economic activity from the market, and threw up their hands, favouring
monopolies to artificially keep prices above marginal cost, thwarting the ultimate triumph of the invisible hand. This final victory, if
allowed, would signal not only capitalism's greatest accomplishment but also its death knell. While the
notion of near-zero marginal cost raised a small flurry of attention 12 years ago, as its effects began to be felt in the music and
entertainment industry and newspaper and publishing fields, the consensus was that it would likely be restricted to
information goods, with limited effects on the rest of the economy. This is no longer the case. Now the
zero-marginal cost revolution is beginning to affect other commercial sectors. The precipitating agent is an
emerging general-purpose technology platform – the internet of things. The convergence of the communications internet with the
fledgling renewable energy internet and automated logistics internet in a smart, inter-operable internet-of-things system is
giving rise to a third industrial revolution. Siemens, IBM, Cisco and General Electric are among the firms
erecting an internet-of-things infrastructure, connecting the world in a global neural network. There are
now 11 billion sensors connecting devices to the internet of things. By 2030, 100 trillion sensors will be attached to natural
resources, production lines, warehouses, transportation networks, the electricity grid and recycling
flows, and be implanted in homes, offices, stores, and vehicles – continually sending big data to the communications, energy and logistics
internets. Anyone will be able to access the internet of things and use big data and analytics to develop predictive algorithms that can speed
efficiency, dramatically increase productivity and
lower the marginal cost of producing and distributing physical
things, including energy, products and services, to near zero, just as we now do with information goods. Summers and
DeLong glimpsed that as marginal costs approach zero, "the competitive paradigm cannot be fully appropriate" for organising commercial life,
but admitted "we do not yet know what the right replacement paradigm will be". Now
we know. A new economic paradigm –
the collaborative commons – has leaped onto the world stage as a powerful challenger to the capitalist
market. A growing legion of prosumers is producing and sharing information, not only knowledge, news and entertainment, but also
renewable energy, 3D printed products and online college courses at near-zero marginal cost on the
collaborative commons. They are even sharing cars, homes, clothes and tools, entirely bypassing the conventional capitalist market.
An increasingly streamlined and savvy capitalist system will continue to operate at the edges of the new
economy, finding sufficient vulnerabilities to exploit, primarily as an aggregator of network services and solutions, allowing it to flourish as a
powerful niche player. But it will no longer reign. Hundreds of millions of people are already transferring bits
and pieces of their lives from capitalist markets to the emerging global collaborative commons, operating
on a ubiquitous internet-of-things platform. The great economic paradigm shift has begun.
The alt fails—its attempt to block the internet’s economic progress will fail due to new
businesses
Rifkin 14—Jeremy is the author of The Zero Marginal Cost Society: The Internet of Things, The
Collaborative Commons, and The Eclipse of Capitalism. He is an adviser to the European Union and to
heads of state around the world, and president of the Foundation on Economic Trends in Washington,
DC (“THE ZERO MARGINAL COST SOCIETY THE INTERNET OF THINGS, THE COLLABORATIVE COMMONS,
AND THE ECLIPSE OF CAPITALISM” 2014 http://digamo.free.fr/rifkin14.pdf pg. 11)//JLee
Edited for Gendered Language
Attempts to block economic progress invariably fail because new entrepreneurs are continually roaming
the edges of the system in search of innovations that increase productivity and reduce costs, allowing them
to win over consumers with cheaper prices than those of their competitors. The race Lange outlines is relentless over the
long run, with productivity continually pushing costs and prices down, forcing profit margins to shrink. While most
economists today would look at an era of nearly free goods and services with a sense of foreboding, a few
earlier economists expressed a guarded enthusiasm over the prospect. Keynes, the venerable twentieth-century economist whose economic
theories still hold considerable weight, penned a small essay in 1930 entitled “Economic Possibilities for Our Grandchildren,”
which appeared as millions of Americans were beginning to sense that the sudden economic downturn
of 1929 was in fact the beginning of a long plunge to the bottom. Keynes observed that new technologies were
advancing productivity and reducing the cost of goods and services at an unprecedented rate. They were
also dramatically reducing the amount of human labor needed to produce goods and services. Keynes even introduced a new term, which he
told his readers, you “will hear a great deal in the years to come—namely, technological unemployment. This
means unemployment
due to our discovery of means of economising the use of labour outrunning the pace at which we can
find new uses for labour.” Keynes hastened to add that technological unemployment, while vexing in the short run, is a great boon in
the long run because it means “that mankind [Society] is solving its economic problem.”7
Internet Capitalism Good -- Environment
The internet is able to helps the environment, detect Natural Disasters, and farmers
Rifkin 14—Jeremy is the author of The Zero Marginal Cost Society: The Internet of
Things, The Collaborative Commons, and The Eclipse of Capitalism. He is an adviser to
the European Union and to heads of state around the world, and president of the
Foundation on Economic Trends in Washington, DC (“THE ZERO MARGINAL COST
SOCIETY THE INTERNET OF THINGS, THE COLLABORATIVE COMMONS, AND THE
ECLIPSE OF CAPITALISM” 2014 http://digamo.free.fr/rifkin14.pdf pg. 16-17)//JLee
Internet of Things is quickly being applied in the natural environment to better steward the Earth’s
ecosystems. Sensors are being used in forests to alert firefighters of dangerous conditions that could precipitate fires. Scientists are
installing sensors across cities, suburbs, and rural communities to measure pollution levels and warn the
public of toxic conditions so they can minimize exposure by remaining indoors. In 2013, sensors placed atop the
U.S. Embassy in Beijing reported hour to hour changes in carbon emissions across the Chinese capital. The data was instantaneously
posted on the Internet, warning inhabitants of dangerous pollution levels. The information pushed the
Chinese government into implementing drastic measures to reduce carbon emissions in nearby coalpowered plants and even restrict automobile traffic and production in energy-intensive factories in the
region to protect public health. Sensors are being placed in soil to detect subtle changes in vibrations and earth
density to provide an early warning system for avalanches, sink holes, volcanic eruptions, and
earthquakes. IBM is placing sensors in the air and in the ground in Rio de Janeiro to predict heavy rains and mudslides up to two days in
advance to enable city authorities to evacuate local populations.21 Researchers are implanting sensors in wild animals and
placing sensors along migratory trails to assess environmental and behavioral changes that might affect their
well-being so that preventative actions can be taken to restore ecosystem dynamics. Sensors are also being installed in rivers,
lakes, and oceans to detect changes in the quality of water and measure the impact on flora and fauna
in these ecosystems for potential remediation. In a pilot program in Dubuque, Iowa, digital water meters and accompanying
The
software have been installed in homes to monitor water use patterns to inform homeowners of likely leaks as well as ways to reduce water
consumption.22 The
IoT is also transforming the way we produce and deliver food. Farmers are using
sensors to monitor weather conditions, changes in soil moisture, the spread of pollen, and other factors that 16
affect yields, and automated response mechanisms are being installed to ensure proper growing conditions. Sensors are being
attached to vegetable and fruit cartons in transit to both track their whereabouts and sniff the produce
to warn of imminent spoilage so shipments can be rerouted to closer vendors.2
Internet Inevitable
The expansion of the internet is coming—makes Capitalism inevitable—alt cannot do
anything about it
Rifkin 14—Jeremy is the author of The Zero Marginal Cost Society: The Internet of Things, The
Collaborative Commons, and The Eclipse of Capitalism. He is an adviser to the European Union and to
heads of state around the world, and president of the Foundation on Economic Trends in Washington,
DC (“THE ZERO MARGINAL COST SOCIETY THE INTERNET OF THINGS, THE COLLABORATIVE COMMONS,
AND THE ECLIPSE OF CAPITALISM” 2014 http://digamo.free.fr/rifkin14.pdf pg. 62-63)//JLee
The enormous leap in productivity is possible because the emerging Internet of Things is the first smartinfrastructure revolution in history: one that will connect every machine, business, residence, and vehicle in an
intelligent network comprised of a Communications Internet, Energy Internet, and Logistics Internet, all embedded in a single operating
system. In the United States alone, 37 million digital smart meters are now providing real-time information on
electricity use.9 Within ten years, every building in America and Europe, as well as other countries around the world, will
be equipped with smart meters. And every device—thermostats, assembly lines, warehouse equipment, TVs, washing machines,
and computers—will have sensors connected to the smart meter and the Internet of Things platform. In 2007, there were 10 million sensors
connecting every type of human contrivance to the Internet of Things. In
2013, that number was set to exceed 3.5 billion,
and even more impressive, by 2030 it is projected that 100 trillion sensors will connect to the IoT.10 Other sensing devices,
including aerial sensory technologies, software logs, radio frequency identification readers, and wireless sensor networks, will assist in
collecting Big Data on a wide range of subjects from the changing price of electricity on the grid, to logistics traffic across supply chains,
production flows on the assembly line, services in the back and front office, as well as up-to-the-moment tracking of consumer activities.11 As
mentioned in chapter 1, the intelligent infrastructure, in turn, will feed a continuous stream of Big Data to
every business connected to the network, which they can then process with advanced analytics to create
predictive algorithms and automated systems to improve their thermodynamic efficiency, dramatically increase their
productivity, and reduce their marginal costs across the value chain to near zero. Cisco systems forecasts that by 2022, the
Internet of Everything will generate $14.4 trillion in cost savings and revenue.12 A General Electric study published in November 2012
concludes that the efficiency gains and productivity advances made possible by a smart industrial Internet could resound across virtually
every economic sector by 2025, impacting “approximately one half of the global economy.” It’s when we look
at each industry, however, that we begin to understand the productive potential of establishing the first intelligent infrastructure in history. For
example, in
just the aviation industry alone, a mere 1 percent improvement in fuel efficiency, brought about by
using Big Data analytics to more successfully route traffic, monitor equipment, and make repairs, would generate
savings of $30 billion over 15 years.13 The health-care field is still another poignant example of the productive
potential that comes with being embedded in an Internet of Things. Health care accounted for 10
percent of global GDP, or $7.1 trillion in 2011, and 10 percent of the expenditures in the sector “are wasted from inefficiencies in the
system,” amounting to at least $731 billion per year. Moreover, according to the GE study, 59 percent of the health-care
inefficiencies, or $429 billion, could be directly impacted by the deployment of an industrial Internet. Big
Data feedback, advanced analytics, predictive algorithms, and automation 62 systems could cut the cost in the global health-care sector by 25
percent according to the GE study, for a savings of $100 billion per year. Just
a 1 percent reduction in cost would result in a
savings of $4.2 billion per year, or $63 billion over a 15-year period.14 Push these gains in efficiency from 1 percent, to
2 percent, to 5 percent, to 10 percent, in the aviation and health-care sectors and across every other sector, and the magnitude of
the economic change becomes readily apparent. The term Internet of Things was coined by Kevin Ashton, one of the founders of the MIT Auto
ID Center, back in 1995. In the years that followed, the IoT languished, in part, because the cost of sensors and actuators embedded in “things”
was still relatively expensive. In an
18 month period between 2012 and 2013, however, the cost of radio-frequency
identification (RFID) chips, which are used to monitor and track things, plummeted by 40 percent. These tags now cost less
than ten cents each.15 Moreover, the tags don’t require a power source because they are able to transmit their data using the energy from the
radio signals that are probing them. The
price of micro-electromechanical systems (MEMS), including gyroscopes,
accelerometers, and pressure sensors, has also dropped by 80 to 90 percent in the past five years.16 The other obstacle that slowed
the deployment of the IoT has been the Internet protocol, IPv4 which allows only 4.3 billion unique addresses on the Internet (every device on
the Internet must be assigned an Internet protocol address). With most of
the IP addresses already gobbled up by the more
than 2 billion people now connected to the Internet, few addresses remain available to connect millions and eventually
trillions of things to the Internet. Now, a new Internet protocol version, IPv6, has been developed by the Internet
Engineering Task Force; it will expand the number of available addresses to a staggering 340 trillion trillion trillion—more than
enough to accommodate the projected 2 trillion devices expected to be connected to the Internet in the
next ten years
Indict – Morozov
Morozov’s idea is wrong—he fails to recognize technology have biases
Davis 13—Ron is the CEO of Tenacity, a health technology startup using cutting-edge behavioral
science to improve people’s lives and save employers money. . He holds degrees from Harvard Law
School, The University of Oregon and George Fox University. As an employee of Fidelity National
Financial, he drove several successful strategic initiatives, was widely known for his consulting and
coaching program, and broke all local sales records. (“Morozov Is Wrong: Smart Technology Enhances
Choice” May 18, 2013 http://www.huffingtonpost.com/ron-davis/morozov-is-wrong-smartte_b_2891165.html)//JLee
Morozov's rational actor famously performed center stage in classical economic theory, which assumed
that people maximize their own well-being when making purchases. Ironically, though, he scolds engineers for
curtailing choice by offering consumers the choices they crave. Rather than follow his own advice and provide
unbiased information about smart products, he imports his idiosyncratic ideas about choice, and labels these
products "bad," and suggests they make us dumb. They appeal to "base instincts," as if Runkeeper users are baboons. By his
own confused standards, his words "fall somewhere between good smart and bad smart." Even Morozov's modest suggestion
that BinCam should benchmark customer's recycling habits is a known tactic for creating comparison and appealing to
"base" instincts like people's pride and their desire to keep up with others. Perhaps Morozov fails to recognize that all
technologies have biases, as Rushkoff has argued. Guns and pillows can kill, but their bias toward doing so differs
exponentially. We can pick any kind of car to get to work - gas, diesel, electric--and among hundreds of models, but "this sense of choice
blinds us to the fundamental bias of the automobile toward distance, commuting, suburbs, and energy consumption." Morozov has
strangely singled out smart technology for criticism, though bias is common to all products and at least
smart technologies make many of their nudges explicit. People buy them because they want to change their behavior. It's
hard to say the same for the biases that come with products like ramen and chips and fast food. People don't purchase these with chronic
disease and early death in mind, though unfortunately that's often part of the package. Morozov
misses the forest and then cuts
down the wrong tress. This doesn't mean all products are evil. But it seems that bias and base instincts are unavoidable.
Technologies frame our decisions. Marketers influence our choices by bombarding us with messages that appeal
to impulses like pride, fear, sex, exclusivity and security. Animal urges - like starvation avoidance, push
us to overeat. City planning, or the lack thereof, constrains our choices about where we live and how we travel. In other words, we are up
against all kind of intentional and unintentional forces that we didn't ask for, all of which conspire to curtail our autonomy. And, in rarer cases,
Even libertarians have long acknowledged that freedom should be limited when
our actions harm others. This is why we have a criminal code. Breathalyzers that keep drunks from driving should limit their liberty to
we should circumscribe choice.
injure innocents, just as the threat of prison or an officer's pistol strongly encourages people to avoid violent altercations. Appropriate
autonomy is more than mere license. Morozov
raises more serious concerns, like privacy and the possibility of
people getting forced to turn over information or engage with coercive technology. But he offers nothing new
here: these worries are widely shared and decent legislation can protect citizens from overzealous technocrats and rapacious businesses.
More important, Morozov's rubric for "good" and "bad" relies on discredited ideas about human
autonomy and choice, causing him to so wildly miss the mark that he criticizes smart technology as autonomy-limiting,
when it actually offers us the chance to play a greater role in choosing our own destinies.
Morozov advocates a critique without a coherent understanding of IT, falls prey to his
own critique, fails to undertake analysis of the state, all the while moving debate
away from central questions of internet freedom with smoke and mirrors
Muller 11, (Milton, Professor at the Syracuse University School of Information Studies,
“WHAT IS EVGENY MOROZOV TRYING TO PROVE? A REVIEW OF “THE NET DELUSION
”, http://www.internetgovernance.org/2011/01/13/what-is-evgeny-morozov-tryingto-prove-a-review-of-the-net-delusion/)
Flirting with “the dark side”∂ The subtitle suggests that Morozov wants to position himself on the
authoritarian side of the political spectrum. But he doesn’t really. That is, I don’t think he does. He
seems to oppose censorship and authoritarianism and doesn’t want to join the copyright holders, the
cyber-spooks, the Chinese Communist Party, the Islamic fundamentalists and the Christian morality-inmedia types in singling out freedom online for destroying the fabric of civilization. What he does is
remind us that there is a dark side to human nature which often manifests itself on the Internet. To
attribute this dark side to the Internet itself, however – which Morozov sometimes does – is to fall prey
to the Internet-centrism he tries to attack. Moreover, some of his most vivid stories are not about the “
dark side of Internet freedom” but rather about how unfree networks can be controlled and
manipulated by authoritarian states in unfree societies.∂ When it comes to deflating cyber-utopianism
related to the Internet, I don’t think anyone has done it better, and with more detail and empirical
knowledge of Internet developments around the world. At some level, however, his basic point is trivial.
