HSS Freedom Act 1AC - Georgetown Debate Seminar 2015

advertisement
Opening Packet – HSS -2015 – 1AC
document - Freedom Act Aff
Constructing your 1AC
Opening notes to students
How to build a 1AC from this file
One of our major goals at camp is to teach many different aspects that pop-up in contemporary
surveillance debates.
At first, this can be daunting as this document has a lot of moving parts. But hopefully the first few
pages of this file will make it all a little less overwhelming.
Here are some tips:
First – start by choosing a plan text
There are ten options included. Some options are more strategic than others. We will discuss the
upsides and downsides of each in lab time.
When choosing a plan text, one big question you’ll want to consider is whether to have a “narrow” plan
text (tackling a small number of current surveillance practices) or a “broader” plan text (tackling several or all current
surveillance practices).
Second – read (only) one of the two “inherency and solvency” options
There’s one if your plan is broad… and another one if your plan is narrow. Most of the time, this will be
presented in the opening portion of the 1AC – before you read the advantages (but that’s up to you).
Third – Here’s list of the advantages in the packet.
No one will have time to read all of the advantages in an 8 minute 1AC, so you’ll need to pick and choose
your favorites. Some advantages have “longer” and “shorter” version to assist with time allocation.
Other advantages have different impact modules. At camp, consider mixing it up and reading different
advantages and modules in the various practice debates.
Conceptually, here is a good way to think about the 1AC advantage options:
 Quality of Life advantages
o Privacy advantage – longer version
o Privacy advantage – shorter version
o Bigotry advantage – longer version
o Bigotry advantage – shorter version
 The Journalism advantage – designed to give an nice angle if you think your opponent may
go for the Kritik.
 Advantages involving US image:
o India advantage – financial markets impact
o India advantage – cyber impact
o India advantage – Democracy impact
o Global Internet Advantage – economy impact
o Global Internet Advantage – democracy impact
Please note that a few of the cards in the India and Global Internet Advantages overlap. If you are
reading both of those advantages in the same 1AC, take a moment to double-check and confirm that
you are not reading the same piece of evidence more than once.
Glossary and Important Note
Note to students
The next page presents a glossary.
Glossaries are often important for topic familiarization – but especially so for this year’s topic. Here’s
why:
There are many different ways that the Aff could argue that current laws protecting against surveillance
are insufficient.
I will use the example of the USA FREEDOM Act. The Freedom Act became a Law very recently – it
passed on June 2nd, 2015. It was designed to enhance privacy protection against federal surveillance. In
order to pass the Congress, the Freedom Act went through many changes. Many privacy advocates
argue that the “new” Freedom Act fails – especially in relation to the original version of the bill.
In some instances, the author of an article will rattle off four or five different reasons that they feel the
current Freedom Act will not work. Then, in another article, a different author may rattle off a different
laundry list of five items where three items overlap with evidence you’ve already read – but two items
do not.
For debaters, this presents three concerns:
First – unnecessary duplication.
The Affirmative doesn’t want to read a 3rd card saying the Freedom Act fails “because it lacks sufficient
Pen Register protections”. Once will usually be enough.
Second – strategic consistency.
Affirmatives will want to avoid reading inherency cards that say “Freedom Act fails due to lack of Pen
Register protections” if the version of the Affirmative plan being read fails to change Pen Register
protections.
Third – confusion.
Honestly, there are so many laws and investigative tools about privacy that this can all turn into
acronym soup. A familiarized Affirmative might be able to digest it all – but it could be puzzling to an
unfamiliar judge or to a new novice on the team.
Organizationally, I cooked-up with the following solution:
For each piece of evidence in “Inherency Solvency” backline section, I use a set of acronyms in the F6
header (the “block header” – but not in the F7 tag).
Hopefully, this allows the student quickly differentiate between the different reasons why the Freedom
Act fails. But, it should also avoid situations where the student is verbally presenting five confusing
acronyms into the tag of a 2AC card.
In order to understand what each acronym means, I have placed a “Glossary” on the next page.
Glossary
If the F6 block header has one or more of the following acronyms, here is what it referencing:
The USA FREEDOM ACT – A recently passed bill that stands for "Uniting and Strengthening America by
Fulfilling Rights and Ending Eavesdropping, Dragnet-collection and Online Monitoring Act”. The Act
implemented many reforms – but most prominently it (arguably) ended the ability of federal intelligence
agencies to store certain phone data (“phone metadata” – see below). Instead, it required phone
companies, not government agencies, to hold on to that data. Federal intelligence agencies can search
the phone company records if they granted a warrant authorizing their request. The Affirmative in this
packet will argue that current Freedom Act is insufficient and that the original draft of the Freedom Act
provided better safeguards.
The PATRIOT ACT – Its official title is the USA PATRIOT Act – an acronym that stands for "Uniting and
Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act
of 2001". The Patriot Act is an act of Congress that was signed into law by President George W. Bush in
October of 2001. It is widely viewed as a reaction to the events of September 11th, 2001. The Patriot Act
does many, many things – but, on this topic, it is perhaps most relevant because it increased the
authority of intelligence agencies to engage in surveillance.
EO 12333 – This stands for “Executive Order” 12333. It was signed by President Ronald Reagan and
established broad new surveillance authorities for the intelligence community, outside the scope of
public law. It was amended three times by President George W. Bush. These cards will argue that the
Status Quo fails because EO 12333 creates a loophole permitting excessive surveillance.
FAA or “FAA-Section 702” – “FAA” stands for the “FISA Amendments Act of 2008”. This an acronym
within an acronym. So, a little backstory:
o
o
o
The F.I.S.A. is an acronym standing for The Foreign Intelligence Surveillance Act of 1978.
That act does many things – but is most apt to come-up because it created a separate
set of "secret courts" called the “FISC” (Foreign Intelligence Surveillance Courts). Its
hearings are closed to the public – but it handles many requests for surveillance
warrants from federal law enforcement and intelligence agencies.
The F.I.S.A. law itself passed in 1978 – but it has often been amended since then.
One reason that the FAA of 2008 comes up is Section 702 of the FAA. Section 702
authorizes PRISM (explained below). Section 702 is designed to gather intelligence on
foreign citizens, but is often accused of gathering intelligence on US citizens. Many
argue that because Section 702 is understood to permit gathering information “about” a
foreign person, it can be used to gather information regarding US persons.
Language – argues that the Status Quo fails because the language or definitions of current laws are not
strict enough. Here, the Affirmative would usually argue that when language has “wiggle room” federal
agencies will seek to gain as much intelligence a possible – often at the expense of privacy. The most
common example of insufficient language is “SST” – which is explained below.
Meta-data. Metadata is traditionally defined as “data about data.” Translation: The NSA probably isn’t
listening to your phone calls or reading your email. Instead, the metadata program givs intelligence
access to information about phone calls. That includes the phone numbers of both caller and recipient,
the number of any calling cards used, the time and duration of calls and the international mobile
subscriber identity (a unique identifier embedded in a phone SIM card) number. Email metadata
includes each message’s to, from, cc and timestamp information. It also includes the IP address each
email was sent from, which reveals where a computer is located. Status quo metadata programs do not
allow the Government to listen in on phone calls or read emails. The information acquired does not
include the content of any communications or the identity of any subscriber.
Minimization – argues that the Status Quo fails because so-called “super-minimization” procedures are
not in place. Super-minimization requires intelligence agencies to delete all information gathered on
persons that are subsequently determined to have not been relevant to the federal investigation at
hand. Absent these super-minimization protections, intelligence agencies could arguably retain that
information and use it in different investigations.
Multiple Authorities - argues that the Status Quo fails because of several different programs that
authorize surveillance. These cards are probably best run in conjunction with an Affirmative plan that
seeks to ban or eliminate many surveillance programs.
NSL’s - National Security Letters. These cards will argue that the Status Quo fails because the FBI
currently has the authority to issue NSL’s. These letters are served on communications service providers
(like phone or internet companies) by the FBI to compel provision of communication or Internet activity.
An NSL cannot demand the content of a call, but can compel provision of metadata. Recipients of NSLs
may be subject to a gag order that forbids them from revealing the letters' existence to the public. No
approval from a judge is required for the FBI to issue an NSL, but the recipient of the NSL can still
challenge the nondisclosure requirement in federal court.
Pen Register or Trap and Trace device - A device that decodes or records electronic information – like
outgoing numbers from a telephone. A “pen register” technically was a device that recorded data from
telegraph machines. But the term has survived and applies to modern communication. These cards will
argue that the Status Quo fails because the law provides insufficient protection against bulk collection of
data obtained from “Pen Register or Trap and Trace” devices.
PRISM – PRISM is a US surveillance program under which the National Security Agency (NSA) collects
Internet communications from at least nine major US Internet companies. PRISM requests for internet
data are authorized under Section 702 of the FISA Amendments Act of 2008 (see FAA or “FAA-Section
702” – above). The program is intended to identity foreign citizens – but the program is often accused of
inadvertently gathering intelligence on US citizens. According to The Washington Post, US intelligence
analysts search PRISM data using terms intended to identify targets whom the analysts suspect with at
least 51 percent confidence to not be U.S. citizen.
Signal Args – these cards speak to the image or perception of the law as seen by the US public or foreign
countries.
SST - “Specific Selector Terms”. These cards will argue that the Status Quo fails because the law allows
searches to be conducted with “broad selector terms” – like a zip code, an area code, or the IP address
of a web hosting service that hosts thousands of web sites. These broad searches stumble onto much
more data. Some privacy advocates want to demand an SST – which would require searches that are
much more narrow (i.e. an individual’s name).
***For summer camp students – I also want to talk about two more programs.
(please take notes here:)
1AC Inherency and Solvency Section
1AC Version if the plan is narrow
Contention One
Contention One – the Status Quo fails, and the Aff solves.
The Freedom Act recently became Law. This new Freedom Act won’t substantially
reduce bulk surveillance. Safeguards from the original Freedom Act are needed.
New York Times ‘15
(editorial board of New York Times – The Opinion Pages of New York Times – “More Excuses on the Patriot Act “ - May 1st http://www.nytimes.com/2015/05/02/opinion/more-excuses-on-the-patriot-act.html?smid=fb-share&_r=2)
Software designers
have a term — “minimal viable product” — to describe early versions of things like iPhone
apps that they can rush to market. The idea is to get something out and refine it as they go along. That’s the
argument being made for a measure in Congress that would modify the Patriot Act to make it somewhat harder
for the government to conduct mass surveillance of Americans without regard to whether they
committed any misdeeds. Sure, there are compromises, Americans are told, but we should not let the perfect be the enemy of the good. The bill is a
“critical first step toward reining in” surveillance by the National Security Agency and is a basis for more reform, said Human Rights Watch.
Constitution is not Candy Crush.
Except the
The same idea — let’s do what we can and improve it later — was used to shove the original Patriot
Act through Congress. It was used to justify the inadequate changes later made to the act, many of which made it more intrusive on Americans’ rights. In 2008, we
got a “reform” of the Foreign Intelligence Surveillance Act, or FISA, that provided retroactive cover for the illegal surveillance of innocent Americans conducted
under President George W. Bush behind the false flag of counterterrorism. The
new bill, the USA Freedom Act, was passed by the House Judiciary
contain useful changes to
Committee on Thursday in a 25-to-2 vote and sent to the floor for what seems like near-certain approval. It does
Section 215 of the Patriot Act, which was cynically misinterpreted by the Bush administration to cover the collection of millions of telephone records in the
United States and elsewhere. Section 215 will expire on June 1 if Congress does not act, but that is unlikely. The new bill would narrow the kinds of records,
including so-called metadata from phone calls, that the intelligence agencies can collect without bothering to obtain a warrant even from the obliging FISA court,
which virtually always grants one. It adds transparency measures related to government surveillance programs, and provides for more oversight of those programs.
But many of those provisions are weaker than in earlier versions of the bill , and weaker than they
need to be. The House committee rejected amendments designed to provide greater safeguards for civil liberties — including one from a Republican that
would have required the government to get a warrant before searching collected communications for information about Americans. The
bill does not
end the bulk collection of surveillance data under Section 215. Rather, it limits those
operations, which, in addition to eroding the Bill of Rights, have been shown to be worthless in protecting America. The American Civil Liberties Union
believes the
bill doesn’t sufficiently tighten the definition of the terms used to justify data
collection , or properly limit the retention of information about people who are not
suspected of wrongdoing, or require meaningful disclosure of so-called “backdoor” searches of databases by the Federal Bureau of
Investigation. It does not appoint an advocate to argue before the FISA court on behalf of civil liberties; instead, it simply appoints a panel of experts to advise the
court, where only the government is allowed to present a case, in secret.
The new Freedom Act fails. Pen register, super-minimization, and SST standards from
the original draft of the Freedom Act would solve.
Greene ‘15
(et al; David Greene, Senior Staff Attorney and Civil Liberties Director for the Electronic Frontier Foundation. David is also an
adjunct professor at the University of San Francisco School of Law, where he teaches classes in First Amendment and media law
and an instructor in the journalism department at San Francisco State University. David has significant experience litigating First
Amendment issues in state and federal trial and appellate courts and is one of the country's leading advocates for and
commentators on freedom of expression in the arts. “ACLU v. Clapper and the Congress: How The Second Circuit’s Decision
Affects the Legislative Landscape” - Electronic Frontier Foundation - May 11, 2015 https://www.eff.org/deeplinks/2015/05/aclu-v-clapper-and-congress-how-second-circuits-decision-affects-legislative)
The U.S. Court of Appeals for the Second Circuit in ACLU v. Clapper has determined that the NSA’s telephone records program went far beyond
what Congress authorized when it passed Section 215 of the Patriot Act in 2001. The court unequivocally rejected the government’s secret
reinterpretation of Section 215. Among many important findings, the court found that Section 215’s authorization of the collection of business
records that are “relevant to an authorized investigation” could not be read to include the dragnet collection of telephone records. The court
also took issue with the fact that this strained application of the law was accomplished in secret and approved by the secret and one-sided
Foreign Intelligence Surveillance Court (FISA Court). EFF filed amicus briefs in this case in both the district and circuit courts, and we
congratulate our colleagues at the ACLU on this significant victory. The Second Circuit’s opinion stands as a clear sign that the courts are ready
to step in and rule that mass surveillance is illegal. That’s great news. The
significant change
Second Circuit’s decision , however, also marks a
in the context of the ongoing legislative debate in Congress. Above all, it is clear that
Congress must do more to rein in dragnet surveillance by the NSA. Clean Reauthorization First, the Second
Circuit’s opinion should stop the idea of a "clean reauthorization" (a reauthorization with no reforms) of Section
215, which is set to expire June 1. Last month, Senate Majority Leader Mitch McConnell and Senate Intelligence Chair Richard Burr
introduced S. 1035, a bill that would extend the current language of Section 215 through 2020, thereby continuing the mass spying rubberstamped by the FISA Court. The morning of the Second Circuit decision, both Senators took to the Senate floor to vehemently defend the bulk
collection program and push for a clean reauthorization. But a clean reauthorization is much more complicated now. Congress can’t pretend
that the Second Circuit's narrow reading of “relevant to an authorized investigation” doesn’t exist. It’s likely that if Congress merely does a
“clean” reauthorization of Section 215, then the district court in ACLU v. Clapper will enjoin the government from using Section 215 as
authorization for the call records dragnet, because the district court is bound by the Second Circuit decision. However, if a reauthorization
made it clear that Congress intended to reject the Second Circuit’s narrow reading of the law, it could cause further confusion and the
government could argue that Congress has fully embraced the dragnet. We’re encouraging people to call Congress and tell their lawmakers to
reject Senator McConnell's clean reauthorization in order to avoid the risk that Congress might reject the Second Circuit’s decision
USA Freedom Act Must Be Strengthened
In light of the Second Circuit’s decision, EFF
The
asks Congress to
strengthen its proposed reform of Section 215, the USA Freedom Act. Pending those improvements, EFF is withdrawing our
support of the bill. We’re urging Congress to roll the draft back to the stronger and meaningful reforms
included in the 2013 version of USA Freedom and affirmatively embrace the Second Circuit’s opinion on the limits of Section
215. Most importantly, the Second Circuit’s correct interpretation of the law should be expressly embraced by Congress in order to
avoid any confusion going forward about what the key terms in the statute mean, especially the terms “relevant” and
“investigation.” This recognition could be in the bill itself or, less preferably, in legislative history. The House Judiciary Committee has already
included such language in its report to the full House of Representatives, but now the Senate must include the language in the bill or in its own
legislative history. This easy task will make sure that the law is not read as rejecting the Second Circuit’s reading and will help ensure
that the USA Freedom Act actually accomplishes its goal of ending bulk collection. The House Report
on USA Freedom, issued today, takes a step forward by stating that: Congress’ decision to leave in place the ‘‘relevance’’ standard for Section
501 orders should not be construed as Congress’ intent to ratify the FISA Court’s interpretation of that term. These changes restore meaningful
limits to the ‘‘relevance’’ requirement of Section 501, consistent with the opinion of the U.S. Court of Appeals for the Second Circuit in ACLU v.
Clapper. Ensuring that the Senate doesn't move away from the legislative history should be a top priority as the bill moves forward. But that’s
the bare minimum Congress must do. The Second Circuit, and especially Judge Sack’s concurrence, noted a lack of both transparency and a true
adversary in the FISA Court. The 2014 and 2013 USA Freedom Act had stronger FISA Court reforms, particularly around the creation of a special
advocate who would argue against the government in the FISA Court. The Second Circuit’s opinion also emphasizes that typical subpoenas seek
only records of "suspects under investigation, or of people or businesses that have contact with such subjects." Under the current USA Freedom
Act, the government can collect records of a "second hop,"—the numbers, and associated metadata, that have been in contact with the
numbers collected initially—without any additional authorization. The bill should be changed so that the government must file another
application for any further records it wants to collect. Automatically obtaining a "second hop" is unacceptable because it sweeps in too many
current USA Freedom Act is also out-of-sync with the court’s narrow view of
permissible collection of records because it lacks a rigorous definition of the " specific selection
term" the government can use to identify the records it wants to collect. This can be addressed by two
changes: (1) drawing upon last year's definition in the USA Freedom Act ; and, (2) closing down potential
loopholes like the definition of "address" or the use of a "person" to include a corporate person. Restoring Important Parts
of 2013’s USA Freedom Act This is also an opportunity and a new context for Congress to address the
shortcomings of the new ly introduced USA Freedom Act that we previously wrote about. Congress should put
people’s records. The
back key provisions that were dropped along the way as well as remove those that were introduced at the behest of the
intelligence community. First,
the "super minimization" procedures , which were key privacy
procedures that mandated the deletion of any information obtained about a person not connected to
the investigation, should be reintroduced. Key provisions establishing a higher legal standard and
compliance assessment for the use of pen register/trap-and-trace devices , legal standing to sue the government
over surveillance practices, and the original transparency provisions allowing government and corporate disclosure of surveillance orders
should also be resuscitated.
1AC Version if the plan broader (and “ends”
surveillance)
Contention One
Contention One – the Status Quo fails, and the Aff solves.
The Freedom Act recently became Law. The new Freedom Act won’t substantially
reduce surveillance. Pen register, super-minimization, and SST standards from the
original draft of the Freedom Act are needed.
Greene ‘15
(et al; David Greene, Senior Staff Attorney and Civil Liberties Director for the Electronic Frontier Foundation. David is also an
adjunct professor at the University of San Francisco School of Law, where he teaches classes in First Amendment and media law
and an instructor in the journalism department at San Francisco State University. David has significant experience litigating First
Amendment issues in state and federal trial and appellate courts and is one of the country's leading advocates for and
commentators on freedom of expression in the arts. “ACLU v. Clapper and the Congress: How The Second Circuit’s Decision
Affects the Legislative Landscape” - Electronic Frontier Foundation - May 11, 2015 https://www.eff.org/deeplinks/2015/05/aclu-v-clapper-and-congress-how-second-circuits-decision-affects-legislative)
The U.S. Court of Appeals for the Second Circuit in ACLU v. Clapper has determined that the NSA’s telephone records program went far beyond
what Congress authorized when it passed Section 215 of the Patriot Act in 2001. The court unequivocally rejected the government’s secret
reinterpretation of Section 215. Among many important findings, the court found that Section 215’s authorization of the collection of business
records that are “relevant to an authorized investigation” could not be read to include the dragnet collection of telephone records. The court
also took issue with the fact that this strained application of the law was accomplished in secret and approved by the secret and one-sided
Foreign Intelligence Surveillance Court (FISA Court). EFF filed amicus briefs in this case in both the district and circuit courts, and we
congratulate our colleagues at the ACLU on this significant victory. The Second Circuit’s opinion stands as a clear sign that the courts are ready
to step in and rule that mass surveillance is illegal. That’s great news. The
significant change
Second Circuit’s decision , however, also marks a
in the context of the ongoing legislative debate in Congress. Above all, it is clear that
Congress must do more to rein in dragnet surveillance by the NSA. Clean Reauthorization First, the Second
Circuit’s opinion should stop the idea of a "clean reauthorization" (a reauthorization with no reforms) of Section
215, which is set to expire June 1. Last month, Senate Majority Leader Mitch McConnell and Senate Intelligence Chair Richard Burr
introduced S. 1035, a bill that would extend the current language of Section 215 through 2020, thereby continuing the mass spying rubberstamped by the FISA Court. The morning of the Second Circuit decision, both Senators took to the Senate floor to vehemently defend the bulk
collection program and push for a clean reauthorization. But a clean reauthorization is much more complicated now. Congress can’t pretend
that the Second Circuit's narrow reading of “relevant to an authorized investigation” doesn’t exist. It’s likely that if Congress merely does a
“clean” reauthorization of Section 215, then the district court in ACLU v. Clapper will enjoin the government from using Section 215 as
authorization for the call records dragnet, because the district court is bound by the Second Circuit decision. However, if a reauthorization
made it clear that Congress intended to reject the Second Circuit’s narrow reading of the law, it could cause further confusion and the
government could argue that Congress has fully embraced the dragnet. We’re encouraging people to call Congress and tell their lawmakers to
reject Senator McConnell's clean reauthorization in order to avoid the risk that Congress might reject the Second Circuit’s decision
USA Freedom Act Must Be Strengthened
In light of the Second Circuit’s decision, EFF
The
asks Congress to
strengthen its proposed reform of Section 215, the USA Freedom Act. Pending those improvements, EFF is withdrawing our
support of the bill. We’re urging Congress to roll the draft back to the stronger and meaningful reforms
included in the 2013 version of USA Freedom and affirmatively embrace the Second Circuit’s opinion on the limits of Section
215. Most importantly, the Second Circuit’s correct interpretation of the law should be expressly embraced by Congress in order to
avoid any confusion going forward about what the key terms in the statute mean, especially the terms “relevant” and
“investigation.” This recognition could be in the bill itself or, less preferably, in legislative history. The House Judiciary Committee has already
included such language in its report to the full House of Representatives, but now the Senate must include the language in the bill or in its own
legislative history. This easy task will make sure that the law is not read as rejecting the Second Circuit’s reading and will help ensure
that the USA Freedom Act actually accomplishes its goal of ending bulk collection. The House Report
on USA Freedom, issued today, takes a step forward by stating that: Congress’ decision to leave in place the ‘‘relevance’’ standard for Section
501 orders should not be construed as Congress’ intent to ratify the FISA Court’s interpretation of that term. These changes restore meaningful
limits to the ‘‘relevance’’ requirement of Section 501, consistent with the opinion of the U.S. Court of Appeals for the Second Circuit in ACLU v.
Clapper. Ensuring that the Senate doesn't move away from the legislative history should be a top priority as the bill moves forward. But that’s
the bare minimum Congress must do. The Second Circuit, and especially Judge Sack’s concurrence, noted a lack of both transparency and a true
adversary in the FISA Court. The 2014 and 2013 USA Freedom Act had stronger FISA Court reforms, particularly around the creation of a special
advocate who would argue against the government in the FISA Court. The Second Circuit’s opinion also emphasizes that typical subpoenas seek
only records of "suspects under investigation, or of people or businesses that have contact with such subjects." Under the current USA Freedom
Act, the government can collect records of a "second hop,"—the numbers, and associated metadata, that have been in contact with the
numbers collected initially—without any additional authorization. The bill should be changed so that the government must file another
application for any further records it wants to collect. Automatically obtaining a "second hop" is unacceptable because it sweeps in too many
current USA Freedom Act is also out-of-sync with the court’s narrow view of
permissible collection of records because it lacks a rigorous definition of the " specific selection
term" the government can use to identify the records it wants to collect. This can be addressed by two
changes: (1) drawing upon last year's definition in the USA Freedom Act ; and, (2) closing down potential
loopholes like the definition of "address" or the use of a "person" to include a corporate person. Restoring Important Parts
of 2013’s USA Freedom Act This is also an opportunity and a new context for Congress to address the
shortcomings of the new ly introduced USA Freedom Act that we previously wrote about. Congress should put
people’s records. The
back key provisions that were dropped along the way as well as remove those that were introduced at the behest of the
intelligence community. First,
the "super minimization" procedures , which were key privacy
procedures that mandated the deletion of any information obtained about a person not connected to
the investigation, should be reintroduced. Key provisions establishing a higher legal standard and
compliance assessment for the use of pen register/trap-and-trace devices , legal standing to sue the government
over surveillance practices, and the original transparency provisions allowing government and corporate disclosure of surveillance orders
should also be resuscitated.
The current Freedom Act is too narrow. It’s limited to phone collection and not other
bulk collection programs.
Kopstein ‘15
Joshua Kopstein is a journalist and researcher. His work focuses on Internet law and disorder, surveillance and government
secrecy. He has written pieces for Slate Magazine and The New Yorker. “USA Freedom Act gives NSA everything it wants — and
less” - Al Jazeera America’s The Scrutineer – June 2nd – http://america.aljazeera.com/blogs/scrutineer/2015/6/2/usa-freedomact-gives-nsa-everything-it-wants--and-less.html
Obama signed the Freedom Act into law later
this evening. While far from what most would recognize as “reform,” at the end of the day, the bill is probably more of a victory for transparency than it is for privacy. That's because the Freedom Act has
focused almost exclusively on ending one single National Security Agency program under one single authority: The
secret bulk collection of Americans' phone records under Section 215 of the Patriot Act, revealed almost exactly two years ago by Edward Snowden. Section 215
and two other “emergency” post-9/11 surveillance provisions briefly lapsed Sunday night after the Senate failed to reauthorize them. The new law replaces the NSA’s bulk data
The Senate adopted the House version of the bill, which had been watered down at the behest of intelligence agencies, and President
collection with a program that requires telecom companies to retain the data and grant access to
intelligence agencies through more targeted court orders. The other surveillance powers — roving wiretaps and the so-called lone wolf provision — remained
unused even as surveillance hawks raised apocalyptic warnings about letting them expire. Two independent White House panels have found that the metadata collection program has never helped to foil a terrorist plot. A major
appellate court decision also ruled the program was illegal, and that it merely served to create a “vast data bank” of extremely sensitive information — specifically, phone numbers and when and how often they were called —
about millions of innocent Americans. In other words,
the bulk phone records program was on its way out no matter what. The court
ruling could have been a big opportunity to push for an end to all domestic bulk collection
not just phone records. But additional privacy protections had been negotiated away in the House,
under the Patriot Act,
and Senate advocates were not given a chance to add them back. The result renders the Freedom Act a
missed opportunity to address countless other NSA authorities, such as Executive Order 12333 and Section
702 of the F ISA A mendments A ct, ones we know (again, thanks to Snowden) continue to collect many other types of data.