Any sentient user of the internet knows by now that creating a gigantic, globalized sphere for social
interaction means that the activity there will exhibit all the classical problems of human society:
bullying, fads and follies, propaganda, political domination, rumor-mongering, theft, fraud, and intergroup conflicts ranging from nationalism to racism. We have been accepting and responding to that
reality for the past decade, instituting various technical, legal and behavioral controls on Internet use
while seeking to preserve the freedom and openness that made the Internet such a valuable resource.
That is why we are having dialogue about internet governance and security at the global, national and
local levels.∂ Yes, it’s wrong to assume that open information will necessarily and automatically topple
dictatorships and advance democracy. But you don’t advance that dialogue very much by wallowing in
colorful horror stories of bad Internet-enabled activities and peddling them as a byproduct of “Internet
freedom.” That’s what the copyright interests do to carve their pound of flesh out of our freedom;
that’s what the cyber-security interests (elsewhere, so ably attacked and satirized by Morozov himself)
have done and are doing; that’s what the content regulation and web site blocking hawks have done
and are doing. Is Morozov intent on feeding this frenzy?∂ In his zeal to deflate utopian notions that “
networking is always good” Morozov sometimes embraces the other idea he wants to attack, Internet
centrism. The Internet is to be blamed, he implies, for gang wars in Cuernevaca, the illegal trade in
endangered species, and many other things – because the practitioners “use the Internet.” “Text
messaging has been used to spread hate in Africa,” he writes (apparently oblivious to the fact that SMS
technology is not the Internet) – implying both that communication-information technology itself
created the problem of tribal warfare, and that we can make it go away if we regulate or control the way
the technology is used. He writes approvingly of China’s decision to shut down the internet in Xinjiang
province in the summer of 2009 as tensions flared between Uighurs and Han Chinese.∂ But Morozov
never articulates a consistent position on what Internet freedom means and how and when it should be
supported. All in all, one comes away with the conclusion that he doesn’t really know where to go with
his critique.∂ The two “Internet freedoms”∂ That is because a fundamental confusion lies at the very
core of this book. His subtitle and much of his material identifies “Internet freedom” as its object. But
careful readers (and of course, most readers will not be) soon notice that this term means two distinct
things.∂ Most of the time, especially in the earlier pages, Morozov’s notion of “Internet freedom”
can be accurately defined as “the support of Internet freedom by the US government as a way of
meeting US foreign policy and public diplomacy goals of promoting democracy and human rights
overseas.” When the book is narrowly focused on this topic, it is excellent. I say this not because I
completely agree with the critique, but because it raises the right questions and calls attention to many
possible unintended side effects.∂ On the other hand, Internet freedom can – and usually does – refer to
a normative political position on how much or how little the people using the internet should be
controlled by states, or some other hierarchical authority. This notion of Internet freedom recognizes
that the U.S. government, like any other state, can adopt policies and practices hostile to freedom. More
broadly, it denotes the debate over what is the proper role of freedom of expression, freedom of
association online, and the free flow of information in society. Although it is usually universalistic, this
notion does not commit its proponents to any tactical belief that freeing the Internet is inherently
transformative of repressive societies.∂ Although at times Morozov does manage to separate analytically
these two approaches to “Internet freedom,” just as often he conflates them. Worse, he repeatedly
equates support for Internet freedom in the normative sense with cyber-utopianism, which is both
incorrect and irresponsible.∂ Networks and states? ∂ Insofar as he tried to weigh in on the deeper issues
of Internet freedom, Morozov is unsuccessful. He makes (in passing) a vague argument that freedom
requires “the state.” But M’s discussion of “the state” is abstract, ahistorical and tautological; it
confuses “the state” with “order.” The definition of the state he relies on refers broadly to the way
society institutionalizes the capacity to produce and enforce order. With such a definition, the assertion
that “the state” is needed to secure freedom is nothing more than a tautology. It describes an
idealized outcome of having the right kind of state but tells us nothing about what states should do to
the internet now. And it begs the question of what kind of a state should act, whether it should it be the
nation-state or some other form, and how globalized communication infrastructure alters the way states
function. Any concrete, historically specific instantiation of the capacity for supplying order may, in fact,
generate as much disorder and chaos as its absence in specific situations. Morozov claims that there has
been no engagement with this issue. He is wrong. There is a robust dialogue going on about the degree
to which the Internet does or does not require new forms of global governance. Entire books have been
written about it [wink].∂ The many faces of Morozov∂ Contributing to the overall sense of inconsistency,
Morozov adopts differing identities or perspectives, as long as they can be used to score points. He
writes: “internet freedom may make policymakers overlook their own [political and strategic] interests.
” Here he postures as jaded realpolitik advisor to powerful decision makers in existing governments.
They have to look after their interests, and not worry about ideals. Elsewhere, we find a different
Morozov – one who rips into the hypocrisy of the US government for promoting Internet freedom on
the one hand and supporting dictators, surveillance of Internet users both domestic and foreign, and
other policies designed to advance and promote US state’s power. This critique, unlike the first one,
presumes that freedom is a higher value that should not be subordinated to national interests and
realpolitik. In yet other places, Morozov positions himself as earnest giver of advice about how we
[NGOs, govts] need to promote civil society, democracy and liberalism in the rest of the world and how
Internet policy may help us do that.∂ Typically, his style is to take long, detailed and rhetorically
convincing excursions into narrative alleys that link Internet technology to social problems, and then
cover his ass by issuing two or three concluding sentences as a more nuanced escape valve: e.g., “
Networks can be good or bad. Promoting internet freedom must include measures to mitigate the
negative side effects of increased interconnectedness.” Most readers emerging from this tunnel are
simply going to come away with the conclusion that the internet is responsible for a lot of problems and
should be regulated more in order to avoid them. Regulated how? By whom? How to ensure that the
cures aren’t worse than the diseases? Those are the real issues.
Even if Morozov is right, his critique ultimately devolves into pssissm and hopefulness
– vote aff for at least a chance to reform the inter
Chatfield 11, (Tom, doctorate from and professor at St John's College, Oxford, author
and technology theorist, http://www.theguardian.com/books/2011/jan/09/netdelusion-morozov-review)n
In this sense, all of Morozov's arguments boil down to the same thing: a war against complacency. The
masses are mired in dross – but the echo chambers of the elite are equally pernicious, as intellectuals
travel the world from conference to book signing, chatting to each other about freedom while their
native countries clamp down. There's an anguish here that emerges most clearly when Morozov talks
about his native Belarus, where "no angry tweets or text messages, no matter how eloquent, have been
able to rekindle the democratic spirit of the masses, who, to a large extent, have drowned in a
bottomless reservoir of spin and hedonism, created by a government that has read its Huxley".∂ Is this
really what our brave new world amounts to? Morozov longs for the sacred light of reason to shine into
the web's dark corners. But, as his own diagnosis suggests, politics has always been a matter for the
passions. And if it's naive to think that the internet can save us, it's naive to think that it can damn us
too. Here, his avowedly realist programme runs into idealistic trouble: for if the twinned, venal natures
of man and media are to blame for our ills, there's not much we can do. This helps no one, and runs
counter to his incisive anatomy of the issues at stake. For better and for worse, the world has arrived
online – and duly busied itself looking at cute pictures of cats, building encyclopedias and distributing
classified diplomatic cables. If there is hope, it lies exactly where Morozov himself seems most hopeless:
in acknowledging and building on what it is that people actually fear, desire and believe in.
Morozov fails to undertake stastical analysis and cherrypicks empirics to support his
arguments
Thierer 11, (Adam, senior research fellow at the Mercatus Center at George Mason
University, “Book Review: The Net Delusion by Evgeny Morozov”,
http://techliberation.com/2011/01/04/book-review-the-net-delusion-by-evgenymorozov/)
Morozov thinks that the “ridiculously easy group-forming” that his leading nemesis Clay Shirky
described in his recent book Cognitive Surplus is, in reality, leading largely to cognitive crap, at least as it
pertains to civic action and political activism. Indeed, at one point in Chapter 7 (the creatively-titled, “
Why Kierkegaard Hates Slacktivism”), Morozov speaks of the development of what we might think of
as a “tragedy of the civic commons” (my term, not his). He argues that:∂ When everyone in the group
performs the same mundane tasks, it’s impossible to evaluate individual contributions, and people
inevitably begin slacking off… Increasing the number of participants diminishes the relative social
pressure on each and often results in inferior outputs. (p 193)∂ It’s an interesting theory, as far as it
goes, but Morozov doesn’t muster much more than a handful of anecdotes in support of it. He notes,
for example, that even back in the Berlin Wall era, young East German students were more likely to
know intimate facts about popular American dramas like Dallas and Dynasty than current political
affairs. And, echoing the recent laments of Andrew Keen (Cult of the Amateur) and Lee Siegel (Against
the Machine), Morozov worries about the “narcissism” and “attention seeking” of social
networking denizens. “There’s nothing wrong with the self-promotion per se, but it seems quite
unlikely that such narcissistic campaigners would be able to develop true feelings of empathy or be
prepared to make sacrifices that political life, especially political life in authoritarian states, requires.”
(p 187)∂ But this ignores many legitimate forms of social organization / protesting that have been
facilitated by the Net and digital technologies. Despite what Morozov suggests, we haven’t all become
lethargic, asocial, apolitical cave-dwelling Baywatch- rerun-watching junkies. If all Netizens are just
hooked on a cyber-sedative that saps their civic virtue, what are we to make of the millions of
progressives who so successfully used the Net and digital technologies to organize and elect President
Obama? (Believe me, I wish they wouldn’t have been so civic-minded and rushed to the polls in record
numbers to elect that guy!)
Morozov fails to understand the internet as a way of disseminating information and
instead dismisses it without subjecting it to any analysis.
Thierer 11, (Adam, senior research fellow at the Mercatus Center at George Mason
University, “Book Review: The Net Delusion by Evgeny Morozov”,
http://techliberation.com/2011/01/04/book-review-the-net-delusion-by-evgenymorozov/)
Yet, in his zeal to counter those who have placed too great an emphasis on the role of information
technology, Morozov himself has gone too far in the opposite extreme in The Net Delusion by
suggesting that technology’s role in transforming States or politics is either mostly irrelevant or even,
at times, counter-productive. I’m just not buying it. I think you’ll find a more nuanced and balanced
set of conclusions in this new white paper, “Political Change in the Digital Age: The Fragility and
Promise of Online Organizing,” by Bruce Etling, Robert Faris and John Palfrey. In it, they conclude: The
Internet has an important role in increasing information sharing, access to alternative platforms, and
allowing new voices to join political debates. The Internet will continue to serve these functions, even
with state pushback, as activists devise ways around state online restrictions. Conditions that contribute
to success are likely determined not by the given technological tool, but by human skill and facility in
using the networks that are being mobilized. … It is less clear how far online organizing and digital
communities will be allowed to push states toward drastic political change and greater democratization,
especially in states where offline restrictions to civic and political organization are severe. As scholars,
we ought to focus our attention on the people involved and their competencies in using digitallymediated tools to organize themselves and their fellow citizens, whether as flash mobs or through
sustained social movements or organizations, rather than the flow of information as such. In other
words, we should view information as one of many means to the end and not the end in and of itself.
But we also shouldn’t discount its importance too lightly.
Morozov fails to clarify an alternative to his critique and promotes the same internet
authoritarianism he critiques – only the perm is able to overcome this solvency defecit
Thierer 11, (Adam, senior research fellow at the Mercatus Center at George Mason
University, “Book Review: The Net Delusion by Evgeny Morozov”,
http://techliberation.com/2011/01/04/book-review-the-net-delusion-by-evgenymorozov/)
There’s a more profound problem with Morozov’s thesis. If he is correct that the Net poses such
risks, or undermines the cause of democracy-promotion, isn’t the logical recommendation that flows
from it technology control or entertainment repression? If, as Morozov implies, Netizens are spending
too much time viewing Lolcats and not enough in the streets protesting or running down to the Peace
Corps to sign up for a tour of duty, then what would he have us do about it? Shall we restrict access to
the growing abundance of technological / entertainment choices that he laments? Amazingly, he never
really clarifies his views on this important point. Like so many other cultural critics before him, Morozov
finds it easy to use caustic wit to tear apart inflated arguments and egos on the other side while also
conveniently ignoring the logical consequences of their critiques or bothering to set forth a constructive
alternative. About the closest he comes is to detailing his views is Chapter 9, which focuses on the
danger of the Net and modern digital technology being used to spread extremist views. Even though he
refuses to get more specific about potential responses, what, exactly, are we to conclude when we hear
Morozov speak of the need for “measures to mitigate the negative side effects of increased
interconnectedness.” (p. 261) And what are we to make of his claim that “More and cheaper tools in
the wrong hands can result in less, not more, democracy.” (p. 264) Or, his argument that: The danger is
that the colorful banner of Internet freedom may further conceal the fact that the Internet is much
more than a megaphone for democratic speech, that is other uses can be extremely antidemocratic in
nature, and the without addressing those uses the very project of democracy promotion might be in
great danger.”(p. 265-6) Or, finally, his conclusion in that chapter that: If the sad experience of the
1990s has taught us anything, it’s that successful (democratic) transitions require a strong state and a
relatively orderly public life. The Internet, so far, has posed something of a threat to both. (p. 274)
Reading those passages — especially the words I’ve highlighted — it’s hard not to conclude that
Morozov would like to put the information genie back in the bottle. To be clear, he never says that
directly since he simply refuses to be nailed down on specifics. But, again, his tone seems to suggest that
some form of technological control or information repression may be necessary. I hope that in coming
essays Evgeny will be willing to clarify his views on this issue since The Net Delusion leaves us scratching
our heads and wondering just how far he would go to counter the supposed “danger” or “threat”
posed by digital technology.
Morozov fails to understand the historical context of the internet and doesn’t
undertake cost benefit analysis of the internet – on balance it has improved quality of
life and government accountability.
Thierer 11, (Adam, senior research fellow at the Mercatus Center at George Mason
University, “Book Review: The Net Delusion by Evgeny Morozov”,
http://techliberation.com/2011/01/04/book-review-the-net-delusion-by-evgenymorozov/)
Moreover, Morozov once again overplays his hand here. He spends so much time arguing that digital
technologies have made our lives more transparent to the State that he underplays the myriad ways it
has simultaneously made government activities more visible than at any point in history. It is
extraordinarily difficult for even the most repressive of States today to completely bottle up all its
secrets and actions. Morozov says modern China, Putin’s Russia and Hugo Chavez are embracing new
digital technologies in an attempt to better control them or learn how to use them to better spy on their
citizens, and he implies that this is just another way they will dupe the citizenry and seduce them into a
slumber so they will avert their eyes and ears to the truth of the repression that surrounds them. Sorry,
but once again, I’m not buying it. Repressive regimes really do face a tension when they embrace
modern information and communications technologies. It does force them to make certain trade-offs as
they look to modernize their economies. Morozov thinks this so-called “dictator’s dilemma”
hypothesis is largely bunk, but he seems to expect this process to unfold overnight once new technology
moves in. In reality, these things take more time. The general progression of things in most states is
toward somewhat greater transparency and openness, even if it does not magically spawn regime
change overnight. Importantly, he never really offers a credible cost-benefit analysis of the life of
citizens in those regimes today relative to the past. Are we seriously supposed to believe that
information-deprived Chinese peasants of the Mao era were somehow better positioned to influence
positive regime change than the more empowered modern Chinese citizen? It’s a tough sell. Are their
downsides associated with those new technologies (especially the potential for citizen surveillance)?
Yes, of course. But let’s not use that as an excuse for marching backwards, technologically-speaking.
Morozov concludes affirmative – policy action is a necessary prerequisite to
challenging internet delusion – this link turns the kritik
Thierer 11, (Adam, senior research fellow at the Mercatus Center at George Mason
University, “Book Review: The Net Delusion by Evgeny Morozov”,
http://techliberation.com/2011/01/04/book-review-the-net-delusion-by-evgenymorozov/)
Chapter 8 of the book focuses on what Morozov describes as the “Cultural Contradictions of Internet
Freedom.” He again scores some points for rightly pointing to the hypocrisy at play in the United States
today — by both government and corporations — when it comes to the promotion of Net freedom
globally. He correctly notes that “while American diplomats are preaching the virtues of a free and
open Internet abroad, an Internet unburdened by police, court orders, and censorship, their
counterparts in domestic law enforcement, security, and military agencies are preaching — and some
are already pursing — policies informed by a completely different assessment of those virtues.” (p.
218) Similarly, Morozov castigates many of America’s leading high-tech companies — Facebook,
Google, Microsoft, Apple, Twitter, etc. – for preaching the values of Net freedom but then all too
willingly handed over information about dissidents to repressive State actors, or playing ball with foreign
thugs in other ways. Morozov is right; American leaders in both government and business need to better
align their actions with their rhetoric when it comes to the interaction of government and technology.
Too often, both groups are guilty of talking a big game about the Internet and freedom, only to later
take steps to undermine that cause. As Morozov asks in a recent New York Post column, “Shouldn’t
America’s fight for Internet freedom start at home for it to be taken seriously by the rest of the world?
” Yes, it should.
AT: Tech Bubble DA
No Bubble
No such thing as a tech bubble—tons of stats prove
Harris 7/16—Melissa joined the Chicago Tribune as a business columnist in 2009 after nearly five
years as an award-winning metro reporter at The Baltimore Sun. Prior to joining the Sun, she was a
metro reporter at The Orlando Sentinel. She is a graduate of Northwestern and Johns Hopkins
universities (Bachelor of Science in journalism and Master of Arts in government), and a two-time finalist
for the Livingston Award, honoring outstanding reporting by journalists younger than 35. (“Hate to
burst your bubble, but tech investment is healthy” July 16, 2015
http://www.chicagotribune.com/business/columnists/ct-harris-tech-bubble-0717-biz-20150716column.html)//JLee
The tech bubble doesn't exist. That's the point of a 53-slide presentation last month in which three
partners from the Silicon Valley venture capital firm Andreessen Horowitz supplied evidence that the
tech market is nowhere near the mania levels of 1999 and 2000. Andreessen Horowitz's data show that
private and public funding for tech companies remains at about 40 percent of what it was in 1999. There's
been no surge in venture capital fundraising. It's rising but still below 2006 levels. And venture capital funding as a percentage of the gross
domestic product created by the sector is down by half since 1980. There's also a real market for these businesses now. The
number of
Internet users has increased from 738 million in 2000 to 3.2 billion in 2015, according to a new report
from the International Telecommunication Union. Venture funding per person online has been flat since the bubble, while
people are spending more on it. Yes, the S&P 500 Information Technology Index is approaching 1999 level s but this
time, Andreessen Horowitz argues, profits are driving these returns with price-to-earnings multiples at early 1990s levels. (A price-to-earnings
ratio is the current price of a share of stock divided by its earnings per share. A large multiple can signal that the market's perception of the
company is inflated.) "The
price-to-earnings ratio of the tech component of the S&P is in fact lower than for
the index as a whole," Bloomberg reported. Instead, almost all of the returns are being had in private markets,
meaning without a company going public. In other words, you have to know someone or be a large institutional investor to be
able to buy equity in privately held companies like Uber even though its estimated worth is some $40 billion. Overall
dollars raised by technology companies are being dominated by such deals. The good news is that momand-pops can't bet their retirement funds on Uber. The bad news is that there was at least $32.97 billion in venture capital
sitting out there for 4,378 venture deals in 2014. That first number comes from Dow Jones VentureSource and
represents a 62 percent increase from 2013 and the highest total since 2007. The deal number comes from
PricewaterhouseCoopers' MoneyTree, a quarterly study of venture capital activity in the United States, and represents a 4 percent increase
from 2013. Why is that bad? Keep reading. The way to look at the tech sector is to think of it like an hourglass,
explained Waverly Deutsch, a clinical professor of entrepreneurship at the University of Chicago Booth School of Business. (Disclaimer: I attend
Booth. Deutsch previously coached a startup I founded.) There
is an increasing number of companies being created at
the bottom, and about 60 highly valued startups worth $1 billion or more, known as unicorns, at the
top. In the middle is a big squeeze. The base at the bottom of the hourglass is widening. The number of companies
raising capital has doubled since 2009, and the number of funding rounds has grown by 150 percent. But the size of those rounds has
fallen by a third since 2004. "The collapse of the cost of creating tech companies in the last two decades means
many more are being created," Andreessen Horowitz's Morgan Bender, Benedict Evans and Scott Kupor wrote. "With each
one needing less money to get started, there are a lot more small rounds. That is, there is a surge in
seed-stage funding." There has been a seven-times increase over 10 years in the amount of money raised in $1 million
to $2 million funding rounds, although that totals to only $1.1 billion, or about 5 percent of all funding going into
deals of less than $40 million, according to Andreessen Horowitz. At the other end of the hourglass, all unicorns combined
equal the value of about one Facebook. Still, these private funding rounds of $40 million or more
dominate fundraising. "The headlines are ominous," Bender, Evans and Kupor acknowledge. "Seventy-five percent of the
largest VC investments have been raised in the last five years. ... Many companies that would have in the past done an
IPO are now doing late-stage rounds (effectively quasi-IPOs). ... Thus, traditional public market investors and buyout funds, who
would not typically invest in companies at this stage, have moved into the private markets." Sixteen of the Top 20 tech deals last year
had participation from "non-traditional investors," according to Andreessen Horowitz. More large investors want access to these fast-growing,
scalable tech companies than there are fast-growing, scalable tech companies. Comparatively few exist because right before that comes the
squeeze. Funding
to get to proof of concept — a company has a product and a few customers — is plentiful and cheap. Heck,
many companies can get that far without raising any outside funding at all. But scaling that product to reach millions
of customers is very expensive. There are so few ideas that can make that leap, even with stellar leadership. That's reflected
in the venture data. Total funding for deals in the $10 million to $25 million range has fallen in half since 1999, according
to Andreessen Horowitz. And total money going into deals under $40 million is back to 2001, post-bubble-burst levels.
"You get terms in the valley, like the cockroaches, companies that are just kind of crawling along, self-funding with
small streams of revenue, but not enough to pay founders legitimate salaries, not enough to grow and not enough to invest in
marketing," Deutsch said. "You've got tens of thousands of companies getting money from angels, graduating from accelerators all
thinking the way they're going to grow their business is through venture capital, and there are 2,365 seed and
early-stage deals being done. "The early-stage venture capitalists whittle this giant pool of tens of thousands of companies
down to 2,365 companies, then they can overpay for the growth of those companies," Deutsch continued. "The pipeline is
kind of broken in the middle. ... But if you squeeze through this neck, you've got this massive amount of venture capital
that's waiting. The valuations are crazy because there's competition among the big funds to get their billions of dollars placed."
The funnel is frustrating for entrepreneurs, but that squeeze is the only thing preventing a bubble. The unicorn euphoria can't be
allowed to cascade down, and the Andreessen Horowitz presentation makes a persuasive case that it hasn't. Yet.
The tech bubble does not exist—Unicorn start-ups do not exist
Smith 7/6—Noah is an assistant professor of finance at Stony Brook University and a freelance writer
for a number of finance and business publications. He maintains a personal blog, called Noahpinion.
(“There Is No Tech Bubble. Still, Be Worried.” July 6, 2015
http://www.bloombergview.com/articles/2015-07-06/there-is-no-tech-bubble-still-be-worried-)//JLee
Andreessen Horowitz, the most innovative and outspoken of Silicon Valley’s big venture capital firms,
recently came out with a
presentation intended to kill the idea that there’s a new tech bubble under way. The 53-slide presentation, by
Morgan Bender, Benedict Evans and Scott Kupor, takes on the idea that too much money is flowing into private
technology companies, especially in the highly valued startups called “unicorns.” First, a little background. Bubbles, by definition,
pop, and if tech crashed it would hurt a lot of investors. People making the case for a bubble often focus
on unicorn startups (those with a valuation of greater than $1 billion) such as Uber, which is now valued at $40 billion without having
gone public. They claim that large private financing by late-stage venture capital, backed up by large asset managers like Fidelity or Tiger Global
Management, have replaced initial public offerings as the driver of overvaluation. This is known as the “private IPO.” The probubble case is that these private financing rounds have inflated the value of the unicorns without spilling over into the public markets.
Andreessen Horowitz’s team
attacks this idea from a number of directions. First, they show that overall funding for tech
startups -- both private financing and IPOs -- is still nowhere near the dizzying heights it reached in 1999 and 2000,
especially when measured as a share of the economy. The same is true of venture capital fundraising. They also present various
arguments that long-term earning potential for tech startups is much stronger this time around. (Bloomberg LP, the parent
company of Bloomberg News, is an investor in Andreessen Horowitz.) The Andreessen Horowitz presentation makes a very
convincing case. We should not be drawing a parallel between the boom in private late-stage funding of unicorn
startups and the late-’90s IPO boom. They just don’t look like the same phenomenon. So there’s probably not a unicorn
bubble. How about a tech bubble more generally? The Andreessen Horowitz team points out that the tech sector isn't taking over the
Standard & Poor's 500 stock index the way it did in the late-’90s tech bubble: The
share of tech in the index has been flat for
about 12 years now. And, as Sam Altman pointed out on Twitter, stock valuations for technology
companies don’t look any higher than other stock valuations; the price-to-earnings ratio of the tech component of the
S&P is in fact lower than for the index as a whole. So we’re probably not in a tech bubble of any kind. That said, there was
one Andreessen Horowitz slide that's ominous. It shows that all the unicorns together are valued at slightly less
than Facebook. That reminded me of an e-mail debate between financial economists Eugene Fama and Ivo Welch, on the question of
whether the ’90s tech bubble was really an episode of market irrationality. In that debate, Fama said the following: During 1999-2000 there
[were] 803 IPOs with an average market cap of $1.46 billion … 576 of the IPOs are tech and internet-related
… [thus] their total market cap [was] about $840 billion, or about twice Microsoft's valuation at that time. Given expectations at that time
by the internet, is it unreasonable that the equivalent of two Microsofts
internet-related IPOs?
about high tech and the business revolution to be generated
would eventually emerge from the tech and
AT ISIS Turns
No Link – Internet Not Key
The internet is not the main point of ISIS recruitment—even if they do recruit through
the internet the recruitment is small
Franz, 6/2- (Barbara Franz teaches political science at Rider University, Lawrenceville and Princeton,
New Jersey.) “Popjihadism: Why Young European Muslims Are Joining the Islamic State” Mediterranean
Quarterly Volume 26, Number 2, June 2015, Dunke University press, Project Muse.//droneofark
Jihadism has become a media phenomenon. Videos distributed by IS and other radical groups, with their
own YouTube accounts, flourish on the Internet. The films appeal to Muslim youth with messages of martyrdom and loyalty
packaged in rock and rap video formats.16 A Viennese social worker states, “All like Jihadism. It has a pull.”17 Some have dubbed the
new genre popjihadism.18 However, one German study found that only 18 percent of jihadists were radicalized through online
resources. By far the most important variable for the radicalization of German youth is contact with imams [End Page 9] and mosques (23
percent) and with friends who have gone off to fight in the jihad before them (30 percent).19 What
these popjihadists express in
blogs is crucial and highly influential for their friends at home. For example, the young woman behind the Umm Layth
blog presents herself as a British immigrant to the caliphate. She asks, while posting photos of herself and her “sisters” clothed in black burqas,
“How can you not want to produce offspring who may be, God willing, part of the great Islamic revival?”20 Just as curious are the ventures of
Samra Kesinovic and Sabina Selimovic, two Austrian teenagers of Bosnian background ages fifteen and sixteen, whose story has circulated
throughout the local media scene.21 The two young women left Vienna in April 2014, and in August Selimovic appeared in a selfie on Instagram
wearing a hijab. The woman is a jihadi now — the picture depicts her wearing a burqa and holding a gun. A number of Austrian teenage
women, including some recent converts and one thirteen-year-old girl, have formed a Whatsapp group and are planning to sojourn to Syria as
well.22 Other IS fighters, such as the nineteen-year-old Firas Abdullah, an Austrian with Tunisian roots, currently stationed in ar-Raqqa, Syria,
use online platforms like ask.fm to blog about their experiences.23 Through Twitter, Facebook, Instagram, and Tumblr, IS easily spreads its
message to a Western audience. Yilmaz, a smiling Dutch jihadist with Turkish roots, has become a social media sensation with his Tumblr
account Chechclear.Tumblr.com glorifying his stint in Syria as the ultimate adventure by posting photos of warfare alongside children and
kittens.24 Although
YouTube videos, Instagram, Twitter, and Tumblr accounts often initiate interest in the
jihad, recruitment is a more complex issue and does usually not occur via electronic means. The
sympathizer group is usually small and concise. In Vienna, for example, only a dozen or so people really know how
recruitment actually happens. The recruitment of individuals occurs not only in the virtual world but also in public places. There are a [End Page
10] number of known meeting areas for possible recruits in Vienna, according to two anonymous informants of the weekly paper Der Falter.
They are, for example, on the Danube Island, at the Handelskai, and the Jägerstraße, all working-class locales close to public transportation
frequented daily by crowds of commuters.25 Some youth might have been recruited by Salafite imams. Recently, some radical voices in Vienna
apparently have begun to call for volunteers for the holy war, including a Bosnian imam in a mosque in Vienna’s second district, Leopoldstadt,
who incited hatred against Jews, Christians, atheists, and women. His followers supposedly have engaged in military exercises in the woods
around Vienna.26 An Egyptian preacher in Styria’s capital Graz labeled Christian Austrians as successors of “apes and pigs,” and a preacher from
Gaza called Western women whores and argued that the pope is a fool and not worth the “nail in the sandals of the prophet.”27 While this
might distress good Austrian Christians, whether this
language is enough to entice individuals to become jihadists is
questionable. It is, however, part of a rhetorical strategy to divide the world into the good and the bad
in general, the believers and the infidels, and good and bad Muslims.28 In the mosque, nationality does not matter;
Bosnians, Chechens, Turks, Kurds, and Austrians pray side by side. In a society in which discrimination and marginalization of ethnic minorities
remains a key feature, the mosque provides something new for young Muslims. For many
young converts who feel they have
no career prospects and no economic opportunities, these are spaces where they are given self-worth
because they are given a choice: if they chose the “right” side, Salafite jihadism, they are promised that
they will become heroes. [End Page 11]
No internal link—governments use the internet to discredit ISIS as much as they use it
as a persuasion tactic.