The new Freedom Act will fail – definitions are too watered-down to check mass
surveillance. The original Freedom Act solves.
Tummarello ‘14
Internally quoting Harley Geiger, senior counsel at the Center for Democracy and Technology and Kevin Bankston, policy
director of the New America Foundation's Open Technology Institute. Kate Tummarello is a technology reporter for POLITICO
Pro. Previously, she has written about technology for The Hill, Communications Daily and Roll Call. She's a graduate of Hamilton
College, where she studied public policy. “NSA reform legislation 'watered down'?” - The Hill - 05/20/14 http://thehill.com/policy/technology/206686-privacy-advocates-pull-support-for-watered-down-usa-freedom
Privacy advocates who have pushed for legislation to reform U.S. government surveillance are backing
away from a House bill that they say has been "watered down" as it heads to the floor. Though the original
legislation intended to end sweeping surveillance programs, the bill the House will vote on as early as this week
allows for “mass surveillance on a slightly smaller scale,” according to Harley Geiger, senior counsel at
the Center for Democracy and Technology. The bill — the USA Freedom Act, sponsored by Patriot Act author Rep. James
Sensenbrenner Jr. (R-Wis.) — was
originally written to prohibit the U.S. government's sweeping surveillance
program. But after moving through the House Judiciary and Intelligence committees, where it saw some changes but retained the support of privacy
advocates, last minute negotiations between House leadership and the Obama administration have left the bill with weakened language
when it comes to banning mass surveillance , advocates say. On Tuesday, Sensenbrenner filed a manager’s amendment at the
House Rules Committee to be considered on the floor in place of the bill that passed the Judiciary and Intelligence committees. Sensenbrenner’s
amendment still prohibits bulk collection but would allow government officials to search for records using “a
discrete term, such as a term specifically identifying a person, entity, account, address, or device, used by the Government to limit the scope of the
information or tangible things sought.” While the standard in Sensenbrenner's amendment is more specific than the one under current law, it leaves
too much room for interpretation, as opposed to earlier versions of the bill , Geiger said. It may keep the
intelligence community from sweeping surveillance on a national level, but “it is ambiguous enough to allow for large scale
collection,” he said. “Ambiguity is what got us into this mess in the first place,” he said, referring to a controversial National
Security Agency program that collected information about Americans’ phone calls. The U.S. government determined that data about
all Americans’ phone calls was “relevant” to intelligence investigations under current surveillance
laws and, therefore, could be collected. "We cannot in good conscience support this weakened version
of the USA Freedom Act, where key reforms — especially those intended to end bulk collection and increase
transparency — have
been substantially watered down ," Kevin Bankston, policy director of the New America Foundation's Open
Technology Institute, said. Bankston said his group is "gravely disappointed that, rather than respecting the wishes of the unanimous Judiciary and Intelligence
committees, the House leadership and the Obama Administration have chosen to disrupt the hard-fought compromise that so many of us were willing to support
just two weeks ago." Geiger also expressed frustration at the way last minute negotiations have led to a weaker bill. He pointed
to bipartisan support
for the original USA Freedom Act and the international backlash that came after last year’s revelations
about U.S. surveillance. “Despite all of that, the bill has been watered down to provide only mild reform,”
he said.
Plan text options
Choose a plan text that you like
Plan options
Plan Option #1:
The United States federal government should pass the original version of the USA FREEDOM Act
(H.R.3361)
Plan Option #2:
The United States federal government should substantially curtail its domestic surveillance by
strengthening the USA FREEDOM Act to:
 require use of a “specific selection term” to satisfy the “reasonable, articulable suspicion
standard”
 require that information collected through “pen register or trap and trace devices” via
emergency authorizations be subject to the same procedural safeguards as non-emergency
collections.
 require “super minimization" procedures that delete information obtained about a person not
connected to the investigation.
Plan Option #3:
Regarding its monitoring of United States persons, the United States federal government should:
 require use of a “specific selection term” to satisfy current “reasonable, articulable suspicion
standards”
 require that information collected through “pen register or trap and trace devices” via
emergency authorizations be subject to the same procedural safeguards as non-emergency
collections.
 require “super minimization" procedures that delete information obtained about a person not
connected to the investigation
Plan Option #4:
Bulk collection of domestic metadata by United States federal intelligence agencies should cease.
Plan Option #5:
In the absence of an individually-tailored warrant obtained via use of a specific selector term, federal
intelligence agencies should cease collection of domestic phone, internet, email, and-or associated
electronic records.
Plan Option #6:
In the absence of an individually-tailored warrant obtained via use of a specific selector term, federal
intelligence agencies should cease collection of domestic phone, internet, email, and associated
electronic records. This should include, but not be limited to, ending the monitoring of United States
persons under Sections 214 and 215 of the USA PATRIOT Act; Executive Order 12333; and Section 702 of
the FISA Amendments Act.
Plan Option #7:
The United States Supreme Court should hold that domestic surveillance conducted by federal
intelligence agencies cannot meet the “reasonable, articulable suspicion standard” without having used
a “specific selection term” and that domestic surveillance conducted by federal intelligence agencies is
in violation of the 4th Amendment if:
 it collects information through “pen register or trap and trace devices” via emergency
authorizations that were not subject to the same procedural safeguards as non-emergency
collections; and-or
 if it fails to delete information obtained about a person not connected to the investigation.
Plan Option #8:
The United States Supreme Court should hold that domestic surveillance conducted by federal
intelligence agencies violates the 4th Amendment if it collects domestic phone, internet, email, and-or
associated electronic records in the absence of an individually-tailored warrant obtained via use of a
“specific selector term”.
Plan Option #9:
The United States federal government should hold that domestic surveillance conducted by federal
intelligence agencies violates the 4th Amendment if it collects domestic phone, internet, email, and-or
associated electronic records in the absence of an individually-tailored warrant obtained via use of a
“specific selector term”.
Plan Option #10:
The United States Supreme Court should hold that no statute presently authorizes federal intelligence
agencies to engage in bulk collection of domestic phone, internet, email, and-or associated electronic
records.
1AC - Privacy Advantage
Privacy Advantage – 1AC, longer version
Privacy Advantage – longer version
Contention # ____ is Privacy
Privacy outweighs.
- Utilitarian impact calc is skewed; and
- Reject Surveillance as a structural matter of power – even when its
“reformed”, innocents are powerless unless neutral oversight’s in place.
Solove ‘7
Daniel Solove is an Associate Professor at George Washington University Law School and holds a J.D. from Yale Law School. He
is one of the world’s leading expert in information privacy law and is well known for his academic work on privacy and for
popular books on how privacy relates with information technology. He has written 9 books and more than 50 law review
articles – From the Article ““I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy” - San Diego Law Review, Vol.
44, p. 745 - GWU Law School Public Law Research Paper No. 289 – available from download at:
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
It is time to return to the
nothing to hide argument . The reasoning of this argument is that when it comes to
government surveillance or use of personal data, there is no privacy violation if a person has nothing sensitive,
embarrassing, or illegal to conceal. Criminals involved in illicit activities have something to fear, but for the vast majority of
people, their activities are not illegal or embarrassing. Understanding privacy as I have set forth reveals the flaw of the nothing to hide argument at its roots. Many
commentators who respond to the argument attempt a direct refutation by trying to point to things that people would want to hide. But the problem with the
nothing to hide argument is the underlying assumption that privacy is about hiding bad things. Agreeing
with this assumption concedes far
too much ground and leads to an unproductive discussion of information people would likely want or not want to hide. As Bruce
Schneier aptly notes, the nothing to hide argument stems from a faulty “premise that privacy is about hiding a
wrong.”75 The deeper problem with the nothing to hide argument is that it myopically views privacy as a form of concealment or secrecy. But understanding
privacy as a plurality of related problems demonstrates that concealment of bad things is just one among many problems caused by government programs such as
the NSA surveillance and data mining. In the categories in my taxonomy, several problems are implicated. The
NSA programs involve problems of
information collection, specifically the category of surveillance in the taxonomy. Wiretapping involves audio surveillance of people’s conversations.
Data mining often begins with the collection of personal information, usually from various third parties that possess people’s data. Under current Supreme Court
Fourth Amendment jurisprudence, when the government gathers data from third parties, there is no Fourth Amendment protection because people lack a
“reasonable expectation of privacy” in information exposed to others.76 In United States v. Miller, the Supreme Court concluded that there is no reasonable
expectation of privacy in bank records because “[a]ll of the documents obtained, including financial statements and deposit slips, contain only information
voluntarily conveyed to the banks and exposed to their employees in the ordinary course of business.”77 In Smith v. Maryland, the Supreme Court held that people
lack a reasonable expectation of privacy in the phone numbers they dial because they “know that they must convey numerical information to the phone company,”
and therefore they cannot “harbor any general expectation that the numbers they dial will remain secret.”78 As I have argued extensively elsewhere, the lack of
Fourth Amendment protection of third party records results in the government’s ability to access an extensive amount of personal information with minimal
limitation or oversight.79 Many scholars have referred to information collection as a form of surveillance. Dataveillance, a term coined by Roger Clarke, refers to the
“systemic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons.”80 Christopher Slobogin has
referred to the gathering of personal information in business records as “transaction surveillance.”81 Surveillance
can create chilling effects
on free speech, free association, and other First Amendment rights essential for democracy.82 Even
surveillance of legal activities can inhibit people from engaging in them. The value of protecting against
chilling effects is not measured simply by focusing on the particular individuals who are deterred from
exercising their rights. Chilling effects harm society because, among other things, they reduce the range of
viewpoints expressed and the degree of freedom with which to engage in political activity. The nothing to hide
argument focuses primarily on the information collection problems associated with the NSA programs. It contends that limited surveillance of lawful activity will not
chill behavior sufficiently to outweigh the security benefits. One can certainly quarrel with this argument, but one of the difficulties with chilling effects is that it is
often very hard to demonstrate concrete evidence of deterred behavior.83 Whether the NSA’s surveillance and collection of telephone records has deterred people
from communicating particular ideas would be a difficult question to answer. Far too often, discussions of the NSA surveillance and data mining define the problem
The NSA programs are
problematic even if no information people want to hide is uncovered. In The Trial, the problem is not inhibited
solely in terms of surveillance. To return to my discussion of metaphor, the problems are not just Orwellian, but Kafkaesque.
behavior, but rather
a suffocating powerlessness and vulnerability created by the court system’s use of
personal data and its exclusion of the protagonist from having any knowledge or participation in the process. The harms consist of those created by
bureaucracies—indifference, errors, abuses, frustration, and lack of transparency and accountability. One such harm, for example, which I call aggregation, emerges
from the combination of small bits of seemingly innocuous data.84 When combined, the information becomes much more telling about a person. For the person
who truly has nothing to hide, aggregation is not much of a problem. But in the stronger, less absolutist form of the nothing to hide argument, people argue that
certain pieces of information are not something they would hide. Aggregation, however, means that by combining pieces of information we might not care to
conceal, the government can glean information about us that we might really want to conceal. Part of the
allure of data mining for the
government is its ability to reveal a lot about our personalities and activities by sophisticated means of analyzing data. Therefore,
without greater transparency in data mining, it is hard to claim that programs like the NSA data mining program will not
reveal information people might want to hide, as we do not know precisely what is revealed. Moreover, data mining aims to be predictive
of behavior, striving to prognosticate about our future actions. People who match certain profiles are deemed likely to engage in a similar pattern of behavior. It is
quite difficult to refute actions that one has not yet done. Having nothing to hide will not always dispel predictions of future activity. Another
problem in
the taxonomy, which is implicated by the NSA program, is the problem I refer to as exclusion.85 Exclusion is the problem caused when people are
prevented from having knowledge about how their information is being used, as well as barred from being able to access and correct errors in that data. The NSA
program involves a massive database of information that individuals cannot access. Indeed, the very existence of the program was kept secret for years.86 This kind
of information processing, which forbids people’s knowledge or involvement, resembles in some ways a kind of due process problem. It is a structural problem
involving the way people are treated by government institutions. Moreover, it creates a power imbalance between individuals and the government. To what extent
should the Executive Branch and an agency such as the NSA, which is relatively insulated from the political process and public accountability, have a significant
power over citizens? This
issue is not about whether the information gathered is something people want to
hide, but rather about the power and the structure of government. A related problem involves “secondary use.” Secondary
use is the use of data obtained for one purpose for a different unrelated purpose without the person’s consent. The Administration has said little about how long
the data will be stored, how it will be used, and what it could be used for in the future. The potential future uses of any piece of personal information are vast, and
without limits or accountability on how that information is used, it is hard for people to assess the dangers of the data being in the government’s control. Therefore,
the problem with the nothing to hide argument is that it focuses on just one or two particular kinds of privacy problems—the disclosure of personal information or
surveillance—and not others. It assumes a particular view about what privacy entails, and it sets
important to distinguish here between two ways of
the terms for debate in a manner that is often unproductive. It is
justifying a program such as the NSA surveillance
and data mining program. The first
way is to not recognize a problem. This is how the nothing to hide argument works—it denies even the existence of a problem. The second manner of justifying such
a program is
to acknowledge the problems but contend that the benefits of the NSA program outweigh
the privacy harms . The first justification influences the second, because the low value given to privacy is based upon a narrow view of the problem.