Farwell, 14- (holds a B.A. from Tulane University, a J.D. in Law from Tulane University, and a D.C.L.S. in Comparative Law from the
University of Cambridge (Trinity College). In addition, he is a Senior Research Scholar in Strategic Studies at the Canada Centre for Global
Security Studies, Munk School of Global Affairs, University of Toronto) “The Media Strategy of ISIS” From “Survival: Global Politics and
Strategy”, Routledge Publishing vol. 56 no. 6 | December 2014–January 2015 | pp. 49–55, pdf, //droneofark
Yet there is a strategic downside to ISIS’s approach. The ubiquity of smartphones has empowered
individual fighters to spread messages and images of their own, including videos of atrocities, such as the
chopping off of a man’s hand in Raqqa, whose filming ISIS leaders had banned to avoid sparking a backlash. ISIS fighters may take
pride in tweeting and bragging about their experiences, but such material provides fodder for the
group’s opponents, who can use it to discredit the militants’ narrative while mobilising opposition.17 The
US State Department, for example, has created a video mocking ISIS recruitment efforts by showing, in graphic detail, the group’s ugly brutality
and suggesting that the group’s adventure trail ends in an inglorious death.18 During
an earlier phase of conflict in Iraq, alQaeda realised that images of Muslims killing Muslims were counterproductive, and became critical of
ISIS for carrying out such actions. Likewise, Egyptian cleric Yusuf alQaradawi and the Association of Muslim
Scholars in Iraq have spoken out against ISIS beheadings.19 Releasing warm and fuzzy images of ISIS murderers hugging
pets was a good gambit, but the emotional impact of images depicting ISIS militants drenched in the blood of Muslims and other innocents is
likely to backfire. That
doesn’t mean the road ahead will be easy for ISIS’s opponents. The Iraqi government has tried
to shut down Internet access in regions where ISIS has gained a physical foothold, and has cut Internet traffic across Iraq by one-third.20 But
the government in Baghdad lacks centralised control over the country’s telecommunications
infrastructure, limiting its ability to get its own messages out. ISIS has proven more adroit, leveraging the
capabilities of providers in Turkey and Iran for its own purposes. It will be interesting to see how Ankara and Tehran
respond. ISIS leaders seem to recognise that social media is a double-edged sword. The group tries to
protect the identity and location of its leadership by minimising electronic communications among top
cadres and using couriers to deliver command-and-control messages by hand. Social media is reserved
for propaganda. Still, advances in technology may eventually leave the group vulnerable to cyber
attacks, similar to those reportedly urged by US intelligence sources to intercept and seize funds
controlled by Mexican drug cartels.21 Ultimately, defeating ISIS will require focused efforts aimed at
discrediting and delegitimising the group among Muslims, while working towards the only long-term
solution for the evil the group has brought to the world: eradication. One hopes the policymakers
building coalitions and launching strikes against ISIS have these aims in mind, and will calibrate their
narratives, themes and messages accordingly.
No Link – Fill in solves
Even if the aff curtails surveillance, other countries solve the impact
Dodd 6/21 – writer for The Guardian
Vikram Dodd, 6/21/2015, The Guardian, “Europol web unit to hunt extremists behind Isis social media
propaganda”, http://www.theguardian.com/world/2015/jun/21/europol-internet-unit-track-downextremists-isis-social-media-propaganda, 7/17/2015, \\BD
A new Europe-wide police unit is being set up to scour the internet for the ring leaders behind Islamic
State’s social media propaganda campaign, which it has used to recruit foreign fighters and jihadi
brides.∂ The police team will seek to track down the key figures behind the estimated 100,000 tweets a
day pumped out from 45,000 to 50,000 accounts linked to the Islamist terror group, which controls parts
of Iraq and Syria.∂ Run by the European police agency Europol, it will start work on 1 July, with a remit to
take down Isis accounts within two hours of them being detected.∂ Europol’s director, Rob Wainwright,
told the Guardian that the new internet referral unit would monitor social media output to identify
people who might be vulnerable and those preying on them. He said: “Who is it reaching out to young
people, in particular, by social media, to get them to come, in the first place? It’s very difficult because
of the dynamic nature of social media.”∂ The director added that the police team would be working with
social media companies to identify the most important accounts operating in a range of languages that
are “underpinning what Isis are doing”.∂ Europol said it would not name the social media firms who have
agreed to help the police. It will use network analytics to identify the most active accounts, such as
those pumping out the most messages and those part of an established online community.∂ Wainwright
said the new unit would aim to “identify the ringleaders online”, but even then counter-terrorism
investigators could not go through every one of the estimated 50,000 targeted accounts, as there were
too many and new ones could easily be set up.∂ Last week, Isis’s ability to reach into British communities
to gain recruits was demonstrated once again. One Briton, Talha Asmal, a 17-year-old from Dewsbry,
West Yorkshire, is believed to have killed himself in a suicide bombing in Iraq, while three Bradford
sisters are feared to have fled to Syria with their nine children in the hope of joining a brother who has
been fighting the Assad regime.∂ A total of 700 Britons have travelled to territory controlled by Isis in
Syria and Iraq – a problem shared with other European countries. Europol’s database tracking suspected
foreign fighters in the two countries has 6,000 names. Some of those may be facilitators, or their
associates. Wainwright said up to 5,000 were believed to have travelled to Isis-held territory from
countries including Holland, France and Belgium, as well as from the UK.∂ He said some were
“disaffected” youths migrating from teenage gangs in their own countries seeing Isis as a “bigger gang in
Syria”. But he added that others being attracted are those who had bright futures in their home
countries.∂ The new European initiative is in part based on Scotland Yard’s counter-terrorism internetreferral unit. The hope is the new unit will boost efforts across European countries, with results passed
back to nations to take action against the individuals running the accounts.∂ The unit is part of European
governments’ response to the terrorist attacks on the office of satirical magazine Charlie Hebdo in Paris
in January.∂ Wainwright said money used to fund Isis activities will also be hunted down. He added:
“Where you follow the money trail, it helps find who they are, what they are doing and who their
associates are.”∂ The home secretary, Theresa May, stressed in a speech this week the need to tackle the
cross-border threat of Isis. She said: “The threat … that we face is a common one shared by many of
your countries. And if we are to defeat it, we need to work together. ∂ “We have also supported the EU
in setting up an internet-referral unit at Europol to address the increasing amount of terrorist and
extremist propaganda available on the internet, and I am pleased to say the UK will be seconding a
police officer to this unit.”
Link Turn -- Internet Solves ISIS
The Internet allows us to monitor information about their location
Starr 5/12 – writer for CNN
Barbara Starr, 5/12/2015, CNN, “Pentagon hunts for ISIS on the secret Internet”,
http://www.cnn.com/2015/05/12/politics/pentagon-isis-dark-web-google-internet/, 7/17/2015, \\BD
Though a tough space to shed light on, now the Pentagon is developing a way to pry the doors open and
chase ISIS and others down.∂ "We need a technology to discover where that content is and make it
available for analysis," said Chris White of the Defense Advanced Research Projects Agency, or DARPA.∂
DARPA has a new military technology known as MEMEX that acts as a unique search engine -- seeing
patterns of activity on the Dark Web and websites not available via traditional routes like Google or
Bing.∂ "MEMEX allows you to characterize how many websites there are and what kind of content is on
them, " White said. "It was actually first developed to track down human trafficking on the web -- it's an
idea that works for an illicit activity users try to keep hidden."∂ It all starts, White said, by being able to
track down locations where activity is happening.
Increased marketing allows us to combat ISIS
AFP 2/20
AGENCE FRANCE-PRESSE, 2/20/2015, Raw Story, “Winning the Internet war is key in ISIS fight: experts”,
http://www.rawstory.com/2015/02/winning-the-internet-war-is-key-in-isis-fight-experts/, 7/17/2015,
\\BD
The Internet has become a crucial battleground in the fight against jihadist propaganda and Western
nations need to step up their game, according to participants in a Washington meeting on countering
radical groups.∂ Experts say governments must engage in corporate-style marketing if they are to
combat the Islamic State, which is using slick videos to lure foreign nationals to the battlefields of Iraq
and Syria.∂ “If ISIS has a branding and marketing department, where is ours?” said Sasha Havlicek, the
founding chief executive officer of the London-based Institute for Strategic Dialogue (ISD).∂ The think
tank has carried out several experiments using Google Ideas, Twitter and Facebook to try to directly
engage with potential recruits — and dissuade them from joining the brutal jihadist movement.∂ In one
campaign, ISD released several videos of Abdullah X — a fictional character who tries to convince young
Muslims that following the Islamic State is not the way forward.∂ “We were able to ‘hypercharge’ that
content — inserting him in the very spaces the extremists were using (…) anchoring this content to
extremist Twitter accounts, posting it on extremist pages, having it pop out whenever you search for
jihad in Syria,” said Havlicek.∂ “And within a few months, this went from reaching 50 people to 100,000
people of our target group of individuals searching to go to Syria for jihad,” she said.∂ The best indicator
of success was that ISIS responded by running five pages of “urgent refutation” of the arguments of
Abdullah X, she added.∂ The ISD think tank also launched a pilot project using Facebook to “walk back
people from the edge” of extremism by proposing a one on-one chat with people expressing interest in
violent jihad.∂ “Right now, only extremist groups and intelligence services are really engaging with this
constituency online,” Havlicek said.∂ The next step is to see “if see if that outreach can be automated,”
she added.∂ For that to happen, private companies with well-developed online marketing strategies can
offer that knowledge to associations and activists working against the IS message, Havlicek said.∂ –
Counter ‘brainwashing’ –∂ The US government is already working to weaken extremist groups online — a
digital blitz involving a State Department team that posts opinion pieces on radical Islam, cartoons and
graphic photos.
Unmasking online profiles allows us to gain info about ISIS
Matthews 2/24 – writer for Open Canada
Kyle Matthews, 2/24/2015, “Five ways to fight ISIS online”, http://opencanada.org/features/five-waysto-fight-isis-online/, 7/17/2015, \\BD
4. Unmask online profiles∂ It is essential that action is taken to expose, disrupt and make public ISIS
members on social media, as well as their cheerleaders. Last year a business executive in India was
exposed as the person behind the country’s most prolific ISIS Twitter account. He was arrested and then
apologized, with no proof that he has since urged others to wage holy war. Recently, the hacker group
known as Anonymous, following the murder of the journalists at Charlie Hebdo in Paris, declared a social
media war against jihadist groups online and recently shut down over one hundred such Twitter and
Facebook accounts.
--xt Internet Segregation Turn
The Internet is key to solve ISIS
Dettmer 6/2 – journalist for The Daily Beast
Jamie Dettmer, 6/2/2015, The Daily Beast, “Can the West Beat ISIS on the Web?”,
http://www.thedailybeast.com/articles/2015/03/10/can-the-west-beat-isis-on-the-web.html,
7/17/2015, \\BD
But that could result in a tremendous loss of useful information in the fight against the Islamic State. “If
every single ISIS supporter disappeared from Twitter tomorrow, it would represent a staggering loss of
intelligence—assuming that intelligence is in fact being mined effectively by someone somewhere,”
argue analysts J.M. Berger and Jonatho Morgan in a study published Friday for Brookings, a U.S. think
tank, called “The ISIS Twitter Census.”∂ The report garnered media coverage at the weekend for its
estimate that last autumn the followers of the terror group had over 46,000 and possibly as many as
90,000 accounts on Twitter, which has become the main social media hub for ISIS, allowing it to
disseminate links to digital content hosted on other online platforms.∂ The authors argued, “By virtue of
its large number of supporters and highly organized tactics, ISIS has been able to exert an outsized
impact on how the world perceives it, by disseminating images of graphic violence (including the
beheading of Western journalists and aid workers, and more recently, the immolation of a Jordanian air
force pilot), while using social media to attract new recruits and inspire lone actor attacks.”∂ But the
authors maintain that Twitter’s aggressive suspension of jihadist accounts in recent weeks—a policy that
has earned the threat of retaliation against the company’s executives by the terror group—could well be
counter-productive. A total suspension, they say, could have unintended consequences. Not only would
it deny intelligence agencies useful operational and tactical information, they fear, it could speed up
radicalization by channeling potential recruits and lone wolves like Cornell into segregated ISIS Internet
channels.∂ That, they maintain, would reduce any possibility of moderating influences being brought to
bear by the intelligence services and de-radicalizing experts on potential recruits. But such sophisticated
efforts seem a long way from being applied.
Iraq Solves
Iraq solves propaganda – ISIS can’t post their memes online
Harris 14 – senior staff writer at Foreign Policy, four times been named a finalist for the Livingston
Awards for Young Journalists
Shane Harris, 6/17/2014, Foreign Policy, “Iraqi Government Takes Its Fight With ISIS Online”,
http://foreignpolicy.com/2014/06/17/iraqi-government-takes-its-fight-with-isis-online/, 7/17/2015,
\\BD
Iraqi soldiers may have dropped their weapons, stripped off their uniforms, and fled the Islamist
jihadists who have conquered a growing list of cities as they move closer to Baghdad. On the battlefields
of cyberspace, by contrast, the Iraqi government is putting up a fierce fight against the forces of the
Islamic State of Iraq and al-Sham (ISIS).∂ In the past week, government ministries have blocked Internet
access in regions where ISIS has a physical foothold in an attempt to stop the group from spreading
propaganda and recruiting followers among Iraq’s repressed Sunni minority. The government has also
ordered Internet service providers across the country to block all access to certain social media sites,
including Facebook, YouTube, and Twitter, which are ISIS’s favorite tools for spreading propaganda and
posting photos and videos of their victories over the Iraqi military and their wholesale slaughter of
unarmed Shiites — both sources of tremendous embarrassment for the government of Prime Minister
Nouri al-Maliki, a Shiite.∂ Baghdad’s online offensive appears to be having some effect. As of Tuesday,
June 17, daily Internet traffic across Iraq had dropped by roughly a third, said David Belson, editor of the
State of the Internet Report, published by web services company Akamai Technologies, which monitors
Internet access around the world.
Europol Solves
Europol solves – ending data localization is key
Chorley 7/1 – writer for Daily Mail
Matt Chorley, 7/1/2015, Daily Mail, “100,000 terror web posts removed since 2010 as Europol sets up
dedicated unit to stem tide of ISIS propaganda”, http://www.dailymail.co.uk/news/article3145689/Europe-wide-police-team-launches-wipe-ISIS-web-aim-terrorist-accounts-taken-twohours.html, 7/17/2015, \\BD
Almost 100,000 pieces of terrorist or extremist web posts have been removed from the internet by the
British authorities in the last five years, it emerged today.∂ The government says it is proof that it takes
'seriously the threat from online terrorist and extremist propaganda'.∂ But with some 46,000 accounts
linked to the terror group operating in Iraq and Syria, there are fears it could be an impossible task to
halt its sophisticated internet publicity machine.∂ In a sign of an escalation in the problem, Europol today
set up a Europe-wide police unit begins work today to tackle the tide of ISIS propaganda online being
used to radicalise and recruit extremists around the world.∂ Officers say they aim to have new accounts
on Twitter, Facebook and other social media sites closed down within two hours to protect the 'the
safety and liberty of the internet'. ∂ It follows the revelation that Tunisian gunman Seifeddine Rezgui,
who killed 38 tourists including up to 30 Britons, posted increasingly extreme messages on Facebook
after becoming radicalised.∂ A Home Office spokesman said today: 'This Government takes seriously the
threat from online terrorist and extremist propaganda, which can directly influence people who are
vulnerable to radicalisation.∂ 'We are working with the internet industry to remove terrorist material
hosted in the UK or overseas and since 2010 we have successfully removed more than 95,000 pieces of
terrorist-related content.∂ 'Building on this, the UK worked with Europol and other EU Member States to
establish the new EU Internet Referral Unit, which will be able to remove a wider range of sources and
in a wider range of languages.∂ 'We also support the work of civil society groups to challenge those who
promote extremist ideologies online, and we are working on projects in local areas that increase the
awareness, confidence and capability of parents and teaching staff by building an understanding of how
the internet is used to radicalise young people.'∂ Social media companies have come under increased
pressure from the UK government to take 'stronger, faster and further action' to stop ISIS and other
terror groups from recruiting fighters and spreading propaganda online.∂ Police and intelligence agencies
claim their ability to track the work of extremists is hampered by web firms protecting users' privacy.
Memes Solve
Government trolling solves ISIS – memes are key
Branstetter 2/3 – writer for The Daily Dot
Ben Branstetter, 2/3/2015, The Daily Dot, “To fight ISIS, government spies are trolling you on the
Internet”, http://www.dailydot.com/opinion/government-agents-online-trolling/, 7/17/2015, \\BD
Once again, it’s time to admit the conspiracy theorists were right: Government agents are distributing
misinformation online as a massive propaganda campaign. ∂ While much has been made of the social
media campaigns of ISIS and other nefarious groups, it’s also becoming more clear how much
governments—both Western and not—are spreading their message online. The Israeli Defense Force
has long had an active online propaganda campaign, even offering scholarships to college students for
circulating pro-IDF messages online. The Daily Dot’s own James Neimeister explored how Russian
operatives spread rumors to the press through Twitter to assist pro-Russian rebels in the fight against
Ukraine.∂ Just this week, Great Britain unveiled their own troop of "Facebook warriors" for the
information age. The 77th Brigade—so named after a legendary and controversial group of BritishBurmese guerrilla fighters—will practice "non-lethal warfare" by creating "dynamic narratives" on social
media. In short, these 1,500 British troops will be scouring Facebook and Twitter to promote proWestern narratives to combat the storyline ISIS uses to recruit young people across the planet.∂ If you
aren’t a government agent or a terrorist operative, however, this still affects your life. The Internet, for
all of its ability to bring the world’s libraries to your fingertips, is also a hotbed of misinformation, deceit,
and plain old lies. While such campaigns have been waged by corporations, special interest groups, and
trolling pranksters, this evolution of world governments participating—especially clandestinely—
deserves the attention of even the most discerning consumer.∂ On many levels, this British force is a
necessary part of combatting groups like ISIS or the misinformation campaigns of Putin’s Russia. ISIS has
created one of the most effective recruiting campaigns of any terrorist group in history, convincing
thousands of Westerners to join their fight in Syria. Such a nefarious use of social media needs the truth
to combat against it, such as this French campaign that promises future ISIS fighters "you will discover
Hell on Earth and die alone and far from home."
Memes are the only effective method to stop ISIS
RT 5/8 – Russian Times
Russian Times, 5/8/2015, Russian Times, “Meme's the word: US lawmakers want to 'blow ISIS out of the
water' with...the internet”, http://www.rt.com/usa/256717-senators-isis-recruitment-internet-memes/,
7/17/2015, \\BD
While the US is fighting ISIS intensively on the ground, some lawmakers also want Washington to take
the battle online. One even proposed using internet memes, noting that the terrorist group has
successfully used them to further its mission.∂ During a 'Jihad 2.0' hearing on social media and terrorism,
the Senate Homeland Securities and Government Affairs Committee discovered that the Islamic State
(IS, formerly ISIS/ISIL) has managed to attract the interest of 62 people in the US through social media.∂
The interested online parties either tried to join IS (some successfully) or supported others in doing so.
Of the 62 people, 53 were very active on social media, downloading jihadist propaganda. Some of them
directly communicated with IS.∂ But Sen. Ron Johnson (R-Wisc.) had just the answer to the problem –
and it didn't involve deadly weapons or military troops.∂ “Let’s face it: We invented the Internet. We
invented the social network sites. We’ve got Hollywood. We’ve got the capabilities…to blow these guys
out of the water from the standpoint of communications,” he said.∂ He was supported by Sen. Cory
Booker (D-N.J.), who had an unconventional trick up his sleeve: internet memes. “Look at their fancy
memes compared to what we’re not doing,” Booker said while clutching print-outs of ISIS memes.∂ He
said the Islamic State is busying making “slick, fancy and attractive” videos, while the US is spending
“millions and millions on old school forms of media.”∂ A prolific user of Twitter, Booker said he knows
“something about memes.” He became a viral sensation himself after rescuing his neighbor from a
burning building in 2012.∂ The heroic move inspired his own Twitter hashtag, with social media users
sharing their own (false) superhero encounters with Booker. One user tweeted that when he needed a
kidney, Booker “instantly ripped out his own, handed it to me & flew away.”∂ The hearing, titled 'Jihad
2.0: Social Media in the Next Evolution of Terrorist Recruitment,' is part of an ongoing attempt by
Congress to identify ways to thwart efforts by overseas terrorists to lure foreign fighters or incite
jihadists to commit attacks inside the US.
Literally, government meming solves
Donoughue 3/12 – witer for ABC News
Paul Donoughue, 3/12/2015, ABC News, “Twitter wars: How the US is fighting Islamic State propaganda
through internet memes”, http://www.abc.net.au/news/2015-03-12/state-department-counterradicalisation-twitter/6290436, 7/18/2015, \\BD
The Islamic State group's widespread use of social media to recruit fighters is well publicised, and this
week prompted a Sydney Muslim community leader to call for Australia to immediately launch a social
media campaign to halt the grooming of jihadists. But what might such a campaign look like?∂ The US
State Department already runs three Twitter accounts - @DOTArabic, @DSDOTAR, and
@DigitalOutreach - that fire off dozens of tweets a day in Arabic and often directly reply to people who
espouse radical views.∂ The aim, it says, is to "counter terrorist propaganda and misinformation about
the United States across a wide variety of interactive digital environments that had previously been
ceded to extremists".∂ Many of the tweets poke fun at IS beliefs and use images that resemble internet
memes to target the group's hypocrisy. Here are 12 such memes, with translations into English.
Epist Indict
Be skeptical – overestimating the threat legitimizes jihadists
Gander 7/7 – writer for The Independent
Kashmira Gander, 7/7/2015, The Independent, “Isis: Threat posed by extremist group should not be
amplified, urges Australian politician Malcolm Turnball”,
http://www.independent.co.uk/news/world/politics/isis-threat-posed-by-extremist-group-should-notbe-amplified-urges-australian-politician-malcolm-turnball-10373544.html, 7/18/2015, \\BD
Politicians must be careful not to over-hype the threat that Isis poses, so as not to legitimise the
“delusions” held by jihadists, an Australian politician has urged.∂ Communications minister Malcolm
Turnbull has called for the debate on terrorism to remain calm, civil and proportional.∂ His comments
come after Prime Minister Tony Abbott warned the country that Isis is “coming after us”, Australia’s ABC
reported. ∂ In a speech to the Sydney Institute, Turnbull urged Australia to avoid inadvertently aiding Isis
by making them appear more dangerous than they are, or else risk becoming “amplifiers of their
wickedness and significance”, The Guardian.∂ He told the audience that while the security threat Isis
poses should not be underestimated, politicians must maintain a sense of perspective.∂ “We should be
careful not to say or do things which can be seen to add credibility to those delusions,” he said, arguing
that Isis’ leaders “dream” of sweeping across the Middle East and into Europe like medieval Arab armies.
ISIS Impact D
ISIS not a threat – comparative evidence citing the Air Force General
Klimas 7/14 – writer for The Washington Post, citing the Air Force General
Jacqueline Klimas, 7/14/2015, The Washington Post, “Islamic State no threat to U.S. homeland: Air Force
general”, http://www.washingtontimes.com/news/2015/jul/14/isis-no-threat-us-homeland-air-forcegeneral-says/, 7/18/2015, \\BD
Air Force Gen. Paul Selva on Tuesday ranked the Islamic State the least-threatening group to the U.S,
saying that the terrorists do not pose a threat to the homeland.∂ At a Senate Armed Services Committee
hearing on his nomination to be the vice chairman of the joint chiefs of staff, Sen. John McCain, Arizona
Republican, asked Gen. Selva to rank the threats the U.S. is facing today.∂ “I would put the threats to this
nation in the following order: Russia, China, Iran, North Korea, and all of the organizations that have
grown around ideology that was articulated by al Qaeda,” he said, mirroring the list gave by Marine
Corps Gen. Joseph Dunford last week in his nomination to be chairman of the joint chiefs of staff.∂ Gen.
Selva, pressed by Mr. McCain on why he would put terrorists groups such as the Islamic State last, said
that the group does not threaten Americans or its allies at home.∂ “Right now [the Islamic State] does
not present a clear and presence threat to our homeland and to our nation,” he said. “It is a threat we
must deal with … but it does not threaten us at home.”
AT ISIS Bioweapons
ISIS Ebola threat is all hype
Evans 14 – writer for Slate
Nicholas G. Evans, 10/10/2014, Slate, “Ebola Is Not a Weapon”,
http://www.slate.com/articles/health_and_science/science/2014/10/ebola_and_bioterrorism_the_viru
s_is_not_a_bioweapon_despite_media_myths.html, 7/18/2015, \\BD
Stop it. Just stop it. Ebola isn’t a potential weapon for terrorists.∂ It isn’t, as reported by Forbes and the
Daily Mail, a low-tech weapon of bioterror for ISIS. It isn’t the final refuge of a lone wolf on a suicide
mission, in the words of Fox News. It isn’t a U.S.-built race-targeting bioweapon, as the leader of the
Nation of Islam declared.∂ Ebola is very real, and very scary. But this outbreak isn’t a recipe for a
bioweapon. Not unless you want to be the most incompetent bioterrorist in history.∂ First, the virus isn’t
a viable bioweapon candidate. It doesn’t spread quickly—its R0, a measure of how infectious a virus is, is
about 2. That means that, in a population where everyone is at risk, each infected person will, on
average, infect two more people. But because someone with Ebola is infectious only when she shows
symptoms, we’ve got plenty of chances to clamp down on an outbreak in a country with a developed
public health system.∂ And unlike some bioweapons, such as anthrax, Ebola’s transmission mechanism
makes it really hard to weaponize. Anthrax spores can be dried and milled so they form little particles
that can float on the air and be inhaled. Ebola requires the transmission of bodily fluids, and those don’t
make efficient or stealthy weapons.∂ (And no—even though you may have heard this—Ebola is not
“airborne.” The one study everyone talks about showed that pigs could transmit Ebola to macaques
through an unknown mechanism that may have involved respiratory droplets. The researchers noted,
however, that they couldn’t get macaques to transmit it to each other. The take-home from the study is
really that pigs can spread Ebola.)∂ This alone pretty much rules it out as a bioweapon. A terrorist
organization would have to go door to door with bags of blood and vomit to infect even a handful of
people—and you’d probably notice it.∂ What about “suicide sneezers,” you may ask? Someone who
deliberately infects herself with Ebola and then proceeds to pass it on to others?∂ That’s a losing game
for the terrorist. Someone with Ebola isn’t infectious until she has symptoms, and even then, there is
often only a small window for action before the disease takes hold. Many people who contract Ebola do
so while caring for someone who is crippled by the affliction. A terrorist who wants to infect others isn’t
likely to be functional enough to run around spreading the disease for very long—and even then, will
find it hard to transmit the virus.∂ As for conspiracies about engineered Ebola, we know the virus
appeared in 1976. The 1970s was also a time when genetic engineering was in its infancy—no one
could’ve engineered a virus, even if he’d wanted to. Short of a time-traveling bioterrorist, that particular
theory isn’t tenable.∂ What about now, though? Could a bioterrorist group—or, more likely, a secret
national bioweapons program, like the one run by the Soviet Union during the Cold War—take Ebola
and modify it to be airborne or more contagious? It isn’t likely. Why? One, because it is really difficult—
we just don’t know enough about viruses to spontaneously engineer new traits. There is also a whole
host of other nasty bugs that are already better designed to be weapons. Bugs like smallpox. If terrorists
are going to go to all the trouble of engineering a bioweapon, they are likely to pick a much, much better
starting point than Ebola.∂ Finally, even if one of these unlikely scenarios came to pass, what enemy is
going to be able to claim to have weaponized Ebola and have anyone believe them? ISIS and other
militant groups rely on carefully managed reputations to achieve their goals. Executions and explosions
work for terrorists because there is something to be gained in doing so: fear, and credit for causing fear.
There’s nothing to be gained in using a disease like Ebola during an outbreak because it is difficult prove
it was deliberate, and thus you can’t brag about it.∂ The fear that an emerging infectious disease could in
fact be a weapon is not new. In 1918, Lt. Col. Philip S. Doane voiced a suspicion that the pandemic
“Spanish flu” strain was in fact a germ weapon wielded by German forces. More recently, an Australian
professor of epidemiology argued that Middle Eastern respiratory syndrome could be a bioterror agent.
People love to craft theories that provide malevolent agency to disease outbreaks. Yet while
bioterrorism is possible—advances in technology are making that easier—for now, nature is almost
always the culprit.∂ Ebola isn’t a weapon; it’s the collision between humans and their environment. It’s
about the failure of public health in Guinea, Liberia, and Sierra Leone. And it’s a failure, on our parts, to
act and assist the people of these countries. That’s a failure of trust.∂ In developed countries, the biggest
threat is not the terrorist, but fear. That fear is causing lawmakers to campaign for stepping up
screening, even though it is unlikely to work—it is too hard to track people in air travel, and it isn’t
effective at detecting cases. That fear is causing politicians to claim that we should seal the border to
Mexico, or ban all flights out of West Africa.∂ That fear is a powerful weapon that can be used against us.
Terror leading us to make bad decisions is much more effective against rich, developed nations than
Ebola could be. If we want to beat the latter, we have to beat the former.∂ To beat Ebola, we have to
worry less about terrorists, and more about helping others.
Democracy
New Democracy ! Cards
Democracy decreases the likelihood of conflicts – assumes non-democracy wars
Desposato and Gartzke 4/4 – Associate Professor at UC San Diego in Political Science, Associate
Professor at UC San Diego in Political Science
Scott Desposato and Erik Gartzke, 4/4/2015, “How ‘Democratic’ is the Democratic Peace?”,
http://www.democracy.uci.edu/files/docs/conferences/suong.pdf, 7/20/2015, \\BD
Discussion∂ This study provides evidence of democracy’s pacifist effect among publics of all regime
types.∂ Not only are citizens of Brazil, a democracy, hesitant to go to war against another democracy,∂
but citizens of China, a non-democratic country, are also more reluctant to strike a democratic∂ country.
Our results imply that the reluctance to fight a democracy is more widespread∂ than many may have
thought. Put slightly differently, rather than possessing uniquely paci-∂ fistic publics, democracies appear
to benefit from a “halo effect,” in which citizens of other∂ countries are generally reluctant to initiate
military aggression against them.∂ Empirically, the effect of democracy is substantially and consistently
larger in Brazil than∂ in China; in most comparisons, the effect of democracy is twice as big in Brazil as in
China.∂ These patterns, while intriguing, are also not statistically significant. However, they suggest∂ a
critical next step. We now know that democracies enjoy a peace surplus of opinion both in∂ democracies
and in non-democracies—but are there systematic differences in the magnitude∂ of this affect across
countries? Future work involving larger data collection efforts will clarify∂ whether there are crossnational differences in affect toward democracies.∂ Our study has other limitations. Like other scholars
working in this area (Tomz and∂ Weeks, 2013b), we used an internet based survey drawn from a
commercial panel, not random∂ samples.12 Although Brazilian and Chinese respondents seem to share a
reluctance to∂ strike at a democratic target without UN approval, observed differences or nondifferences∂ may reflect different sampling frames instead of different or similar attitudes. The effect of∂
democracy is consistently smaller in China than Brazil by a small margin. A bigger sample∂ size may allow
us to propose an alternative hypothesis about the differing effect of regime∂ type in Brazil and China. At
present we cannot reject the null hypothesis of no difference∂ between Brazil and China.