The key misunderstanding is that the nothing to hide argument views privacy in a particular way—as a form of secrecy, as
the right to hide things. But there are many other types of harm involved beyond exposing one’s
secrets to the government. Privacy problems are often difficult to recognize and redress because they create a panoply of types of harm. Courts,
legislators, and others look for particular types of harm to the exclusion of others, and their narrow focus blinds them to seeing other kinds of harms. One of the
difficulties with the nothing to hide argument
is that it looks for a visceral kind of injury as opposed to a
structural one . Ironically, this underlying conception of injury is shared by both those advocating for greater privacy protections and those arguing
in favor of the conflicting interests to privacy. For example, law professor Ann Bartow argues that I have failed to describe
privacy harms in a compelling manner in my article, A Taxonomy of Privacy, where I provide a framework for understanding the manifold different privacy
problems.87 Bartow’s primary complaint is that my taxonomy “frames privacy harms in dry, analytical terms that fail to sufficiently identify and animate the
compelling ways that privacy violations can negatively impact the lives of living, breathing human beings beyond simply provoking feelings of unease.”88 Bartow
claims that the taxonomy
does not have “enough dead bodies” and that privacy’s “lack of blood and death,
or at least of broken bones and buckets of money, distances privacy harms from other categories of tort law. Most
privacy problems lack dead bodies. Of course, there are exceptional cases such as the murders of Rebecca Shaeffer and Amy Boyer. Rebecca
Shaeffer was an actress killed when a stalker obtained her address from a Department of Motor Vehicles record.90 This incident prompted Congress to pass the
Driver’s Privacy Protection Act of 1994.91 Amy Boyer was murdered by a stalker who obtained her personal information, including her work address and Social
Security number, from a database company.92 These examples aside, there is not a lot of death and gore in privacy law. If this is the standard to recognize a
problem, then few privacy problems will be recognized. Horrific cases are not typical, and the purpose of my taxonomy is to explain why most privacy problems are
still harmful despite this fact. Bartow’s objection is actually very similar to the nothing to hide argument. Those
advancing the nothing to hide
argument have in mind a particular kind of visceral privacy harm, one where privacy is violated only when something deeply embarrassing or
discrediting is revealed. Bartow’s
quest for horror stories represents a similar desire to find visceral privacy harms. The problem is that not all
privacy harms are like this. At the end of the day, privacy
is not a horror movie, and demanding more palpable harms will be difficult in many cases.
Yet there is still a harm worth addressing, even if it is not sensationalistic.
In many instances, privacy is
threatened not by singular egregious acts, but by a slow series of relatively minor acts which gradually begin to add up. In this way, privacy problems resemble
certain environmental harms which occur over time through a series of small acts by different actors. Bartow wants to point to a major spill, but gradual pollution by
a multitude of different actors often creates worse problems. The law frequently struggles with recognizing harms that do not result in embarrassment, humiliation,
or physical or psychological injury.93 For example, after the September 11 attacks, several airlines gave their passenger records to federal agencies in direct
violation of their privacy policies. The federal agencies used the data to study airline security.94 A group of passengers sued Northwest Airlines for disclosing their
personal information. One of their claims was that Northwest Airlines breached its contract with the passengers. In Dyer v. Northwest Airlines Corp., the court
rejected the contract claim because “broad statements of company policy do not generally give rise to contract claims,” the passengers never claimed they relied
upon the policy or even read it, and they “failed to allege any contractual damages arising out of the alleged breach.”95 Another court reached a similar
conclusion.96 Regardless of the merits of the decisions on contract law, the cases represent a difficulty with the legal system in addressing privacy problems. The
disclosure of the passenger records represented a “breach of confidentiality.”97 The problems caused by breaches of confidentiality do not merely consist of
individual emotional distress; they involve a violation of trust within a relationship. There is a strong social value in ensuring that promises are kept and that trust is
maintained in relationships between businesses and their customers. The problem of secondary use is also implicated in this case.98 Secondary use involves data
collected for one purpose being used for an unrelated purpose without people’s consent. The airlines gave passenger information to the government for an entirely
different purpose beyond that for which it was originally gathered. Secondary use problems often do not cause financial, or even psychological, injuries. Instead, the
harm is one of power imbalance. In Dyer, data was disseminated in a way that ignored airline passengers’ interests in the data despite promises made in the privacy
policy. Even if the passengers were unaware of the policy, there is a social value in ensuring that companies adhere to established limits on the way they use
personal information. Otherwise, any stated limits become meaningless, and companies have discretion to boundlessly use data. Such a state of affairs can leave
nearly all consumers in a powerless position. The harm, then, is less one to particular individuals than it is a structural harm. A similar problem surfaces in another
case, Smith v. Chase Manhattan Bank.99 A group of plaintiffs sued Chase Manhattan Bank for selling customer information to third parties in violation of its privacy
policy, which stated that the information would remain confidential. The court held that even presuming these allegations were true, the plaintiffs could not prove
any actual injury: [T]he “harm” at the heart of this purported class action, is that class members were merely offered products and services which they were free to
decline. This does not qualify as actual harm. The complaint does not allege any single instance where a named plaintiff or any class member suffered any actual
harm due to the receipt of an unwanted telephone solicitation or a piece of junk mail.100 The court’s view of harm, however, did not account for the breach of
confidentiality. When
balancing privacy against security, the privacy harms are often characterized in terms of
injuries to the individual, and the interest in security is often characterized in a more broad societal way. The
security interest in the NSA programs has often been defined improperly. In a Congressional hearing, Attorney General
Alberto Gonzales stated: Our enemy is listening, and I cannot help but wonder if they are not shaking their heads in amazement at the thought that anyone would
imperil such a sensitive program by leaking its existence in the first place, and smiling at the prospect that we might now disclose even more or perhaps even
unilaterally disarm ourselves of a key tool in the war on terror.101 The balance between privacy and security is often cast in terms of whether a particular
government information collection activity should or should not be barred. The
issue, however, often is not whether the NSA or other government
agencies should be allowed to engage in particular forms of information gathering; rather, it is what kinds of
oversight and accountability we want in place when the government engages in searches and seizures. The government can
employ nearly any kind of investigatory activity with a warrant supported by probable cause. This is a mechanism of oversight—it
forces government officials to justify their suspicions to a neutral judge or magistrate before engaging in the tactic. For
example, electronic surveillance law allows for wiretapping, but limits the practice with judicial supervision, procedures to minimize the breadth of the wiretapping,
and requirements that the law enforcement officials report back to the court to prevent abuses.102 It is these procedures that the Bush Administration has ignored
by engaging in the warrantless NSA surveillance. The question is not whether we want the government to monitor such conversations, but whether the Executive
Branch should adhere to the appropriate oversight procedures that Congress has enacted into law, or should covertly ignore any oversight. Therefore, the security
interest should not get weighed in its totality against the privacy interest. Rather, what should get weighed is the extent of marginal limitation on the effectiveness
of a government information gathering or data mining program by imposing judicial oversight and minimization procedures. Only in cases where such procedures
will completely impair the government program should the security interest be weighed in total, rather than in the marginal difference between an unencumbered
program versus a limited one. Far too
often, the balancing of privacy interests against security interests takes place in a
manner that severely shortchanges the privacy interest while inflating the security interests . Such is the
logic of the nothing to hide argument. When
examined
the argument is unpacked, and its underlying assumptions
can see how it shifts the debate to its terms , in which it draws power from its
unfair advantage. It is time to pull the curtain on the nothing to hide argument. Whether explicit or not, conceptions of privacy underpin
and challenged, we
nearly every argument made about privacy, even the common quip “I’ve got nothing to hide.” As I have sought to demonstrate in this essay, understanding privacy
as a pluralistic conception reveals that we are often talking past each other when discussing privacy issues. By focusing more specifically on the related problems
under the rubric of “privacy,” we can better address each problem rather than ignore or conflate them. The nothing to hide argument speaks to some
problems, but not to others. It represents
a singular and narrow way of conceiving of privacy, and it wins by excluding
consideration of the other problems often raised in government surveillance and data mining
programs. When engaged with directly, the nothing to hide argument can ensnare, for it forces the debate to focus on its narrow understanding of privacy. But
when confronted with the plurality of privacy problems implicated by government data collection and use beyond
surveillance and disclosure, the nothing to hide argument, in the end, has nothing to say.
Put privacy before security. The ballot should create a side constraint where ends
don’t justify the means. This is especially applies to data collection in the absence of
probable cause.
Albright ‘14
Logan Albright is the Research Analyst at FreedomWorks, and is responsible for producing a wide variety of written content for
print and the web, as well as conducting research for staff media appearances and special projects. He received his Master’s
degree in economics from Georgia State University. “The NSA's Collateral Spying” – Freedom Works - 07/08/2014 http://www.freedomworks.org/content/nsas-collateral-spying
In short, the report, based on information obtained by Edward Snowden, reveals that during the course of its ordinary, otherwise legal surveillance operations,
the NSA also collected data on large numbers of people who were not specifically targeted. The agency
calls this practice “incidental surveillance.” I call it “collateral spying.” The report found that, on average, 9 out of every 10 people
spied on were not the intended target. The NSA has the legal authority to obtain a warrant based on
probable cause in order to surveil an individual. No one is disputing that. But when this targeting results
in collateral spying on vast numbers of innocents, in the absence of probable cause and the corresponding warrants, that is a
major problem. The NSA has asserted that such incidental data collection is inevitable, and to a certain extent that’s likely true. It is
should obviously be
minimized as far as possible , and at the very least the information should be immediately
purged from government databases , not stored for years on end. In any case, the whole situation is indicative of
understandable that in some situations the NSA may learn information about people other than the direct target, but this
the agency’s cavalier attitude towards individual rights. While
national security is a concern we all share, the ends do not justify
the means when those means involve violate the constitutional protections afforded to citizens by our nation’s founders. It is
not okay to violate the rights of an innocent in the process of achieving a broader goal, even
if that goal is noble. The way the NSA has been behaving is Machiavellian in the most literal sense. In his 16th century
political treatise, The Prince, Niccolo Machiavelli recognized a harsh reality of politics that still plagues us half a millennium later, writing, “A prince wishing to keep
his state is very often forced to do evil.” Taking Machiavelli’s advice as a
green light for immoral behavior has been the problem with
governments throughout history, a problem the founding fathers sought to avoid by setting down precise guidelines for what the government could and could not
do in the form of a Constitution. The disregard of these rules, and the
argument that there should be a national security
exception to the Fourth Amendment, undermines the entire purpose of the American experiment, and restores the European-style
tyrannies the revolutionaries fought against.
Even within a utilitarian framework, privacy outweighs for two reasons:
First – Structural bias. Their link inflates the security risk and their impact’s an
epistemologically wrong.
Solove ‘8
Daniel Solove is an Associate Professor at George Washington University Law School and holds a J.D. from Yale Law School. He
is one of the world’s leading expert in information privacy law and is well known for his academic work on privacy and for
popular books on how privacy relates with information technology. He has written 9 books and more than 50 law review
articles – From the Article: “Data Mining and the Security-Liberty Debate” - University of Chicago Law Review, Vol. 74, p. 343,
2008 - http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030
Data mining is one issue in a larger debate about security and privacy. Proponents of data mining justify it as an
essential tool to protect our security. For example, Judge Richard Posner argues that “[i]n an era of global terrorism and proliferation of weapons of mass destruction, the government has a
compelling need to gather, pool, sift, and search vast quantities of information, much of it personal.”9 Moreover, proponents of security measures argue that we must provide the executive branch with the discretion it needs to
protect us. We cannot second guess every decision made by government officials, and excessive meddling into issues of national security by judges and oth-ers lacking expertise will prove detrimental. For example, William Stuntz
contends that “effective, active government—government that innovates, that protects people who need protecting, that acts aggressively when action is needed—is dying. Privacy and transparency are the diseases. We need to
find a vaccine, and soon.”10 Stuntz concludes that “[i]n an age of terrorism, privacy rules are not simply unaffordable. They are perverse.”11 We live in an “age of balancing,” and
and civil liberties are not absolute.12 Thus,
how the balancing occurs
the prevailing view is that most rights
liberty must be balanced against security. But there are systematic problems with
that inflate the importance of the security interests and diminish the value of
the liberty interests .
In this essay, I examine some common difficulties in the way that liberty is balanced against security in the context of data mining. Countless discussions about the tradeoffs
liberty interests are cast as individual
rights and balanced against the security interests, which are cast in terms of the safety of society as a whole. Courts and
between security and liberty begin by taking a security proposal and then weighing it against what it would cost our civil liberties. Often, the
commentators defer to the government’s assertions about the effectiveness of the security interest. In the context of data mining, the liberty interest is limited by narrow understandings of privacy that neglect to account for many
privacy problems.
As a result, the balancing concludes with a victory in favor of the security interest. But
as I will argue,
privacy concerns are significantly greater than
acknowledged. These problems undermine the balancing process and skew results toward
the security side of the scale.
important dimensions of data mining’s security benefits require more scrutiny, and the
have
currently
d
ed the
Debates about data mining begin with the assumption that it is an essential tool in protecting our security. Terrorists lurk among us, and ferreting
them out can be quite difficult. Examining data for patterns will greatly assist in this endeavor, the argument goes, because certain identifiable characteristics and behaviors are likely to be associated with terrorist activity. Often,
little more is said, and the debate pro-ceeds to examine whether privacy is important enough to refrain from using such an effective terrorism-fighting tool. Many discussions about security and liberty proceed in this fashion. They
commence by assuming that a particular security measure is effective, and the only remaining question is whether the liberty interest is strong enough to curtail that measure. But given the gravity of the security concerns over
terrorism, the liberty interest has all but lost before it is even placed on the scale. Judge Richard Posner argues that judges should give the executive branch considerable deference when it comes to assessing the security measures
it proposes. In his recent book, Not a Suicide Pact: The Constitution in a Time of National Emergency,13 Posner contends that judicial restraint is wise because “when in doubt about the actual or likely consequences of a measure,
the pragmatic, empiricist judge will be inclined to give the other branches of government their head.”14 According to Posner, “[j]udges aren’t supposed to know much about national security.”15 Likewise, Eric Posner and Adrian
Vermeule declare in their new book, Terror in the Balance: Security, Liberty, and the Courts,16 that “the executive branch, not Congress or the judicial branch, should make the tradeoff between security and liberty.”17 Moreover,
Posner and Vermeule declare that during emergencies, “[c]onstitutional rights should be relaxed so that the executive can move forcefully against the threat.”18 The problem with such deference is that, historically, the executive
branch has not always made the wisest national security decisions. Nonetheless, Posner and Vermeule contend that notwithstanding its mistakes, the executive branch is better than the judicial and legislative branches on
institutional competence grounds.19 “Judges are generalists,” they observe, “and the political insulation that protects them from current politics also deprives them of information, especially information about novel security
threats and necessary responses to those threats.”20 Posner and Vermeule argue that during emergencies, the “novelty of the threats and of the necessary responses makes judicial routines and evolved legal rules seem
inapposite, even obstructive.”21 “Judicial routines” and “legal rules,” however, are the cornerstone of due process and the rule of law—the central building blocks of a free and democratic society. At many times, Posner,
Vermeule, and other strong proponents of security seem to focus almost exclusively on what would be best for security when the objective should be establishing an optimal balance between security and liberty. Although such a
balance may not promote security with maximum efficiency, it is one of the costs of living in a constitutional democracy as opposed to an authoritarian political regime. The executive branch may be the appropriate branch for
developing security measures, but this does not mean that it is the most adept branch at establishing a balance between security and liberty. In our constitutional democracy, all branches have a role to play in making policy. Courts
protect constitutional rights not as absolute restrictions on executive and legislative policymaking but as important interests to be balanced against government interests. As T. Alexander Aleinikoff notes, “balancing now dominates
major areas of constitutional law.”22 Balancing occurs through various forms of judicial scrutiny, requiring courts to analyze the weight of the government’s interest, a particular measure’s effectiveness in protecting that interest,
and the extent to which the government interest can be achieved without unduly infringing upon constitutional rights.23 For balancing to be meaningful, courts must scrutinize both the security and liberty interests. With
deference, however, courts fail to give adequate scrutiny to security interests. For example, after the subway bombings in London, the New York Police Department began a program of random searches of people’s baggage on the
subway. The searches were conducted without a warrant, probable cause, or even reasonable suspicion. In MacWade v Kelly,24 the United States Court of Appeals for the Second Circuit upheld the program against a Fourth
Amendment challenge. Under the special needs doctrine, when exceptional circumstances make the warrant and probable cause requirements unnecessary, the search is analyzed in terms of whether it is “reasonable.”25
Reasonableness is determined by balancing the government interest in security against the interests in privacy and civil liberties.26 The weight of the security interest should turn on the extent to which the program effectively
improves subway safety. The goals of the program may be quite laudable, but nobody questions the importance of subway safety. The critical issue is whether the search program is a sufficiently effective way of achieving those
goals that it is worth the tradeoff in civil liberties. On this question, unfortunately, the court deferred to the law enforcement officials, stating that the issue “is best left to those with a unique understanding of, and responsibility
for, limited public resources, including a finite number of police officers.” 27 In determining whether the program was “a reasonably effective means of addressing the government interest in deterring and detecting a terrorist
attack on the subway system,”28 the court refused to examine the data to assess the program’s effectiveness.29 The way the court analyzed the government’s side of the balance would justify nearly any search, no matter how
ineffective. Although courts should not take a know-it-all attitude, they should not defer on such a critical question as a security measure’s effectiveness. The problem with many security measures is that they are not wise
expenditures of resources. A small number of random searches in a subway system of over four million riders a day seems more symbolic than effective because the odds of the police finding the terrorist with a bomb are very low.
The government also argued that the program would deter terrorists from bringing bombs on subway trains, but nearly any kind of security measure can arguably produce some degree of deterrence. The key issue, which the court
did not analyze, is whether the program would lead to deterrence significant enough to outweigh the curtailment of civil liberties. If courts fail to question the efficacy of security measures, then the security interest will prevail
nearly all the time. Preventing terrorism has an immensely heavy weight, and any given security measure will provide a marginal advancement toward that goal. In the defer-ence equation, the math then becomes easy. At this
point, it is futile to even bother to look at the civil liberties side of the balance. The government side has already won. Proponents of deference argue that if courts did not defer, then they would be substituting their judgment for
that of executive officials, who have greater expertise in understanding security issues. Special expertise in national security, however, is often not necessary for balancing security and liberty. Judges and legislators should require
the experts to persuasively justify the security measures being developed or used. Of course, in very complex areas of knowledge, such as advanced physics, nonexperts may find it difficult to understand the concepts and
comprehend the terminology. But it is not clear that security expertise involves such sophisticated knowledge that it would be incomprehensible to nonexperts. Moreover, the deference argument conflates evaluating a particular
security measure with creating such a measure. The point of judicial review is to subject the judgment of government officials to critical scrutiny rather than blindly accept their authority. Critical inquiry into factual matters is not
the imposition of the judge’s own judgment for that of the decisionmaker under review.30 Instead, it is forcing government officials to explain and justify their policies. Few will quarrel with the principle that courts should not
“second guess” the decisions of policy experts. But there is a difference between not “second guessing” and failing to critically evaluate the factual and empirical evidence justifying the government programs. Nobody will contest
the fact that security is a compelling interest. The key issue in the balancing is the extent to which the security measure furthers the interest in security. As I have argued elsewhere, whenever courts defer to the government on the
effectiveness of a government security measure, they are actually deferring to the government on the ultimate question as to whether the measure passes constitutional muster.31 Deference by the courts or legislature is an
abdication of their function. Our constitutional system of government was created with three branches, a design structured to establish checks and balances against abuses of power. Institutional competence arguments are often
made as if they are ineluctable truths about the nature of each governmental branch. But the branches have all evolved considerably throughout history. To the extent a branch lacks resources to carry out its function, the answer
should not be to diminish the power of that branch but to provide it with the necessary tools so it can more effectively carry out its function. Far too often, unfortunately, discussions of institutional competence devolve into broad
generalizations about each branch and unsubstantiated assertions about the inherent superiority of certain branches for making particular determinations. It is true, as Posner and Vermeule observe, that historically courts have
been deferential to the executive during emergencies.32 Proponents of security measures often advance what I will refer to as the “pendulum theory”—that in times of crisis, the balance shifts more toward security and in times of
peace, the balance shifts back toward liberty. For example, Chief Justice Rehnquist argues that the “laws will thus not be silent in time of war, but they will speak with a somewhat different voice.”33 Judge Posner contends that the
liberties curtailed during times of crisis are often restored during times of peace.34 Deference is inevitable, and we should accept it without being overly concerned, for the pendulum will surely swing back. As I argue elsewhere,
however, there have been many instances throughout US history of needless curtailments of liberty in the name of security, such as the Palmer Raids, the Japanese Internment, and the McCarthy communist hearings.35 Too often,
such curtailments did not stem from any real security need but because of the “personal agendas and prejudices” of government officials.36 We should not simply accept these mistakes as inevitable; we should seek to prevent
them from occurring. Hoping that the pendulum will swing back offers little consolation to those whose liberties were infringed or chilled. The protection of liberty is most important in times of crisis, when it is under the greatest
threat. During times of peace, when our judgment is not clouded by fear, we are less likely to make unnecessary sacrifices of liberty. The threat to liberty is lower in peacetime, and the need to protect it is not as dire. The greatest
need for safeguarding liberty is during times when we least want to protect it. In order to balance security and liberty, we must assess the security interest. This involves evaluating two components—the gravity of the security
It is often merely assumed without question that the secu-rity threat from terrorism is one
of the gravest dangers we face in the modern world. But this assumption might be wrong. Assessing the risk of harm from terrorism is very difficult
threat and the effectiveness of the security measures to address it.
because terrorism is such an irregular occurrence and is constantly evolving. If we examine the data from previous terrorist attacks, however,
severely overstated.
the threat of terrorism has been
For example, many people fear being killed in a terrorist attack, but based on statistics from terrorism in the United States,
the risk of dying from
terrorism is miniscule. According to political scientist John Mueller, [e]ven with the September 11 attacks included in the count . . . the number of Americans killed by international terrorism since the late
1960s (which is when the State Department began its accounting) is about the same as the number killed over the same period by lightning, or by accident-causing deer, or by severe allergic reactions to peanuts.37 Add up
the eight deadliest terrorist attacks in US history, and they amount to fewer than four thousand fatalities.38
In contrast, flu and pneumonia deaths are estimated to be around sixty thousand per year.39 Another forty thousand die in auto accidents each year.40 Based on our experience with terrorism thus far, the risk of
dying from terrorism is very low on the relative scale of fatal risks. Dramatic events and media attention can cloud
a rational assessment of risk.
The year 2001 was not just notable for the September 11 attacks. It was also the summer of the shark bite, when extensive media coverage about shark
bites led to the perception that such attacks were on the rise. But there were fewer shark attacks in 2001 than in 2000 and fewer deaths as well, with only four in 2001 as compared to thirteen in 2000.41 And regardless of which
year had more deaths, the number is so low that an attack is a freak occurrence. It is certainly true that our past experience with terrorism might not be a good indicator of the future. More treacherous terrorism is possible, such
as the use of nuclear or biological weapons. This complicates our ability to assess the risk of harm from terrorism. Moreover, the intentional human conduct involved in terrorism creates a sense of outrage and fear that ordinary
deaths do not engender. Alleviating fear must be taken into account, even if such fear is irrationally high in relation to other riskier events such as dying in a car crash. But enlightened policy must not completely give in to the panic
most policymakers find it quite difficult to
assess the threat of terrorism modestly. In the face of widespread public panic, it is hard for government officials to make only moderate changes. Something dramatic must be done,
or political heads will roll. Given the difficulty in assessing the security threat in a more rational manner, it is imperative that the courts meaningfully analyze the effectiveness of security measures. Even if panic and fear
might lead to the gravity of the threat being overstated, we should at least ensure that the measures taken to
promote security are sufficiently effective to justify the cost. Unfortunately, as I will discuss in the next section, rarely do discussions about the sacrifice of civil liberties explain the corresponding
security benefit, why such a benefit cannot be achieved in other ways, and why such a security measure is the best and most rational one to take. Little scrutiny is given to security
measures. They are often just accepted as a given, no matter how ill-conceived or ineffective they might be. Some ineffective security measures are largely symbolic,
and irrational fear of the moment. It should certainly attempt to quell the fear, but it must do so thoughtfully. Nevertheless,
such as the New York City subway search program. The searches are unlikely to catch or deter terrorists because they involve only a miniscule fraction of the millions of daily passengers. Terrorists can just turn to other targets or
simply attempt the bombing on another day or at another train station where searches are not taking place. The vice of symbolic security programs is that they result in needless sacrifices of liberty and drain resources from other,
more effective security measures. Nevertheless, these programs have a virtue—they can ameliorate fear because they are highly visible. Ironically, the subway search program’s primary benefit was alleviating people’s fear (which
was probably too high), albeit in a deceptive manner (as the program did not add much in the way of security).
Data mining represents another kind of security measure, one that currently has little
proven effectiveness and little symbolic value. Data mining programs are often not visible enough to the public to quell much fear. Instead, their benefits come primarily from their actual effectiveness in
reducing terrorist threats, which remains highly speculative. Thus far,
data mining is not very accurate
in the behavioral predictions it makes. For example, there are
approximately 1.8 million airline passengers each day.42 A data mining program to identify terrorists with a false positive rate of 1 percent (which would be exceedingly low for such a program) would flag eighteen thousand people
as false positives. This is quite a large number of innocent people. Why is the government so interested in data mining if it remains unclear whether it will ever be very accurate or workable? Part of the government’s interest in
data mining stems from the aggressive marketing efforts of database companies. After September 11, database companies met with government officials and made a persuasive pitch about the virtues of data mining.43 The
just because data mining might
be effective for businesses trying to predict customer behavior does not make it effective for the
government trying to predict who will engage in terrorism. A high level of accuracy is not necessary when data mining is used by businesses to target
technology sounds quite dazzling when presented by skillful marketers, and it can work quite well in the commercial setting. The problem, however, is that
marketing to consumers, because the cost of error to individuals is minimal. Amazon.com, for example, engages in data mining to determine which books its customers are likely to find of interest by comparing bookbuying
patterns among its customers. Although it is far from precise, it need not be because there are few bad consequences if it makes a wrong book recommendation. Conversely, the consequences are vastly greater for government
I do not believe that the case has been made that data mining is a wise expenditure of
security resources. Those who advocate for security should be just as outraged as those on the liberty side of the debate. Although courts should not micromanage which security measures the government
data mining. Ultimately,
chooses, they should examine the effectiveness of any given security measure to weigh it against the liberty costs. Courts should not tell the executive branch to modify a security measure just because they are not convinced it is
The very point of protecting liberty is to
demand that sacrifices to liberty are not in vain and that security interests, which compromise civil
liberties, are sufficiently effective to warrant the cost.
the best one, but they should tell the executive that a particular security measure is not effective enough to outweigh the liberty costs.
Second - Relative certainty. The disad only may cause violence - surveillance definitely
does. Privacy is paramount for dignity and protecting our unique individuality.
Schneier ‘6
Bruce Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New
America Foundation's Open Technology Institute and the CTO of Resilient Systems. He is the author of Beyond Fear: Thinking
Sensibly About Security in an Uncertain World. Commentary, “The Eternal Value of Privacy”, WIRED, May 18, 2006,
http://www.wired.com/news/columns/1,70886-0.html
The most common retort against privacy advocates -- by those in favor of ID checks, cameras, databases, data mining and
other wholesale surveillance measures -- is this line: "If you aren't doing anything wrong, what do you have to
hide?" Some clever answers: "If I'm not doing anything wrong, then you have no cause to watch me."
"Because the government gets to define what's wrong, and they keep changing the definition." "Because you might do something wrong
with my information." My problem with quips like these -- as right as they are -- is that they accept the premise
that privacy is about hiding a wrong. It's not. Privacy is an inherent human right, and a requirement for
maintaining
the human condition with
dignity and respect. Two proverbs say it best: Quis custodiet custodes ipsos? ("Who watches
the watchers?") and "Absolute power corrupts absolutely." Cardinal Richelieu understood the value of surveillance when he famously said, "If one would give me six
lines written by the hand of the most honest man, I would find something in them to have him hanged." Watch someone long enough, and you'll find something to
arrest -- or just blackmail -- with. Privacy
is important because without it, surveillance information will be
abused : to peep, to sell to marketers and to spy on political enemies -- whoever they happen to be at the time. Privacy protects us from
abuses by those in power, even if we're doing nothing wrong at the time of surveillance. We do nothing wrong
when we make love or go to the bathroom. We are not deliberately hiding anything when we seek out private places for reflection or conversation. We keep private
journals, sing in the privacy of the shower, and write letters to secret lovers and then burn them.