Internet K2 Democracy Camp Cards
Data localization will end internet freedom – that’s key to freedom of expression
Hill 14 – Internet Policy at U.S. Department of Commerce (Jonah, “The Growth of Data Localization
Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business Leaders”, The Hague
Institute for Global Justice, Conference on the Future of Cyber Governance, 2014 , May 1, 2014,
SSRN)//TT
Free Expression and Internet Freedoms Are Not Well Served∂ Most troubling of all the potential harms of data
localization is its effect on free expression and Internet freedom. This is ironic, in that to many of its advocates, data localization is a remedy to the threat
posed by the NSA to free expression and Internet freedom. I suggest that the opposite is actually true, that the “remedy” only serves to make the danger greater. ∂ The Internet and other online media have
become indispensable tools for individuals to communicate globally, and have furthered individual
participation in the political process, increased transparency of governmental activities, and promoted
fundamental rights. Data localization, by centralizing control over digital infrastructure, can diminish this capacity in a number of ways. As was discussed
above, data localization as a local server or local data storage requirement can limit freedom by permitting countries more easily to
collect information on their citizens (through domestic surveillance). It allows a government more quickly and effectively
to shut down Internet services (usually via legal threats to local Internet service providers) that the government believes is abetting unwanted political opposition. 115∂ Data
localization mandates also can obstruct Internet freedom in other, indirect ways. Restricted routing, in particular, is problematic, because it is not technically possible
∂
as the existing Internet is designed or organized. Unlike the telephone network, the Internet operates under a model known as “best effort delivery,” where data is delivered to its destination in the most efficient manner possible,
without predetermined routes. For instance, data sent from the United States to Botswana will attempt to travel along the shortest and most direct route possible. However, if there is a bottleneck along the shortest route, a
packet may find a longer but more expeditious route. This is a core feature of the Internet that makes network congestion easy to navigate around. In order to restrict data routing to specific geographies as governments are
advocating, all Internet routers that are currently programmed to follow this “best effort” routing model would have to be reconfigured to prohibit data from one country from moving through the territory of “prohibited”
countries. Moreover, since Internet addresses are not always assigned according to a specific geography, the Internet’s addressing system currently would have to be dramatically altered as well. Thus, the Border Gateway Protocol
(one of the core Internet networking protocols), the Internet’s routing tables (the address books by which routers send data), and the process by which IP addresses are allocated, would all have to be modified. Such an undertaking
would require a fundamental overhaul not only of the Internet’s operating structures, but also of the governance structures by which those structures are implemented and standardized.∂ These are not just arcane concerns of
These alterations in the way the Internet works will, I
believe, materially restrict the power of the Internet to support free expression. These modifications to these core characteristic of the current Internet –
modifications that localization would require – may result in intelligence agencies acquiring a previously unavailable capacity to assess where data had originated and
where it was heading, because the origin and destination information would be included in the data packet.116 A centralized governance process, further, which would be required to
change the routing protocols and IP allocation system, would give authoritarian countries significantly more influence over how information
on the Internet is regulated. In fact, this is one of the main reasons why China, Russia, many Arab states (among
others) have pushed for tracked routing protocols in the past, 117 just as they have lobbied for a handover of
the global Internet governance system to the U.N.’s International Telecommunications Union. 118∂ In short,
localization would require dramatic changes to the current structure of the Internet, changes that would have adverse consequences for those who see
it as a principal – if not the principal – means of global democratization. For some, those adverse consequences would be unintended; more chillingly, there are those who intend
precisely those consequences. This would be an enormous price to pay, particularly since the other objectives that are promoted as justifications for localization – namely, security
those involved in Internet governance, although they surely are matters that greatly trouble those who favor an efficient and interoperable Internet.
for communications and economic development – are illusory.∂
Other countries will use US Internet surveillance as an excuse to oppress their citizens
Solash ’13- contributor to SG News, (Richard S., “US Internet surveillance could backfire,”
http://sgnews.ca/2013/07/22/us-internet-surveillance-could-backfire/0-) VD
The University of Toronto's Deibert says the NSA affair could also lead to renewed calls for an international agreement on
cyberspace governance — calls that Internet freedom advocates and Western governments have found problematic in the
past.¶ He recalls a "code of conduct" for cyberspace proposed by China, Russia, Tajikistan, and Uzbekistan at the UN General
Assembly in 2011 that favored state controls.¶ "The proposals that were made by Russia and other countries at
the UN were more or less fumbles politically and were scuttled for that reason," Deibert says. "But in
the wake of the NSA revelation, I am sure those types of proposals will be resurrected and find much
greater traction among a wide range of swing countries which no doubt are now looking with a great deal
of skepticism towards the United States-led Internet freedom agenda." Some have also expressed concern that
the US government's explanation for its surveillance program — legitimate or not — could be manipulated by
repressive governments: Washington has defended the program as a legally authorized method of helping to guard the
country against terrorist attacks. Countries ranging from China to Belarus to Uzbekistan have previously
rationalized pervasive online censorship under the banner of national security. ¶ Rebecca MacKinnon, an
expert on internet freedom at the New America Foundation in Washington, says the United States can still work against the
misuse of the NSA revelations by foreign governments.¶ Implementing reforms and ensuring accountability is the way to do so,
she says.¶ "The United States needs to absolutely bring its system of surveillance and national security into line with
constitutional checks and balances and if it fails to do so, I think then rest of the world will use our failure to do so as an excuse
to be unaccountable themselves," MacKinnon says. "Unless and until we begin to lead by example, unfortunately,
things are not going to be pretty."
*Internet freedom facilitates democratic transitions—extensive scholarship proves
Nisbet 12
et al 12 – PhD in communication, assistant professor at the School of Communication at The Ohio State University, research on public
diplomacy, foreign policy, comparative democratization, and communication (Erik, “Internet Use and Democratic Demands: A Multinational,
Multilevel Model of Internet Use and Citizen Attitudes About Democracy”, Journal of Communication, April 2012,
http://onlinelibrary.wiley.com/doi/10.1111/j.1460-2466.2012.01627.x/epdf)//DBI
Moving from institutions to citizens, an
open question is whether greater Internet penetration and use influence
individual attitudes about democracy? Though not empirically tested, Howard (2009) answers this question in the affirmative,
theorizing that Internet use plays an important role in shaping and mobilizing citizen attitudes about
democracy in transitioning or emerging democracies. Howard asserts that traditional media in nondemocratic
states ‘‘constrains’’ public opinion to those of ruling elites, creating a passive public incapable of
challenging autocratic institutions and power-relations. Leslie (2002) and Howard view the Internet as distinct
from the one-way communication of radio, television, and print media that provide information to an audience, but are incapable
of soliciting immediate feedback. The Internet is lauded as having great democratic potential because it does allow
for feedback and encourages the development of ‘‘participant’’ citizens, as described by Almond and Verba (1963).
Rather than acting as passive receptors of political information, participant citizens are more sophisticated and engage
with political information provided to them and subsequently respond or make ‘‘demands’’ from it (Almond &
Verba, 1963). For example, as Lei (2011) observes in the case of China, the ‘‘Internet has contributed to a more critical and politicized citizenry’’
with ‘‘citizens no longer merely compliant receivers of official discourse’’ (p. 311). In this sense, Howard sees the potential of the Internet,
especially when paired with organizations such as political parties or movements, to promote
the formation of ‘‘mass’’ public
opinion that demands political change within authoritarian or democratizing states.∂ Other scholars also
embrace the Internet’s capacity to promote political change by serving as a pluralistic media platform
(Bratton et al., 2005; Groshek, 2009; Lei, 2011). Bratton and colleagues (2005) argue that media use in transitioning or emerging
democracies ‘‘expands the range of considerations that people bear in forming their political and
economic attitudes,’’ which promotes democratic citizenship and greater demand for democratic
processes and reform (Bratton et al., 2005, p. 209). Media that enjoys low government regulation and high
plurality of content have ‘‘the greatest impact in inducing an audience to reject authoritarian rule,
especially one- party rule,’’ compared to other forms of media use (p. 210). In this context, Groshek (2009) draws upon media dependency
theory (Ball-Rokeach & DeFleur, 1976) to argue that Internet
use influences the democratic orientations of
audiences—which in turn promotes (democratic) change in sociopolitical systems in which audiences are embedded.
Internet penetration, in other words, allows citizens to access more pluralistic content that increases citizen
demand for democracy. Increased demand promotes ‘‘bottom-up’’ democratization by increasing the
likelihood of democratic transitions in nondemocratic states or strengthening democratic institutions in
young democracies. Lei (2011) asserts this bottom-up democratization has emerged in China, with ‘‘netizens’’ constituting ‘‘an
important social force that imposes much pressure on the authoritarian state’’ (p. 311). Moreover, this theoretical perspective is
consistent with scholarship examining the role of citizen attitudes in processes of democratization
(Inglehart & Welzel, 2005; Mattes & Bratton, 2007; Welzel, 2007).
The Internet is vital to the emergence of global publics – that’s key to democracy
Keane 11 – Professor of Politics at the University of Sydney (John, “Democracy in the Age of Google,
Facebook and WikiLeaks” http://sydney.edu.au/arts/downloads/news/ALR.pdf)
Communicative abundance enables one other trend that is of life-and-death importance to the future of
democracy: the growth of cross-border publics whose footprint is potentially or actually global in scope.∂ The Canadian Scholar
∂
Harold Innis famously showed that communications media like the wheel and the printing press and the telegraph had distance-shrinking effects, but genuinely globalised communication only began (during the nineteenth century)
with overland and underwater telegraphy and the early development of international news agencies like Reuters. The process is currently undergoing an evolutionary jump, thanks to the development of a combination of forces:
weblogs and other specialist computer-networked media, the growth of global
journalism and the expanding and merging flows of international news, electronic data exchange, entertainment and education materials controlled by giant firms like Thorn-EMI,
AOL/Time-Warner, News Corporation International, the BBC, Al Jazeera, Disney, Bertelsmann, Microsoft, Sony and CNN.∂ Global media linkages certainly have downsides
for democracy. Global media integration has encouraged loose talk of the abolition of barriers to communication (John Perry Barlow). It is said to be synonymous with the rise of a ‘McWorld’ (Benjamin Barber)
wide-footprint geo-stationary satellites,
dominated by consumers who dance to the music of logos, advertising slogans, sponsorship, trademarks and jingles. In the most media-saturated societies, such as the United States, global media integration nurtures pockets of
parochialism; citizens who read local ‘content engine’ newspapers like The Desert Sun in Palm Springs or Cheyenne's Wyoming Tribune-Eagle are fed a starvation diet of global stories, which typically occupy no more than about 2%
of column space. And not to be overlooked is the way governments distort global information flows. Protected by what in Washington are called ‘flack packs’ and dissimulation experts, governments cultivate links with trusted or
these fickle countertrends are sobering, but they are not the whole story. For in the age of communicative abundance there
are signs that the spell of parochialism upon citizens is not absolute because global media integration is
having an unanticipated political effect: by nurturing a world stage or theatrum mundi, global journalism and other
acts of communication are slowly but surely cultivating public spheres in which many millions of people scattered
across the earth witness mediated controversies about who gets what, when, and how, on a world
scale.∂ Not all global media events - sporting fixtures, blockbuster movies, media awards, for instance - sustain global publics, which is to say that audiences are not publics and public spheres are not simply domains of
‘embedded’ journalists, organise press briefings and advertising campaigns, so framing - and wilfully distorting and censoring - global events to suit current government policies.∂ All
entertainment or play. Strictly speaking, global publics are scenes of the political. Within global publics, people at various points on the earth witness the powers of governmental and non-governmental organisations being publicly
named, monitored, praised, challenged, and condemned, in defiance of the old tyrannies of time and space and publicly unaccountable power. It is true that global publics are neither strongly institutionalised nor effectively linked
to mechanisms of representative government. This lack is a great challenge for democratic thinking and democratic politics. Global publics are voices without a coherent body politic; it is as if they try to show the world that it
resembles a chrysalis capable of hatching the butterfly of cross-border democracy - despite the fact that we currently have no good account of what ‘regional’ or ‘global’ or ‘cross border’ democratic representation might mean in
global publics have marked political effects, for instance on the suit-and-tie worlds of diplomacy, global
business, inter-governmental meetings and independent non-governmental organizations. Every great
global issue since 1945 - human rights, the dangers of nuclear war, continuing discrimination against
women, the greening of politics - every one of these issues first crystallised within these publics. Global publics sometimes have ‘meta-political’
practice.∂ Still, in spite of everything,
effects, in the sense that they help create citizens of a new global order. The speech addressed to ‘global citizens’ by Barack Obama at the Siegessaule in the Tiergarten in July 2008 is a powerful case in point, a harbinger of a
remarkable trend in which those who are caught up within global publics learn that the boundaries between native and foreigner are blurred. They consequently become footloose. They live here and there; they discover the
‘foreigner’ within themselves.∂ Global publics centred on ground-breaking media events like Live-Aid (in 1985 it attracted an estimated one billion viewers) can be spaces of fun, in which millions taste something of the joy of acting
publicly with and against others for some defined common purpose. When by contrast they come in the form of televised world news of the suffering of distant strangers, global publics highlight cruelty; they make possible what
Hannah Arendt once called the ‘politics of pity’. And especially during dramatic media events - like the nuclear meltdown at Chernobyl, the Tiananmen massacre, the 1989 revolutions in central-eastern Europe, the overthrow and
arrest of Slobodan Milosevic, the 9/11 terrorist attacks and the recent struggles for dignity in Tunisia and Egypt - public spheres intensify audiences’ shared sense of living their lives contingently, on a knife edge, in the subjunctive
The witnesses of such events (contrary to McLuhan) do not experience uninterrupted togetherness. They do not enter a ‘global village’ dressed in the skins of humankind and thinking in
the terms of a primordial ‘village or tribal outlook’. They instead come to feel the pinch of the world’s power relations; in consequence,
they put matters like representation, accountability and legitimacy on the global political agenda, in
effect by asking whether new democratic measures could inch our little blue and white planet towards greater
openness and humility, potentially to the point where power, wherever it is exercised within and across
borders, would come to feel more ‘biodegradable’, a bit more responsive to those whose lives it
currently shapes and reshapes, secures or wrecks.
tense.∂
Data localization leads to authoritarian information control – collapses democracy
Chandler and Le 15 – Professor of Law, B.A. from UC Davis, J.D. from Harvard; B.A. fom Yale, J.D.
from US Davis
- * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California,
Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale
College; J.D., University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J. 677, lexis)
E. Freedom∂ Information control is central to the survival of authoritarian regimes. Such regimes require the
suppression of adverse information in order to maintain their semblance of authority. This is because "even authoritarian governments allege a
public mandate to govern and assert that the government is acting in the best interests of the people." n280 Information that disturbs the claim
of a popular mandate and a beneficent government is thus to be eliminated at all costs. Opposition newspapers or television is routinely
targeted, with licenses revoked or printing presses confiscated. The
Internet has made this process of information control
far more difficult by giving many dissidents the ability to use services based outside the country to share
information. The Internet has made it harder, though not impossible, for authoritarian regimes to suppress their citizens from both sharing
and learning information. n281 Data localization will erode that liberty-enhancing feature of the Internet.∂ The end result of data
localization is to bring information increasingly under the control of the local authorities, regardless of
whether that was originally intended. The dangers inherent in this are plain. Take the following cases. The official motivation for the Iranian
Internet, as set forth by Iran's [*736] head of economic affairs Ali Aghamohammadi, was to create an Internet that is "a genuinely halal
network, aimed at Muslims on an ethical and moral level," which is also safe from cyberattacks (like Stuxnet) and dangers posed by using
foreign networks. n282 However, human rights activists believe that "based on [the country's] track record, obscenity is just a mask to cover
the government's real desire: to stifle dissent and prevent international communication." n283 An Iranian journalist agreed, "this is a ploy by
the regime," which will "only allow[] [Iranians] to visit permitted websites." n284 More recently, even Iran's Culture Minister Ali Janati
acknowledged this underlying motivation: "We cannot restrict the advance of [such technology] under the pretext of protecting Islamic values."
n285∂ Well aware of this possibility, Internet companies have sought at times to place their servers outside the country in order to avoid the
information held therein being used to target dissidents. Consider one example: when it began offering services in Vietnam, Yahoo! made the
decision to use servers outside the country, perhaps to avoid becoming complicit in that country's surveillance regime. n286 This provides
important context for the new Vietnamese decree mandating local accessibility of data. While the head of the Ministry of Information's Online
Information Section defends Decree 72 as "misunderstood" and consistent with "human rights commitments," n287 the Committee to Protect
Journalists worries that this decree will require "both local and foreign companies that provide Internet services ... to reveal the identities of
users who violate numerous vague prohibitions against certain speech in Vietnamese law." n288 As Phil Robertson of Human Rights Watch
argues, "This is a law that has been established for selective persecution. This [*737] is a law that will be used against certain people who have
become a thorn in the side of the authorities in Hanoi." n289∂ Data localization efforts in liberal societies thus offer cover for more pernicious
efforts by authoritarian states. When Brazil's government proposed a data localization mandate, a civil society organization focused on cultural
policies compared the measure to the goals of China and Iran:∂ [SEE FIGURE IN ORIGNIAL]∂ Translated, this reads as follows: "Understand this:
storing data in-country is the Internet dream of China, Iran, and other totalitarian countries, but it is IMPOSSIBLE #MarcoCivil." n290∂ Thus,
perhaps the
most pernicious and long-lasting effect of data localization regulations is the template and
precedent they offer to continue and enlarge such controls. When liberal nations decry efforts to control
information by authoritarian regimes, the authoritarian states will cite our own efforts to bring data
within national control. If liberal states can cite security, privacy, law enforcement, and social economic
reasons to justify data controls, so can authoritarian states. Of course, the Snowden revelations of
widespread U.S. surveillance will themselves justify surveillance efforts by other states. For example, Russia has
begun to use NSA surveillance to justify increasing control over companies such as Facebook and Google. n291 Such rules have led critics to
worry about increasing surveillance powers of the Russian state. n292 Critics caution, "In the future, Russia may even succeed in splintering the
web, [*738] breaking off from the global Internet a Russian intranet that's easier for it to control." n293 Even though officials describe such
rules as being antiterrorist, others see a more sinister motive. The editor of Agentura.ru, Andrei Soldatov, believes that Zheleznyak's proposal is
motivated by the government's desire to control internal dissent. n294 Ivan Begtin, the director of the group Information Culture, echoes this,
arguing that Zheleznyak's surveillance power "will be yet another tool for controlling the Internet." n295 Begtin warns, "In fact, we are moving
very fast down the Chinese path." n296∂ Finally, creating a poor precedent for more authoritarian countries to emulate is not the only impact
on liberty of data localization by liberal states. Even liberal states have used surveillance to undermine the civil rights of their citizens and
residents. n297 The proposal for a German "Internetz" has drawn worries that national routing would require deep packet inspection, raising
fears of extensive surveillance. n298 The newspaper Frankfurter Allgemeine argues that not only would a state-sanctioned network provide "no
help against spying," it would lead to "a centralization of surveillance capabilities" for German spy agencies. n299 India's proposed localization
measures in combination with the various surveillance systems in play - including Aadhaar, CMS, National Intelligence Grid (Natgrid), and Netra
- have raised concerns for human rights, including freedom of expression. n300∂ [*739] In addition to concerns regarding human rights
violations based on surveillance and censorship, data localization measures also interfere with the freedom of expression - particular the
"freedom to seek, receive and impart information and ideas of all kinds, regardless of frontier[]." n301 Preventing citizens from using foreign
political forums because such use might cause personal data to be stored or processed abroad might interfere with an individuals' right to
knowledge. n302 Armed
with the ability to block information from going out and to filter the information
coming in, data location consolidates power in governments by making available an infrastructure for
surveillance and censorship.