Privacy is a basic human need.
A
future in which privacy would face constant assault was so alien to the framers of the Constitution that it never occurred to them to call out privacy as an explicit
right. Privacy was inherent to the nobility of their being and their cause. Of course being watched in your own home was unreasonable. Watching at all was an act
so unseemly as to be inconceivable among gentlemen in their day. You watched convicted criminals, not free citizens. You ruled your own home. It's intrinsic to the
concept of liberty. For
if we are observed in all matters, we are constantly under threat of correction, judgment,
criticism, even plagiarism
of our own uniqueness . We become children, fettered under watchful eyes, constantly fearful
that -- either now or in the uncertain future -- patterns we leave behind will be brought back to implicate
us, by whatever authority has now become focused upon our once-private and innocent acts. We lose
our individuality , because everything we do is observable and recordable. How many of us have paused
during conversation in the past four-and-a-half years, suddenly aware that we might be eavesdropped on? Probably it
was a phone conversation, although maybe it was an e-mail or instant-message exchange or a conversation in a public place. Maybe
the topic was terrorism, or politics, or Islam. We stop suddenly, momentarily afraid that our words might be
taken out of context, then we laugh at our paranoia and go on. But our demeanor has changed, and our
words are subtly altered. This is the loss of freedom we face when our privacy is taken from us. This is life in former East Germany, or life in Saddam
Hussein's Iraq. And it's our future as we allow an ever-intrusive eye into our personal, private lives. Too many wrongly characterize the
debate as "security versus privacy." The real choice is liberty versus control. Tyranny, whether it arises
under threat of foreign physical attack or under constant domestic authoritative scrutiny, is still
tyranny. Liberty requires security without intrusion, security plus privacy. Widespread police surveillance is the very
definition of a police state. And that's why we should champion privacy even when we have nothing to hide.
The 4th Amendment outweighs. An ethical ballot can’t even consider their security
impact. That would treat privacy as mere inconvenience – obliterating liberty.
Smith ‘14
Peter J. Smith IV – attorney for the law firm LUKINS & ANNIS and Lead Council for This brief was was signed by the entire legal
team, which includes four attorneys from the ELECTRONIC FRONTIER FOUNDATION and three additional attorneys from the
AMERICAN CIVIL LIBERTIES UNION FOUNDATION - APPELLANT’S REPLY BRIEF in the matter of Smith v. Obama – before the
United States Ninth Circuit Court of Appeals. October 16th – available at: https://www.eff.org/document/smiths-reply-brief
The government argues that it would be more convenient for law enforcement if the courts established
a bright-line rule that extinguished all privacy in information shared with others. See Gov’t Br. 40. The government is
surely right about this. The Bill of Rights exists, however, not to serve governmental efficiency but to safeguard
individual liberty. Cf. Bailey v. United States, 133 S. Ct. 1031, 1041 (2013) (“ ‘[T]he mere fact that law enforcement
may be made more efficient can never by itself justify disregard of the Fourth
Amendment .’” (quoting Mincey v. Arizona, 437 U.S. 385, 393 (1978))); Riley, 134 S. Ct. at 2493 (“Our cases have historically recognized that the
warrant requirement is ‘an important working part of our machinery of government,’ not merely
‘an inconvenience to be somehow “weighed” against the claims of police efficiency. ’”
(quoting Coolidge v. New Hampshire, 403 U.S. 443, 481 (1971))). Notably, the government made the same appeal for a bright-line rule in Jones and Maynard, see,
e.g., Brief for the United States at 13, Jones, 132 S. Ct. 945, but the Supreme Court and D.C. Circuit rejected it.
Reject those privacy violations as an a priori imperative. Also proves that the disad’s
all hype.
Wyden ‘14
(et al; This amicus brief issued by three US Senators - Ron Wyden, Mark Udall and Martin Heinrich. Wyden and Udall sat on the
Senate Select Committee on Intelligence and had access to the meta-data program. “BRIEF FOR AMICI CURIAE SENATOR RON
WYDEN, SENATOR MARK UDALL, AND SENATOR MARTIN HEINRICH IN SUPPORT OF PLAINTIFF-APPELLANT, URGING REVERSAL
OF THE DISTRICT COURT” – Amicus Brief for Smith v. Obama – before the United States Ninth Circuit Court of Appeals - Appeal
from the United States District Court District of Idaho The Honorable B. Lynn Winmill, Chief District Judge, Presiding Case No.
2:13-cv-00257-BLW – Sept 9th, 2014 – This Amicus Brief was prepared by CHARLES S. SIMS from the law firm PROSKAUER ROSE
LLP. This pdf can be obtained at: https://www.eff.org/document/wyden-udall-heinrich-smith-amicus)
Respect for Americans’ privacy is not a matter of convenience, but a Constitutional imperative .
Despite years of receiving classified briefings and asking repeated questions of intelligence officials in both
have seen no evidence that bulk collection accomplishes anything
that other less intrusive surveillance authorities could not. Bulk collection is not only a significant threat
to the constitutional liberties of Americans, but a needless one.9
private and public settings, amici
Reject utilitarianism. It shatters all ethics and justifies the worst atrocities.
Holt ‘95
(Jim Holt is an American philosopher, author and essayist. He has contributed to The New York Times, The New York Times
Magazine, The New York Review of Books, The New Yorker, The American Scholar, and Slate. He hosted a weekly radio spot on
BBC for ten years and he writes frequently about politics and philosophy. New York Times, “Morality, Reduced To Arithmetic,”
August 5, p. Lexis)
Can the deliberate massacre of innocent people ever be condoned? The atomic bombs dropped on Hiroshima and Nagasaki on Aug. 6 and 9, 1945, resulted in the deaths of 120,000 to 250,000
Japanese by incineration and radiation poisoning. Although a small fraction of the victims were soldiers, the great majority were noncombatants -- women, children, the aged. Among the
justifications that have been put forward for President Harry Truman’s decision to use the bomb, only one is worth taking seriously -- that it saved lives. The alternative, the reasoning goes,
was to launch an invasion. Truman claimed in his memoirs that this would have cost another half a million American lives. Winston Churchill put the figure at a million. Revisionist historians
have cast doubt on such numbers. Wartime documents suggest that military planners expected around 50,000 American combat deaths in an invasion. Still, when Japanese casualties, military
and civilian, are taken into account, the overall invasion death toll on both sides would surely have ended up surpassing that from Hiroshima and Nagasaki. Scholars will continue to argue over
whether there were other, less catastrophic ways to force Tokyo to surrender. But given the fierce obstinacy of the Japanese militarists, Truman and his advisers had some grounds for
believing that nothing short of a full-scale invasion or the annihilation of a big city with an apocalyptic new weapon would have succeeded. Suppose they were right. Would this prospect have
In the debate over the question, participants on both sides have been playing the
numbers game. Estimate the hypothetical number of lives saved by the bombings, then add up the actual lives
lost. If the first number exceeds the second, then Truman did the right thing; if the reverse, it was wrong to have dropped the bombs. That is one approach to the matter -- the utilitarian
approach. According to utilitarianism, a form of moral reasoning that arose in the 19th century, the goodness or evil of an action is determined
justified the intentional mass killing of the people of Hiroshima and Nagasaki?
solely by its consequences. If somehow you can save 10 lives by boiling a baby, go ahead and boil that
baby . There is, however, an older ethical tradition, one rooted in Judeo-Christian theology, that takes a quite different view. The gist of it is
Some actions, this tradition holds, can never be justified by
their consequences; they are absolutely forbidden. It is always wrong to boil a baby even if lives are
saved thereby. Applying this absolutist morality to war can be tricky. When enemy soldiers are trying to enslave or kill us, the principle of self-defense permits us to kill them
expressed by St. Paul’s condemnation of those who say, “Let us do evil, that good may come.”
(though not to slaughter them once they are taken prisoner). But what of those who back them? During World War II, propagandists made much of the “indivisibility” of modern warfare: the
idea was that since the enemy nation’s entire economic and social strength was deployed behind its military forces, the whole population was a legitimate target for obliteration. “There are no
civilians in Japan,” declared an intelligence officer of the Fifth Air Force shortly before the Hiroshima bombing, a time when the Japanese were popularly depicted as vermin worthy of
extermination. The boundary between combatant and noncombatant can be fuzzy, but the distinction is not meaningless, as the case of small children makes clear. Yet is wartime killing of
those who are not trying to harm us always tantamount to murder? When naval dockyards, munitions factories and supply lines are bombed, civilian carnage is inevitable. The absolutist moral
tradition acknowledges this by a principle known as double effect: although it is always wrong to kill innocents deliberately, it is sometimes permissible to attack a military target knowing some
noncombatants will die as a side effect. The doctrine of double effect might even justify bombing a hospital where Hitler is lying ill. It does not, however, apply to Hiroshima and Nagasaki.
Transformed into hostages by the technology of aerial bombardment, the people of those cities were intentionally executed en masse to send a message of terror to the rulers of Japan. The
practice of ordering the massacre of civilians to bring the enemy to heel scarcely began with Truman. Nor did the bomb result in casualties of a new order of magnitude. The earlier bombing of
Tokyo by incendiary weapons killed some 100,000 people. What Hiroshima and Nagasaki did mark, by the unprecedented need for rationalization they presented, was the triumph of
utilitarian thinking in the conduct of war. The conventional code of noncombatant immunity -- a product of several centuries of ethical progress among nations, which had
been formalized by an international commission in the 1920’s in the Hague -- was swept away. A simpler axiom took its place: since war is hell, any means necessary may be used to end, in
Churchill’s words, “the vast indefinite butchery.” It
is a moral calculus that, for all its logical consistency, offends
our deep-seated intuitions about
the
sanctity of life -- our conviction that a person is always to be treated as an end, never as a means. Left up to
the warmakers, moreover, utilitarian calculations are susceptible to bad-faith reasoning: tinker with the
numbers enough and virtually any atrocity can be excused in the national interest. In January, the
world commemorated the 50th anniversary of the liberation of Auschwitz, where mass slaughter was committed as an end in itself -- the ultimate evil. The moral nature of Hiroshima is
the bomb’s sinister legacy is
plain: it has inured us to the idea of reducing innocents to instruments and morality to arithmetic.
ambiguous by contrast. Yet in the postwar era, when governments do not hesitate to treat the massacre of civilians as just another strategic option,
Privacy Advantage 1AC – shorter version
Privacy Advantage – shorter version
Contention # ____ is Privacy
Privacy outweighs.
- Utilitarian impact calc is biased. It inflates the disad’s risk; and
- Reject Surveillance as a structural matter of power – even when “reformed”,
innocents experience powerless unless neutral oversight’s in place.
Solove ‘7
Daniel Solove is an Associate Professor at George Washington University Law School and holds a J.D. from Yale Law School. He
is one of the world’s leading expert in information privacy law and is well known for his academic work on privacy and for
popular books on how privacy relates with information technology. He has written 9 books and more than 50 law review
articles – From the Article ““I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy” - San Diego Law Review, Vol.
44, p. 745 - GWU Law School Public Law Research Paper No. 289 – available from download at:
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
It is time to return to the
nothing to hide argument . The reasoning of this argument is that when it comes to
government surveillance or use of personal data, there is no privacy violation if a person has nothing sensitive,
embarrassing, or illegal to conceal. Criminals involved in illicit activities have something to fear, but for the vast majority of
people, their activities are not illegal or embarrassing. Understanding privacy as I have set forth reveals the flaw of the nothing to hide argument at its roots. Many
commentators who respond to the argument attempt a direct refutation by trying to point to things that people would want to hide. But the problem with the
nothing to hide argument is the underlying assumption that privacy is about hiding bad things. Agreeing
with this assumption concedes far
too much ground and leads to an unproductive discussion of information people would likely want or not want to hide. As Bruce
Schneier aptly notes, the nothing to hide argument stems from a faulty “premise that privacy is about hiding a
wrong.”75 The deeper problem with the nothing to hide argument is that it myopically views privacy as a form of concealment or secrecy. But understanding
privacy as a plurality of related problems demonstrates that concealment of bad things is just one among many problems caused by government programs such as
the NSA surveillance and data mining. In the categories in my taxonomy, several problems are implicated. The
NSA programs involve problems of
information collection, specifically the category of surveillance in the taxonomy. Wiretapping involves audio surveillance of people’s conversations.
Data mining often begins with the collection of personal information, usually from various third parties that possess people’s data. Under current Supreme Court
Fourth Amendment jurisprudence, when the government gathers data from third parties, there is no Fourth Amendment protection because people lack a
“reasonable expectation of privacy” in information exposed to others.76 In United States v. Miller, the Supreme Court concluded that there is no reasonable
expectation of privacy in bank records because “[a]ll of the documents obtained, including financial statements and deposit slips, contain only information
voluntarily conveyed to the banks and exposed to their employees in the ordinary course of business.”77 In Smith v. Maryland, the Supreme Court held that people
lack a reasonable expectation of privacy in the phone numbers they dial because they “know that they must convey numerical information to the phone company,”
and therefore they cannot “harbor any general expectation that the numbers they dial will remain secret.”78 As I have argued extensively elsewhere, the lack of
Fourth Amendment protection of third party records results in the government’s ability to access an extensive amount of personal information with minimal
limitation or oversight.79 Many scholars have referred to information collection as a form of surveillance. Dataveillance, a term coined by Roger Clarke, refers to the
“systemic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons.”80 Christopher Slobogin has
referred to the gathering of personal information in business records as “transaction surveillance.”81 Surveillance
can create chilling effects
on free speech, free association, and other First Amendment rights essential for democracy.82 Even
surveillance of legal activities can inhibit people from engaging in them. The value of protecting against
chilling effects is not measured simply by focusing on the particular individuals who are deterred from
exercising their rights. Chilling effects harm society because, among other things, they reduce the range of
viewpoints expressed and the degree of freedom with which to engage in political activity. The nothing to hide
argument focuses primarily on the information collection problems associated with the NSA programs. It contends that limited surveillance of lawful activity will not
chill behavior sufficiently to outweigh the security benefits. One can certainly quarrel with this argument, but one of the difficulties with chilling effects is that it is
often very hard to demonstrate concrete evidence of deterred behavior.83 Whether the NSA’s surveillance and collection of telephone records has deterred people
from communicating particular ideas would be a difficult question to answer. Far too often, discussions of the NSA surveillance and data mining define the problem
solely in terms of surveillance. To return to my discussion of metaphor, the problems are not just Orwellian, but Kafkaesque. The
NSA programs are
problematic even if no information people want to hide is uncovered. In The Trial, the problem is not inhibited
behavior, but rather
a suffocating powerlessness and vulnerability created by the court system’s use of
personal data and its exclusion of the protagonist from having any knowledge or participation in the process. The harms consist of those created by
bureaucracies—indifference, errors, abuses, frustration, and lack of transparency and accountability. One such harm, for example, which I call aggregation, emerges
from the combination of small bits of seemingly innocuous data.84 When combined, the information becomes much more telling about a person. For the person
who truly has nothing to hide, aggregation is not much of a problem. But in the stronger, less absolutist form of the nothing to hide argument, people argue that
certain pieces of information are not something they would hide. Aggregation, however, means that by combining pieces of information we might not care to
conceal, the government can glean information about us that we might really want to conceal. Part of the
allure of data mining for the
government is its ability to reveal a lot about our personalities and activities by sophisticated means of analyzing data. Therefore,
without greater transparency in data mining, it is hard to claim that programs like the NSA data mining program will not
reveal information people might want to hide, as we do not know precisely what is revealed. Moreover, data mining aims to be predictive
of behavior, striving to prognosticate about our future actions. People who match certain profiles are deemed likely to engage in a similar pattern of behavior. It is
quite difficult to refute actions that one has not yet done. Having nothing to hide will not always dispel predictions of future activity. Another
problem in
the taxonomy, which is implicated by the NSA program, is the problem I refer to as exclusion.85 Exclusion is the problem caused when people are
prevented from having knowledge about how their information is being used, as well as barred from being able to access and correct errors in that data. The NSA
program involves a massive database of information that individuals cannot access. Indeed, the very existence of the program was kept secret for years.86 This kind
of information processing, which forbids people’s knowledge or involvement, resembles in some ways a kind of due process problem. It is a structural problem
involving the way people are treated by government institutions. Moreover, it creates a power imbalance between individuals and the government. To what extent
should the Executive Branch and an agency such as the NSA, which is relatively insulated from the political process and public accountability, have a significant
power over citizens? This
issue is not about whether the information gathered is something people want to
hide, but rather about the power and the structure of government. A related problem involves “secondary use.” Secondary
use is the use of data obtained for one purpose for a different unrelated purpose without the person’s consent. The Administration has said little about how long
the data will be stored, how it will be used, and what it could be used for in the future. The potential future uses of any piece of personal information are vast, and
without limits or accountability on how that information is used, it is hard for people to assess the dangers of the data being in the government’s control. Therefore,
the problem with the nothing to hide argument is that it focuses on just one or two particular kinds of privacy problems—the disclosure of personal information or
surveillance—and not others. It assumes a particular view about what privacy entails, and it sets
important to distinguish here between two ways of
the terms for debate in a manner that is often unproductive. It is
justifying a program such as the NSA surveillance
and data mining program. The first
way is to not recognize a problem. This is how the nothing to hide argument works—it denies even the existence of a problem. The second manner of justifying such
a program is
to acknowledge the problems but contend that the benefits of the NSA program outweigh
the privacy harms . The first justification influences the second, because the low value given to privacy is based upon a narrow view of the problem.
The key misunderstanding is that the nothing to hide argument views privacy in a particular way—as a form of secrecy, as
the right to hide things. But there are many other types of harm involved beyond exposing one’s
secrets to the government. Privacy problems are often difficult to recognize and redress because they create a panoply of types of harm. Courts,
legislators, and others look for particular types of harm to the exclusion of others, and their narrow focus blinds them to seeing other kinds of harms. One of the
difficulties with the nothing to hide argument
is that it looks for a visceral kind of injury as opposed to a
structural one . Ironically, this underlying conception of injury is shared by both those advocating for greater privacy protections and those arguing
in favor of the conflicting interests to privacy. For example, law professor Ann Bartow argues that I have failed to describe
privacy harms in a compelling manner in my article, A Taxonomy of Privacy, where I provide a framework for understanding the manifold different privacy
problems.87 Bartow’s primary complaint is that my taxonomy “frames privacy harms in dry, analytical terms that fail to sufficiently identify and animate the
compelling ways that privacy violations can negatively impact the lives of living, breathing human beings beyond simply provoking feelings of unease.”88 Bartow
claims that the taxonomy
does not have “enough dead bodies” and that privacy’s “lack of blood and death,
or at least of broken bones and buckets of money, distances privacy harms from other categories of tort law. Most
privacy problems lack dead bodies. Of course, there are exceptional cases such as the murders of Rebecca Shaeffer and Amy Boyer. Rebecca
Shaeffer was an actress killed when a stalker obtained her address from a Department of Motor Vehicles record.90 This incident prompted Congress to pass the
Driver’s Privacy Protection Act of 1994.91 Amy Boyer was murdered by a stalker who obtained her personal information, including her work address and Social
Security number, from a database company.92 These examples aside, there is not a lot of death and gore in privacy law. If this is the standard to recognize a
problem, then few privacy problems will be recognized. Horrific cases are not typical, and the purpose of my taxonomy is to explain why most privacy problems are
still harmful despite this fact. Bartow’s objection is actually very similar to the nothing to hide argument. Those
advancing the nothing to hide
argument have in mind a particular kind of visceral privacy harm, one where privacy is violated only when something deeply embarrassing or
discrediting is revealed. Bartow’s
quest for horror stories represents a similar desire to find visceral privacy harms. The problem is that not all
privacy harms are like this. At the end of the day, privacy
is not a horror movie, and demanding more palpable harms will be difficult in many cases.
Yet there is still a harm worth addressing, even if it is not sensationalistic.
In many instances, privacy is
threatened not by singular egregious acts, but by a slow series of relatively minor acts which gradually begin to add up. In this way, privacy problems resemble
certain environmental harms which occur over time through a series of small acts by different actors. Bartow wants to point to a major spill, but gradual pollution by
a multitude of different actors often creates worse problems. The law frequently struggles with recognizing harms that do not result in embarrassment, humiliation,
or physical or psychological injury.93 For example, after the September 11 attacks, several airlines gave their passenger records to federal agencies in direct
violation of their privacy policies. The federal agencies used the data to study airline security.94 A group of passengers sued Northwest Airlines for disclosing their
personal information. One of their claims was that Northwest Airlines breached its contract with the passengers. In Dyer v. Northwest Airlines Corp., the court
rejected the contract claim because “broad statements of company policy do not generally give rise to contract claims,” the passengers never claimed they relied
upon the policy or even read it, and they “failed to allege any contractual damages arising out of the alleged breach.”95 Another court reached a similar
conclusion.96 Regardless of the merits of the decisions on contract law, the cases represent a difficulty with the legal system in addressing privacy problems. The
disclosure of the passenger records represented a “breach of confidentiality.”97 The problems caused by breaches of confidentiality do not merely consist of
individual emotional distress; they involve a violation of trust within a relationship. There is a strong social value in ensuring that promises are kept and that trust is
maintained in relationships between businesses and their customers. The problem of secondary use is also implicated in this case.98 Secondary use involves data
collected for one purpose being used for an unrelated purpose without people’s consent. The airlines gave passenger information to the government for an entirely
different purpose beyond that for which it was originally gathered. Secondary use problems often do not cause financial, or even psychological, injuries. Instead, the
harm is one of power imbalance. In Dyer, data was disseminated in a way that ignored airline passengers’ interests in the data despite promises made in the privacy
policy. Even if the passengers were unaware of the policy, there is a social value in ensuring that companies adhere to established limits on the way they use
personal information. Otherwise, any stated limits become meaningless, and companies have discretion to boundlessly use data. Such a state of affairs can leave
nearly all consumers in a powerless position. The harm, then, is less one to particular individuals than it is a structural harm. A similar problem surfaces in another
case, Smith v. Chase Manhattan Bank.99 A group of plaintiffs sued Chase Manhattan Bank for selling customer information to third parties in violation of its privacy
policy, which stated that the information would remain confidential. The court held that even presuming these allegations were true, the plaintiffs could not prove
any actual injury: [T]he “harm” at the heart of this purported class action, is that class members were merely offered products and services which they were free to
decline. This does not qualify as actual harm. The complaint does not allege any single instance where a named plaintiff or any class member suffered any actual
harm due to the receipt of an unwanted telephone solicitation or a piece of junk mail.100 The court’s view of harm, however, did not account for the breach of
confidentiality. When
balancing privacy against security, the privacy harms are often characterized in terms of
injuries to the individual, and the interest in security is often characterized in a more broad societal way. The
security interest in the NSA programs has often been defined improperly. In a Congressional hearing, Attorney General
Alberto Gonzales stated: Our enemy is listening, and I cannot help but wonder if they are not shaking their heads in amazement at the thought that anyone would
imperil such a sensitive program by leaking its existence in the first place, and smiling at the prospect that we might now disclose even more or perhaps even
unilaterally disarm ourselves of a key tool in the war on terror.101 The balance between privacy and security is often cast in terms of whether a particular
government information collection activity should or should not be barred. The
issue, however, often is not whether the NSA or other government
agencies should be allowed to engage in particular forms of information gathering; rather, it is what kinds of
oversight and accountability we want in place when the government engages in searches and seizures. The government can
employ nearly any kind of investigatory activity with a warrant supported by probable cause. This is a mechanism of oversight—it
forces government officials to justify their suspicions to a neutral judge or magistrate before engaging in the tactic. For
example, electronic surveillance law allows for wiretapping, but limits the practice with judicial supervision, procedures to minimize the breadth of the wiretapping,
and requirements that the law enforcement officials report back to the court to prevent abuses.102 It is these procedures that the Bush Administration has ignored
by engaging in the warrantless NSA surveillance. The question is not whether we want the government to monitor such conversations, but whether the Executive
Branch should adhere to the appropriate oversight procedures that Congress has enacted into law, or should covertly ignore any oversight. Therefore, the security
interest should not get weighed in its totality against the privacy interest. Rather, what should get weighed is the extent of marginal limitation on the effectiveness
of a government information gathering or data mining program by imposing judicial oversight and minimization procedures. Only in cases where such procedures
will completely impair the government program should the security interest be weighed in total, rather than in the marginal difference between an unencumbered
program versus a limited one. Far too
often, the balancing of privacy interests against security interests takes place in a
manner that severely shortchanges the privacy interest while inflating the security interests . Such is the
logic of the nothing to hide argument. When
examined
the argument is unpacked, and its underlying assumptions
can see how it shifts the debate to its terms , in which it draws power from its
unfair advantage. It is time to pull the curtain on the nothing to hide argument. Whether explicit or not, conceptions of privacy underpin
and challenged, we
nearly every argument made about privacy, even the common quip “I’ve got nothing to hide.” As I have sought to demonstrate in this essay, understanding privacy
as a pluralistic conception reveals that we are often talking past each other when discussing privacy issues. By focusing more specifically on the related problems
under the rubric of “privacy,” we can better address each problem rather than ignore or conflate them. The nothing to hide argument speaks to some
problems, but not to others. It represents
a singular and narrow way of conceiving of privacy, and it wins by excluding
consideration of the other problems often raised in government surveillance and data mining
programs. When engaged with directly, the nothing to hide argument can ensnare, for it forces the debate to focus on its narrow understanding of privacy. But
when confronted with the plurality of privacy problems implicated by government data collection and use beyond
surveillance and disclosure, the nothing to hide argument, in the end, has nothing to say.
Reject utilitarianism and put privacy before security. The ballot should create a side
constraint where ends don’t justify the means. This is especially applies to data
collection in the absence of probable cause.
Albright ‘14
Logan Albright is the Research Analyst at FreedomWorks, and is responsible for producing a wide variety of written content for
print and the web, as well as conducting research for staff media appearances and special projects. He received his Master’s
degree in economics from Georgia State University. “The NSA's Collateral Spying” – Freedom Works - 07/08/2014 http://www.freedomworks.org/content/nsas-collateral-spying
In short, the report, based on information obtained by Edward Snowden, reveals that during the course of its ordinary, otherwise legal surveillance operations,
the NSA also collected data on large numbers of people who were not specifically targeted. The agency
calls this practice “incidental surveillance.” I call it “collateral spying.” The report found that, on average, 9 out of every 10 people
spied on were not the intended target. The NSA has the legal authority to obtain a warrant based on
probable cause in order to surveil an individual. No one is disputing that. But when this targeting results
in collateral spying on vast numbers of innocents, in the absence of probable cause and the corresponding warrants, that is a
major problem. The NSA has asserted that such incidental data collection is inevitable, and to a certain extent that’s likely true. It is
should obviously be
minimized as far as possible , and at the very least the information should be immediately
purged from government databases , not stored for years on end. In any case, the whole situation is indicative of
understandable that in some situations the NSA may learn information about people other than the direct target, but this
the agency’s cavalier attitude towards individual rights. While
national security is a concern we all share, the ends do not justify
the means when those means involve violate the constitutional protections afforded to citizens by our nation’s founders. It is
not okay to violate the rights of an innocent in the process of achieving a broader goal, even
if that goal is noble. The way the NSA has been behaving is Machiavellian in the most literal sense. In his 16th century
political treatise, The Prince, Niccolo Machiavelli recognized a harsh reality of politics that still plagues us half a millennium later, writing, “A prince wishing to keep
his state is very often forced to do evil.” Taking Machiavelli’s advice as a
green light for immoral behavior has been the problem with
governments throughout history, a problem the founding fathers sought to avoid by setting down precise guidelines for what the government could and could not
do in the form of a Constitution. The disregard of these rules, and the
argument that there should be a national security
exception to the Fourth Amendment, undermines the entire purpose of the American experiment, and restores the European-style
tyrannies the revolutionaries fought against.