That will collapse the global internet
Chandler and Le 15 – Professor of Law, B.A. from UC Davis, J.D. from Harvard; B.A. fom Yale, J.D.
from US Davis
- * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California,
Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale
College; J.D., University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J. 677, lexis)
The era of a global Internet may be passing. Governments across the world are putting up barriers to the
free flow of information across borders. Driven by concerns over privacy, security, surveillance, and law
enforcement, governments are erecting borders in cyberspace, breaking apart the World Wide Web. The first
generation of Internet border controls sought to keep information out of a country - from Nazi paraphernalia to copyright infringing material.
n1 The new generation of Internet border controls seeks not to keep information out but rather to keep data in. Where the first generation was
relatively narrow in the information excluded, the new generation seeks to keep all data about individuals within a country.∂ Efforts
to
keep data within national borders have gained traction in the wake of revelations of widespread
electronic spying by United States intelligence agencies. n2 Governments across the world, indignant at the recent disclosures,
have cited foreign surveillance as an argument to prevent data from leaving their borders, allegedly into foreign hands. n3 As the argument
[*680] goes, placing data in other nations jeopardizes the security and privacy of such information. We define "data localization" measures as
those that specifically encumber the transfer of data across national borders. These measures take a wide variety of forms - including rules
preventing information from being sent outside the country, rules requiring prior consent of the data subject before information is transmitted
across national borders, rules requiring copies of information to be stored domestically, and even a tax on the export of data. We argue here
that data
localization will backfire and that it in fact undermines privacy and security, while still leaving
data vulnerable to foreign surveillance. Even more importantly, data localization increases the ability of
governments to surveil and even oppress their own populations.∂ Imagine an Internet where data must stop at national
borders, examined to see whether it is allowed to leave the country and possibly taxed when it does. While this may sound fanciful, this is
precisely the impact of various measures undertaken or planned by many nations to curtail the flow of data outside their borders. Countries
around the world are in the process of creating Checkpoint Charlies - not just for highly secret national
security data but for ordinary data about citizens. The very nature of the World Wide Web is at stake. We
will show how countries across the world have implemented or have planned dramatic steps to curtail the flow of information outside their
borders. By creating national barriers to data, data localization measures break up the World Wide Web, which was designed to share
information across the globe. n4 The Internet is a global network based on a protocol for interconnecting computers without regard for
national borders. Information is routed across this network through decisions made autonomously and automatically at local routers, which
choose paths based largely on efficiency, unaware of political borders. n5 Thus, the services built on the Internet, from email to the World
[*681] Wide Web, pay little heed to national borders. Services such as cloud computing exemplify this, making the physical locations for the
storage and processing of their data largely invisible to users. Data
localization would dramatically alter this fundamental
architecture of the Internet.∂ Such a change poses a mortal threat to the new kind of international trade
made possible by the Internet - information services such as those supplied by Bangalore or Silicon Valley. n6 Barriers of distance or
immigration restrictions had long kept such services confined within national borders. But the new services of the Electronic Silk Road often
depend on processing information about the user, information that crosses borders from the user's country to the service provider's country.
Data localization would thus require the information service provider to build out a physical, local infrastructure in every jurisdiction in which it
operates, increasing costs and other burdens enormously for both providers and consumers and rendering many of such global services
impossible.∂ While others have observed some of the hazards of data localization, especially for American companies, n7 this Article offers
three major advances over earlier work in the area. First, while the earlier analyses have referred to a data localization measure in a country in
the most general of terms, our Article provides a detailed legal description of localization measures. Second, by examining a variety of key
countries around the world, the study allows us to see the forms in which data localization is emerging and the justifications offered for such
measures in both liberal and illiberal states. Third, the Article works to comprehensively refute the various arguments for data localization
offered around the world, showing that data localization measures are in fact likely to undermine security, privacy, economic development, and
innovation where adopted.∂ [*682] Our paper proceeds as follows. Part I describes the particular data localization measures in place or
proposed in different countries around the world, as well as in the European Union. Part II then discusses the justifications commonly offered
for these measures - such as avoiding foreign surveillance, enhancing security and privacy, promoting economic development, and facilitating
domestic law enforcement. We appraise these arguments, concluding that, in fact, such measures are likely to backfire on all fronts.
Data
localization will erode privacy and security without rendering information free of foreign surveillance,
while at the same time increasing the risks of domestic surveillance.
Mandatory data localization wrecks US internet company competitiveness and US
internet freedom – also threatens the functioning of the internet itself
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The
NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July,
https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/
Some analysts have questioned whether data localization and protection proposals are politically motivated and if they would actually enhance
privacy and security for ordinary individuals living in foreign countries,160 especially given the existence of similar laws in a number of countries
and Mutual Legal Assistance Treaties (MLATs) between nations that provide cross-border access to data stored for lawful investigations.161 Yet
there is no doubt that American
companies will pay a steep price if these policies move forward. Mandatory
data localization laws could lead to soaring costs for major Internet companies such as Google,
Facebook, and Twitter, who would be faced with the choice of investing in additional, duplicative
infrastructure and data centers in order to comply with new regulations or pulling their business out of
the market altogether.162 In testimony before Congress last November, for example, Google’s Director of Law Enforcement and
Information Security suggested that requirements being discussed in Brazil could be so onerous that they would
effectively bar Google from doing business in the country.163 The penalties that companies face for violating these new
rules are also significant. In some cases, unless U.S. policy changes, it may be virtually impossible for American
companies to avoid violating either domestic or foreign laws when operating overseas.164 The costs and legal
challenges could easily prevent firms from expanding in the first place or cause them to leave existing markets because they are no longer
profitable.165 ITIF’s Daniel Castro has suggested that data privacy rules and other restrictions could slow the growth of the U.S. technologyservices industry by as much as four percent.166∂ Data
localization proposals also threaten to undermine the
functioning of the Internet, which was built on protocols that send packets over the fastest and most
efficient route possible, regardless of physical location. If actually implemented, policies like those suggested by India and
Brazil would subvert those protocols by altering the way Internet traffic is routed in order to exert more national control over data.167 The
localization of Internet traffic may also have significant ancillary impacts on privacy and human rights by making it easier for countries to
engage in national surveillance, censorship, and persecution of online dissidents, particularly where countries have a history of violating human
rights and ignoring rule of law.168 “Ironically, data
localization policies will likely degrade – rather than improve –
data security for the countries considering them, making surveillance, protection from which is the
ostensible reason for localization, easier for domestic governments, if not foreign powers, to achieve,”
writes Jonah Force Hill.169 The rise in data localization and data protection proposals in response to NSA
surveillance threatens not only U.S. economic interests, but also Internet Freedom around the world.
The last tech bubble caused premiums to go sky high – natural bubbles ruin the
economy
Tabb 04 [Tabb, William K.. Economic Governance in the Age of Globalization. New York, NY, USA:
Columbia University Press, 2004. ProQuest eLibrary. Web. 19 July 2015.]//kmc
If war and terrorism are to frame the world’s prospects a number of costly consequences follow for
important sectors such as the travel industry, airlines and hotels, and more widely in such aspects as the cost of insurance coverage for
buildings, ships, and factories for which premiums jumped in a number of locations in the wake of military activity in the
Persian Gulf. Security concerns add to the cost of transporting goods and can have an impact on industries whose products are considered
strategic. William Archey, president of the American Electronics Association, fearing more restrictions on sales, spoke for the thousands of
companies he represented of the impact of export controls. Two
years after the high tech bubble had peaked, the sector
had lost over half a million jobs, and fear of a security state augured to make matters worse. Archey’s
members, he said, “are worried that politicians will take a short sighted approach to national security
that will not make us more secure but will harm our economy” (Foremski, 2003: 1). U.S.-based producers
were losing out to overseas competitors who were profiting from those restrictions. The group was also alarmed
at massive cutbacks to education from squeezed state budgets. “We need well-educated people; it is what feeds the high
tech sector,” he said adding that loss of a skilled workforce would push firms to go abroad. His was not
the only industry which expressed such concerns.
The tech bubble isn’t real – venture capital, demand
Harris 7/16 [Melissa, 2015. Hate to burst your bubble, but tech investment is healthy.
http://www.chicagotribune.com/business/columnists/ct-harris-tech-bubble-0717-biz-20150716column.html 7/19]//kmc
The tech bubble doesn't exist.∂ That's the point of a 53-slide presentation last month in which three partners from the Silicon Valley
venture capital firm Andreessen Horowitz supplied evidence that the tech market is nowhere near the mania levels of 1999 and 2000.∂
Andreessen Horowitz's data show that private and public funding for tech companies remains at about
40 percent of what it was in 1999. There's been no surge in venture capital fundraising. It's rising but still
below 2006 levels. And venture capital funding as a percentage of the gross domestic product created
by the sector is down by half since 1980.∂ There's also a real market for these businesses now. The
number of Internet users has increased from 738 million in 2000 to 3.2 billion in 2015, according to a
new report from the International Telecommunication Union. Venture funding per person online has
been flat since the bubble, while people are spending more on it.∂ Yes, the S&P 500 Information Technology Index is
approaching 1999 levels but this time, Andreessen Horowitz argues, profits are driving these returns with price-to-earnings multiples at early
1990s levels.∂ (A price-to-earnings ratio is the current price of a share of stock divided by its earnings per share. A large multiple can signal that
the market's perception of the company is inflated.)∂ "The price-to-earnings ratio of the tech component of the S&P is in fact lower than for the
index as a whole," Bloomberg reported.∂ Instead,
almost all of the returns are being had in private markets,
meaning without a company going public. In other words, you have to know someone or be a large
institutional investor to be able to buy equity in privately held companies like Uber even though its
estimated worth is some $40 billion.∂ Overall dollars raised by technology companies are being
dominated by such deals.∂ The good news is that mom-and-pops can't bet their retirement funds on Uber.
Censorship Bad -> Localization
Censorship creates inconsistencies within internet localization that spurs innovation
to bypass them.
Deibert, 15- (Ron Deibert is director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. He is the author of Black
Code: Surveillance, Privacy, and the Dark Side of the Internet (2013). He was a co-founder and principal investigator of the OpenNet Initiative
(2003–14).) “Cyberspace Under Siege” Journal of Democracy Volume 26, Number 3, July 2015, Project Muse, //droneofark
First-generation controls tend to be “defensive,” and involve erecting national cyberborders that limit citizens’ access to information from
abroad. The archetypal example is the Great Firewall of China, a system for filtering keywords and URLs to control what computer users within
the country can see on the Internet. Although few countries have matched the Great Firewall (Iran, Pakistan, Saudi Arabia, Bahrain, Yemen, and
Vietnam have come the closest), first-generation controls are common. Indeed, Internet filtering of one sort or another is now normal even in
democracies. Where
countries vary is in terms of the content targeted for blocking and the transparency of
filtering practices. Some countries, including Canada, the United Kingdom, and the United States, block
content [End Page 65] related to the sexual exploitation of children as well as content that infringes
copyrights. Other countries focus primarily on guarding religious sensitivities. Since September 2012, Pakistan has
been blocking all of YouTube over a video, titled “Innocence of Muslims,” that Pakistani authorities deem blasphemous.4 A growing
number of countries are blocking access to political and security-related content, especially content
posted by opposition and human-rights groups, insurgents, “extremists,” or “terrorists.” Those last two terms
are in quotation marks because in some places, such as the Gulf states, they are defined so broadly that content is blocked which in most other
countries would fall within the bounds of legitimate expression. National-level
Internet filtering is notoriously crude.
Errors and inconsistencies are common. One Citizen Lab study found that Blue Coat (a U.S. software widely used to automate
national filtering systems) mistakenly blocked hundreds of nonpornographic websites.5 Another Citizen Lab study found that Oman residents
were blocked from a Bollywood-related website not because it was banned in Oman, but because of upstream filtering in India, the passthrough country for a portion of Oman’s Internet traffic.6 In Indonesia, Internet-censorship rules are applied at the level of Internet Service
Providers (ISPs). The country has more than three-hundred of these; what you can see online has much to do with which one you use.7
As
censorship extends into social media and applications, inconsistencies bloom, as is famously the case in
China. In some countries, a user cannot see the filtering, which displays as a “network error.” Although
relatively easy to bypass and document,8 first-generation controls have won enough acceptance to have
opened the door to more expansive measures. Second-generation controls are best thought of as
deepening and extending information controls into society through laws, regulations, or requirements
that force the private sector to do the state’s bidding by policing privately owned and operated
networks according to the state’s demands. Second-generation controls can now be found in every region of the world, and
their number is growing. Turkey is passing new laws, on the pretext of protecting national security and fighting cybercrime, that will expand
wiretapping and other surveillance and detention powers while allowing the state to censor websites without a court order. Ethiopia charged
six bloggers from the Zone 9 group and three independent journalists with terrorism and treason after they covered political issues. Thailand is
considering new cybercrime laws that would grant authorities the right to access emails, telephone records, computers, and postal mail
without needing prior court approval. Under reimposed martial [End Page 66] law, Egypt has tightened regulations on demonstrations and
arrested prominent bloggers, including Arab Spring icon Alaa Abd El Fattah. Saudi blogger Raif Badawi is looking at ten years in jail and 950
remaining lashes (he received the first fifty lashes in January 2015) for criticizing Saudi clerics online. Tunisia passed broad reforms after the
Arab Spring, but even there a blogger has been arrested under an obscure older law for “defaming the military” and “insulting military
commanders” on Facebook. Between 2008 and March 2015 (when the Supreme Court struck it down), India had a law that banned “menacing”
or “offensive” social-media posts. In 2012, Renu Srinavasan of Mumbai found herself arrested merely for hitting the “like” button below a
friend’s Facebook post. In Singapore, blogger and LGBT activist Alex Au was fined in March 2015 for criticizing how a pair of court cases was
handled. Second-generation
controls also include various forms of “baked-in” surveillance, censorship, and
“backdoor” functionalities that governments, wielding their licensing authority, require manufacturers
and service providers to build into their products. Under new antiterrorism laws, Beijing recently announced that it would
require companies offering services in China to turn over encryption keys for state inspection and build into all systems backdoors open to
police and security agencies. Existing
regulations already require social-media companies to survey and censor
their own networks. Citizen Lab has documented that many chat applications popular in China come preconfigured with censorship and
surveillance capabilities.9 For many years, the Russian government has required telecommunications companies and ISPs to be “SORM-
compliant”—SORM is the Russian acronym for the surveillance system that directs copies of all electronic communications to local security
offices for archiving and inspection. In like fashion, India’s Central Monitoring System gives the government direct access to the country’s
telecommunications networks. Agents can listen in on broadband phone calls, SMS messages, and email traffic, while all call-data records are
archived and analyzed. In Indonesia, where BlackBerry smartphones remain popular, the government has repeatedly pressured Canada-based
BlackBerry Limited to comply with “lawful-access” demands, even threatening to ban the company’s services unless BlackBerry agreed to host
data on servers in the country. Similar demands have come from India, Saudi Arabia, and the United Arab Emirates. The company has even
agreed to bring Indian technicians to Canada for special surveillance training.10 Also
spreading are new laws that ban security
and anonymizing tools, including software that permits users to bypass first-generation blocks. Iran has
arrested those who distribute circumvention tools, and it has throttled Internet traffic to frustrate users trying to connect to popular
circumvention and anonymizer tools such as Psiphon and Tor. Belarus and Russia have both recently proposed making Tor and similar tools
illegal. China has banned virtual private networks (VPNs) nationwide—the [End Page 67] latest in a long line of such bans—despite the
difficulties that this causes for business. Pakistan has banned encryption since 2011, although its widespread use in financial and other
communications inside the country suggests that enforcement is lax. The United Arab Emirates has banned VPNs, and police there have
stressed that individuals caught using them may be charged with violating the country’s harsh cybercrime laws. Second-generation
controls include finer-grained registration and identification requirements that tie people to specific
accounts or devices, or even require citizens to obtain government permission before using the Internet.
Pakistan has outlawed the sale of prepaid SIM cards and demands that all citizens register their SIM cards using biometric identification
technology. The Thai military junta has extended such registration rules to cover free WiFi accounts as well. China has imposed real-name
registration policies on Internet and social-media accounts, and companies have dutifully deleted tens of thousands of accounts that could not
be authenticated. Chinese users must also commit to respect the seven “baselines,” including “laws and regulations, the Socialist system, the
national interest, citizens’ lawful rights and interests public order, morals, and the veracity of information.”11 By
expanding the reach
of laws and broad regulations, second-generation controls narrow the space left free for civil society,
and subject the once “wild frontier” of the Internet to growing regulation. While enforcement may be
uneven, in country after country these laws hang like dark clouds over civil society, creating a climate of
uncertainty and fear.
Aff solves Democracy
The aff is an example of providing greater accountability and HR reliance to solve back
for anti-democratic rhetoric—sill solves for democracy.
Deibert, 15- (Ron Deibert is director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. He is the author of Black
Code: Surveillance, Privacy, and the Dark Side of the Internet (2013). He was a co-founder and principal investigator of the OpenNet Initiative
(2003–14).) “Cyberspace Under Siege” Journal of Democracy Volume 26, Number 3, July 2015, Project Muse, //droneofark
Since June 2013, barely a month has gone by without new revelations concerning U.S. and allied spying—revelations that flow from the
disclosures made by former NSA contractor Edward Snowden. The disclosures fill in the picture of a remarkable effort to marshal extraordinary
capacities for information control across the entire spectrum of cyberspace. The Snowden revelations will continue to fuel an important public
debate about the proper balance to be struck between liberty and security. While
the value of Snowden’s disclosures in
helping to start a long-needed discussion is undeniable, the revelations have also had unintended [End
Page 74] consequences for resurgent authoritarianism and cyberspace. First, they have served to deflect
attention away from authoritarian-regime cyberespionage campaigns such as China’s. Before Snowden fled to
Hong Kong, U.S. diplomacy was taking an aggressive stand against cyberespionage. Individuals in the pay of the Chinese military and allegedly
linked to Chinese cyberespionage were finding themselves under indictment. Since Snowden, the pressure on China has eased. Beijing,
Moscow, and others have found it easy to complain loudly about a double standard supposedly favoring
the United States while they rationalize their own actions as “normal” great-power behavior and
congratulate themselves for correcting the imbalance that they say has beset cyberspace for too long.
Second, the disclosures have created an atmosphere of suspicion around Western governments’
intentions and raised questions about the legitimacy of the “Internet Freedom” agenda backed by the
United States and its allies. Since the Snowden disclosures—revealing top-secret exploitation and disruption programs that in some
respects are indistinguishable from those that Washington and its allies have routinely condemned—the rhetoric of the Internet
Freedom coalition has rung rather hollow. In February 2015, it even came out that British, Canadian, and
U.S. signals-intelligence agencies had been “piggybacking” on China-based cyberespionage campaigns—
stealing data from Chinese hackers who had not properly secured their own command-and-control
networks.28 Third, the disclosures have opened up foreign investment opportunities for IT companies
that used to run afoul of national-security concerns. Before Snowden, rumors of hidden “backdoors” in Chinese-made
technology such as Huawei routers put a damper on that company’s sales. Then it came out that the United States and allied governments had
been compelling (legally or otherwise) U.S.-based tech companies to do precisely what many had feared China was doing—namely, installing
secret backdoors. So now Western companies have a “Huawei” problem of their own, and Huawei no longer looks so bad. In
the longer
term, the Snowden disclosures may have the salutary effect of educating a large number of citizens
about mass surveillance. In the nearer term, however, the revelations have handed countries other than
the United States and its allies an opportunity for the self-interested promotion of local IT wares under
the convenient rhetorical guise of striking a blow for “technological sovereignty” and bypassing U.S.
information controls. There was a time when authoritarian regimes seemed like slow-footed, technologically challenged dinosaurs
whom the Information Age was sure to put on a path toward ultimate extinction. That time is no more—these regimes have proven themselves
surprisingly (and dismayingly) light-footed and adaptable.
National-level information controls are now deeply
entrenched and growing. Authoritarian regimes are becoming more active and assertive, sharing norms,
technologies, and “best” practices with one [End Page 75] another as they look to shape cyberspace in ways
that legitimize their national interests and domestic goals. Sadly, prospects for halting these trends
anytime soon look bleak. As resurgent authoritarianism in cyberspace increases, civil society will
struggle: A web of ever more fine-grained information controls tightens the grip of unaccountable elites.
Given the comprehensive range of information controls outlined here, and their interlocking sources deep within societies, economies, and
political systems, it
is clear that an equally comprehensive approach to the problem is required. Those who
seek to promote human rights and democracy through cyberspace will err gravely if they stick to highprofile “Internet Freedom” conferences or investments in “secure apps” and digital training. No amount
of rhetoric or technological development alone will solve a problem whose roots run this deep and cut
across the borders of so many regions and countries. What we need is a patient, multipronged, and well-grounded
approach across numerous spheres, with engagement in a variety of venues. Researchers, investigative journalists, and others must learn to
pay more attention to developments in regional security settings and obscure trade fairs. The
long-term goal should be to open
these venues to greater civil society participation and public accountability so that considerations of
human rights and privacy are at least raised, even if not immediately respected. The private sector now
gathers and retains staggering mountains of data about countless millions of people. It is no longer enough for
states to conduct themselves according to the principles of transparency, accountability, and oversight that democracy prizes; the companies
that own and operate cyberspace—and that often come under tremendous pressure from states—must do so as well.
Export controls
and “smart sanctions” that target rights-offending technologies without infringing on academic freedom
can play a role. A highly distributed, independent, and powerful system of cyberspace verification
should be built on a global scale that monitors for rights violations, dual-use technologies, targeted
malware attacks, and privacy breaches. A model for such a system might be found in traditional arms-control verification
regimes such as the one administered by the Organization for the Prohibition of Chemical Weapons. Or it might come from the research of
academic groups such as Citizen Lab, or the setup of national computer emergency-response teams (CERTs) once these are freed from their
current subordination to parochial national-security concerns.29 However
it is ultimately constituted, there needs to be a
system for monitoring cyberspace rights and freedoms that is globally distributed and independent of
governments and the private sector. Finally, we need models of cyberspace security that can show us
how to prevent disruptions or threats to life and property without sacrificing liberties and rights.
Internet-freedom advocates must reckon with [End Page 76] the realization that a free, open, and secure
cyberspace will materialize only within a framework of democratic oversight, public accountability,
transparent checks and balances, and the rule of law. For individuals living under authoritarianism’s heavy hand, achieving
such lofty goals must sound like a distant dream. Yet for those who reside in affluent countries, especially ones where these principles have lost
ground to antiterror measures and mass-surveillance programs, fighting for them should loom as an urgent priority and a practically achievable
first step on the road to remediation.
AT: Cloud computing Bad
Cloud Computing solves Warming
Green cloud computing solves the warming impact
Zhang et al. 11, (Yanwei, University of Tennessee-Knoxville, Master of Science, “
GreenWare: Greening Cloud-Scale Data Centers to Maximize the Use of Renewable
Energy”http://www2.ece.ohio-state.edu/~xwang/papers/middleware11.pdf)
In this paper, we propose GreenWare, a novel middleware system that conducts dynamic request
dispatching to maximize the percentage of renewable energy used to power a network of distributed
data centers, subject to the desired cost budgets of Internet service operators. We first model the
intermittent generation of renewable energy, i.e., wind power and solar power, with respect to the
varying weather conditions in the geographical location of each data center. For example, the available
wind power generated from wind turbines is modeled based on the ambient wind speed [35,9], while
the available solar power from solar plants is estimated by modeling the maximum power point on
irradiance (i.e., solar energy per unit area of the solar panel’s face) and temperature [31,41]. Based on
the models, we formulate the core objective of GreenWare as a constrained optimization problem, in
which the constraints capture the Quality of Service (QoS, e.g., response time) requirements from
customers, the intermittent availabilities of renewable energy in different locations, the peak power
limit of each data center, and the monthly cost budget of the Internet service operator. We then
transfer the optimization problem into a linear-fractional programming (LFP) formulation for an efficient
request dispatching solution with a polynomial time average complexity. Specifically, this paper makes
the following major contributions: – We propose a novel GreenWare middleware system in operating
geographically distributed cloud-scale data centers. GreenWare dynamically dispatches incoming service
requests among different data centers, based on the timevarying electricity prices and availabilities of
renewable energy in their geographical locations, to maximize the use of renewable energy, while
enforcing the monthly budget determined by the Internet service operator. – We explicitly model
renewable energy generation, i.e., wind turbines and solar panels, with respect to the varying weather
conditions in the geographical location of each data center. As a result, our solution can effectively
handle the intermittent supplies of renewable energy. – We formulate the core objective of GreenWare
as a constrained optimization problem and propose an efficient request dispatching solution based on
LFP. – We evaluate GreenWare with real-world weather, electricity price, and workload traces. Our
experimental results show that GreenWare can significantly reduce the dependence of cloud-scale data
centers on fossil-fuel-based energy without violating the desired cost budget, despite the intermittent
supplies of renewable energy and time-varying electricity prices and workloads.
Cloud Computing Solves Environment
Cloud computing is good for the environment – prefer actual studies with comparative
analysis to the squo rather than their uncontextual evidence
Matthews 13, (Richard, The Green Market Group President, Owner/President Small
Business Consulting, “How Environmentally Sustainable is Cloud Computing and
Storage?”, http://globalwarmingisreal.com/2013/09/12/sustainable-cloudcomputing/)
The case for the cloud being environmentally sustainable Many see the cloud as a key feature
of IT environmental sustainability. Cloud infrastructure addresses two critical elements of a green
IT approach: energy efficiency and resource efficiency. As explained by BSR, “Cloud services
make a positive contribution to sustainability: The cloud encourages important clean-tech
applications like smart grids and it also encourages consumers to use virtual services such as video
streaming to replace resource-heavy physical products. The cloud also draws resources to where
they are used most efficiently and its jobs tend to be cleaner and safer than those of more
traditional industries.” Saving energy, money, time, hardware and waste The cloud saves
energy and provides more efficient supplier management. Another of the cloud’s green attributes
take the form of “dematerializing” the economy which involves reducing the number of physical
materials. The cloud’s efficiency and scalability help reduce energy usage and trash. By reducing
the need for hardware, companies can reduce costs and eliminate the need for maintenance
and upgrades. The cloud offers cheaper running costs and more flexibility for businesses hoping to
expand. The cloud is ideal for businesses with time sensitive data, and it significantly reduces
computing time and expenses. The cloud also increases productivity through its ability to
accommodate online collaboration that reduces the need for face to face meetings. Many of the
firms interviewed by Verdantix reported cost savings as a primary motivator for adopting
the cloud, with anticipated cost reductions as high as 40 to 50 percent. According to a
report by the Carbon Disclosure Project (CDP) titled Cloud Computing: The IT Solution for
the 21st Century, cloud computing can save U.S. Companies $12 billion. A 2011 Pike Research
report titled “Cloud Computing Energy Efficiency,” said data center energy consumption will
drop by 31 percent from 2010 to 2020 due to the continued adoption of cloud computing and other
virtualized data options. The technological reason for these energy savings is that the cloud uses
energy in a more streamlined and efficient way than traditional, in-house data centers. Cloud
computing uses multi-tenant architecture and this tends to be more efficient than the
typical, single-tenant, statically-allocated data centers. Carbon reduction The cloud reduces
carbon emissions through minimized energy requirements. According to the CDP report,
offsite servers have the potential to prevent 85.7 million metric tons of annual carbon
emissions by 2020. Research carried out by Google suggested that businesses could save around
60-85 percent on their energy costs simply by switching to a cloud facility. The environmental
impact of these substantial reductions in energy are significant. One study surveying the
clients of Salesforce, a fast-growing cloud computing giant, suggested carbon reductions of
95 percent compared to companies with servers on their premises. “The Salesforce
community saved an estimated 170,900 tons of carbon in 2010—the equivalent of taking 37,000
cars off the road, or avoiding the consumption of 19.5 million gallons of gas.” said Marc Benioff,
Salesforce’s chairman and CEO. A 2010 study from Accenture, Microsoft and WSP
Environment and Energy reported a huge impact of the cloud on CO2 emissions. They
found out that businesses with systems and applications on the cloud could reduce peruser carbon footprint by 30 percent for large companies and 90 percent for small
businesses. Cloud providers are getting even more efficient with companies like Cheeky Munkey
further diminishing environmental impacts by using servers designed to use hardware as efficiently
as possible, driving down energy resource and also keeping costs low.
We will link turn this bad impact with our even worse advantage scenario (seriously is
advantage is a joke) – even if they win squo computing is bad innovations solve –
there’s only a risk we improve the market
Foster 11, (Pete, Pete Foster is a writer, researcher and consultant on sustainable
information and communications technologies, "Cloud computing – a green opportunity
or climate change risk?”, http://www.theguardian.com/sustainable-business/cloudcomputing-climate-change)
Cloud computing enables users to to share resources and carry out tasks remotely. Rather than using
your own local PCs or servers to do the work, you connect to a remote data centre, often provided by an
IT services or software company. It means more computing is migrating to purpose-built data centres.
From a low carbon perspective it's no bad thing. Data centres tend to be more energy efficient than
individual servers distributed around an organisation and, while there is still vast room for
improvement, many companies are working to make their computing facilities more energy efficient.
Software and IT services suppliers, for example, have been vying to be seen as the greenest provider –
apart from the PR value there is a great deal of money to be saved in greater energy efficiency. There is
also growing evidence of the extent of energy and emissions that can be saved from cloud computing. A
report from cleantech market intelligence firm Pike Research found that the adoption of cloud
computing will lead to a 38% reduction in worldwide data centre energy expenditure by 2020, compared
to what would otherwise be used. The Carbon Disclosure Project (CDP) reached a similar conclusion,
finding that large US companies that use cloud computing will be able to save $12.3bn in energy costs
and 85.7 million metric tons of CO2 emissions annually by 2020. The energy savings are equivalent to
200 million barrels of oil – enough to power 5.7 million cars for one year.
Download