Even in a utilitarian framework, privacy outweighs due to relative certainty. The disad
only may cause violence - surveillance definitely does. Privacy is paramount for dignity
and protecting our unique individuality.
Schneier ‘6
Bruce Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New
America Foundation's Open Technology Institute and the CTO of Resilient Systems. He is the author of Beyond Fear: Thinking
Sensibly About Security in an Uncertain World. Commentary, “The Eternal Value of Privacy”, WIRED, May 18, 2006,
http://www.wired.com/news/columns/1,70886-0.html
The most common retort against privacy advocates -- by those in favor of ID checks, cameras, databases, data mining and
other wholesale surveillance measures -- is this line: "If you aren't doing anything wrong, what do you have to
hide?" Some clever answers: "If I'm not doing anything wrong, then you have no cause to watch me."
"Because the government gets to define what's wrong, and they keep changing the definition." "Because you might do something wrong
with my information." My problem with quips like these -- as right as they are -- is that they accept the premise
that privacy is about hiding a wrong. It's not. Privacy is an inherent human right, and a requirement for
maintaining
the human condition with
dignity and respect. Two proverbs say it best: Quis custodiet custodes ipsos? ("Who watches
the watchers?") and "Absolute power corrupts absolutely." Cardinal Richelieu understood the value of surveillance when he famously said, "If one would give me six
lines written by the hand of the most honest man, I would find something in them to have him hanged." Watch someone long enough, and you'll find something to
arrest -- or just blackmail -- with. Privacy
is important because without it, surveillance information will be
abused : to peep, to sell to marketers and to spy on political enemies -- whoever they happen to be at the time. Privacy protects us from
abuses by those in power, even if we're doing nothing wrong at the time of surveillance. We do nothing wrong
when we make love or go to the bathroom. We are not deliberately hiding anything when we seek out private places for reflection or conversation. We keep private
journals, sing in the privacy of the shower, and write letters to secret lovers and then burn them.
Privacy is a basic human need.
A
future in which privacy would face constant assault was so alien to the framers of the Constitution that it never occurred to them to call out privacy as an explicit
right. Privacy was inherent to the nobility of their being and their cause. Of course being watched in your own home was unreasonable. Watching at all was an act
so unseemly as to be inconceivable among gentlemen in their day. You watched convicted criminals, not free citizens. You ruled your own home. It's intrinsic to the
concept of liberty. For
if we are observed in all matters, we are constantly under threat of correction, judgment,
criticism, even plagiarism
of our own uniqueness . We become children, fettered under watchful eyes, constantly fearful
that -- either now or in the uncertain future -- patterns we leave behind will be brought back to implicate
us, by whatever authority has now become focused upon our once-private and innocent acts. We lose
our individuality , because everything we do is observable and recordable. How many of us have paused
during conversation in the past four-and-a-half years, suddenly aware that we might be eavesdropped on? Probably it
was a phone conversation, although maybe it was an e-mail or instant-message exchange or a conversation in a public place. Maybe
the topic was terrorism, or politics, or Islam. We stop suddenly, momentarily afraid that our words might be
taken out of context, then we laugh at our paranoia and go on. But our demeanor has changed, and our
words are subtly altered. This is the loss of freedom we face when our privacy is taken from us. This is life in former East Germany, or life in Saddam
Hussein's Iraq. And it's our future as we allow an ever-intrusive eye into our personal, private lives. Too many wrongly characterize the
debate as "security versus privacy." The real choice is liberty versus control. Tyranny, whether it arises
under threat of foreign physical attack or under constant domestic authoritative scrutiny, is still
tyranny. Liberty requires security without intrusion, security plus privacy. Widespread police surveillance is the very
definition of a police state. And that's why we should champion privacy even when we have nothing to hide.
1AC – Bigotry Advantage
Bigotry Advantage 1AC – Longer version
Bigotry Advantage – long version
Contention # ____ is Bigotry
Warrantless surveillance boosts a distinct form of racial, religious, and ethnic
discrimination. The Neg’s security interests only drive this racialized violence.
Unegbu ‘13
Cindy C. Unegbu - J.D. Candidate, Howard University School of Law - NOTE AND COMMENT: National Security Surveillance on
the Basis of Race, Ethnicity, and Religion: A Constitutional Misstep - Howard Law Journal - 57 How. L.J. 433 - Fall, 2013 – lexis;
lawrev
Picture this: you live in a society in which the government is allowed to partake in intrusive surveillance
measures without the institutionalized checks and balances upon which the government was founded. In this society, the
government pursues citizens who belong to a particular race or ethnicity, practice a certain religion, or have affiliations with
specific interest groups. Individuals who have these characteristics are subject to surreptitious monitoring, which
includes undercover government officials disguising themselves as community members in order to attend various community events and programs. The government may
also place these individuals on watch lists, even where there is no evidence of wrongdoing. These watch lists classify
domestic individuals as potential or suspected terrorists and facilitate the monitoring of their personal activity through various law enforcement agencies for an extended period of time.
This "hypothetical" society is not hypothetical at all; in fact, it is the current state of American
surveillance. The government's domestic spying activities have progressed to intrusive levels,
primarily due to an increased fear of terrorism . n1 This fear has resulted in governmental intelligence
efforts that are focused on political activists, racial and religious minorities, and immigrants. n2 [*435] The
government's domestic surveillance efforts are not only geared toward suspected terrorists and those partaking in criminal activity, but reach any
innocent, non-criminal, non-terrorist national, all in the name of national security. The government's power
to engage in suspicionless surveillance and track innocent citizens' sensitive information has been granted through the creation and revision of the National
Counterterrorism Center n3 and the FBI's (Federal Bureau of Investigation) Domestic Investigations and Operations Guide. n4 The grant of surveillance power has resulted in many opponents,
including those within the current presidential administration, who challenge the order for numerous reasons. n5 These reasons include the inefficiency of storing citizens' random personal
information for extended periods of time, n6 the broad unprecedented authority granted to this body of government without proper approval from Congress, n7 and the constitutional
violations due to the deprivation of citizens' rights. n8 [*436] This Comment argues that the wide-sweeping surveillance authority granted to the government
results in a violation of
the Fourteenth Amendment's Equal Protection Clause due to far-reaching domestic monitoring practices. Surveillance practices, such as posing as members of the community and placing
individuals on watch lists without suspicion of terrorist activity, result in the
impermissible monitoring of individuals on the basis of their
race or ethnicity . These practices, although done in the name of national security, an established compelling government interest, violate the Equal Protection Clause of
the Fourteenth Amendment because they are not narrowly tailored to the stated interest.
The procedures are not narrowly tailored to the
interest of national security because of the over-inclusiveness of the measures .
Warrantless mass surveillance is racist. Vote Aff to prioritize these under-represented
impacts in public debates.
Kumar & Kundnani ‘15
Deepa Kumar is an associate professor of Media Studies and Middle East Studies at Rutgers University. She is the author of
Islamophobia and the Politics of Empire (Haymarket Books, 2012). Arun Kundnani is research fellow at the International Centre
for Counter-Terrorism. He is a writer and activist, and a professor at NYU. “Race, surveillance, and empire” – International
Socialist Review - Issue #96 – Spring - http://isreview.org/issue/96/race-surveillance-and-empire
Beginning in June 2013, a series of news articles
based on whistle-blower Edward Snowden’s collection of documents from the
National Security Agency (NSA) took the world by storm. Over the course of a year, the Snowden material provided a
detailed account of the massive extent of NSA’s warrantless data collection . What became clear was
that the NSA was involved in the mass collection of online material. Less apparent was how this data was actually used by the
NSA and other national security agencies. Part of the answer came in July 2014 when Glenn Greenwald and Murtaza Hussain
published an article that identified specific targets of NSA surveillance and showed how individuals were being
placed under surveillance despite there being no reasonable suspicion of their involvement in criminal
activity.1 All of those named as targets were prominent Muslim Americans. The following month, Jeremy Scahill and Ryan
Devereaux published another story for The Intercept, which revealed that under the Obama administration the number of people
on the National Counterterrorism Center’s no-fly list had increased tenfold to 47,000. Leaked classified documents showed that the NCC
maintains a database of terrorism suspects worldwide—the Terrorist Identities Datamart Environment—which contained a million names by 2013, double the
number four years earlier, and increasingly includes biometric data. This
database includes 20,800 persons within the United
States who are disproportionately concentrated in Dearborn, Michigan, with its significant Arab
American population.2 By any objective standard, these were major news stories that ought to have attracted as much attention as the earlier
revelations. Yet the stories barely registered in the corporate media landscape. The “tech community,” which had earlier expressed outrage at the NSA’s mass
digital surveillance, seemed to be indifferent when details emerged of the targeted surveillance of Muslims. The explanation for this reaction is not hard to find.
While many object to the US government collecting private data on “ordinary” people, Muslims tend to be
seen as reasonable targets of suspicion. A July 2014 poll for the Arab American Institute found that 42 percent of Americans think it is
justifiable for law enforcement agencies to profile Arab Americans or American Muslims.3 In what follows, we argue that the
debate on national
security surveillance that has emerged in the United States since the summer of 2013 is woefully inadequate, due
to its failure to place questions of race and empire at the center of its analysis. It is racist ideas that form the
basis for the ways national security surveillance is organized and deployed, racist fears that are whipped up to
legitimize this surveillance to the American public, and the disproportionately targeted racialized groups that have been most effective in making
sense of it and organizing opposition. This is as true today as it has been historically: race and state surveillance are intertwined in the history of US capitalism.
Likewise, we argue that the history of national security surveillance in the United States is inseparable from the history of US colonialism and empire.
Most everyone violates some law from time-to-time. Mass surveillance results in
selective enforcement that disproportionately impacts those lacking privilege.
Stanfill ‘13
Mel - The author now holds a Ph.D. from the University of Illinois, Urbana-Champaign in Communications and Media. The
Author was working on that PhD at this time of this writing. When this piece was written, the author held an M.A. from
California State University, East Bay in Media and Cultural Studies and had Graduate minors in Gender and Women’s Studies
and Queer Studies. The author also held a B.A. from University of California, Berkeley - English with Distinction in General
Scholarship. At the time of this writing, the author had published several Peer-Reviewed Publications. The author is internally
quoting Daniel J. Solove is the John Marshall Harlan Research Professor of Law at the George Washington University Law
School. “NSA Prism Part III: Due Process and Presumed Guilty” - July 1, 2013 – http://www.melstanfill.com/nsa-prism-part-iiidue-process-and-presumed-guilty/
Posing this as a due process question could be the way to get some traction in light of the nonchalance about privacy discussed last week: The problem with NSA
PRISM is that we are all being treated as guilty until proven innocent. This has been going on since 9/11, of course, with airport security being one highly visible
iteration, but there’s a chance that this new level of awareness of just how much everyone is being treated as criminal without due process of law could be the
straw. Solove describes the stakes well: “Even
if a person is doing nothing wrong, in a free society, that person shouldn’t have
to justify every action that government officials might view as suspicious. A key component of freedom
is not having to worry about how to explain oneself all the time.” Crossing this line into blanket assumption of guilt is what
animates the Stop Watching US petition, which says “the contents of communications of people both abroad and in the U.S. can be swept in without any suspicion
of crime or association with a terrorist organization,” though they tie their concern to the 1st and 4th amendment and “citizens’ right to speak and associate
anonymously, guard against unreasonable searches and seizures, and protect their right to privacy” without mentioning due process. (That people feel due process
has gone out the window is clear from the fact that RootsAction sent me a petition to President Obama “not to engage in any abduction or other foul play against
Snowden,” ironic when the administration’s line on why they’re disappointed that Hong Kong let him leave is that they want there to be rule of law.) Wired perhaps
elaborates the worst-case-scenario best: “Police
already abuse the immense power they have, but if everyone’s every
action were being monitored, and everyone technically violates some obscure law at some time, then
punishment becomes purely selective . Those in power will essentially have what they need to punish
anyone they’d like, whenever they choose, as if there were no rules at all.” Of course, black and Latino citizens have
been living under presumed-guilty, surveilled-within-an inch-of-their-lives, selectively-punished conditions for decades:
they’re more likely to get caught at things white folks also do and be punished more
harshly for them, even as early as middle school (see Ann Ferguson’s Bad Boys). Muslim and Arab citizens have been living
under it since 9/11.
Reject this discrimination as an unacceptable wrong that must be rejected as an end
onto itself.
Shamsi ‘14
(et al; Hina Shamsi is a lecturer-in-law at Columbia Law School, where she teaches a course in international human rights. She is
also the Director of the ACLU’s National Security Project, which is dedicated to ensuring that U.S. national security policies and
practices are consistent with the Constitution, civil liberties, and human rights. She has litigated cases upholding the freedoms
of speech and association, and challenging targeted killing, torture, unlawful detention, and post-9/11 discrimination against
racial and religious minorities. Her work includes a focus on the intersection of national security and counterterrorism policies
with international human rights and humanitarian law. She also served as Senior Advisor to the U.N. Special Rapporteur on
Extrajudicial Executions. Hina is a graduate of Mount Holyoke College and Northwestern University School of Law. “The
Perversity of Profiling” – April 14th – available at the ACLU website - https://www.aclu.org/blog/perversity-profiling)
Using expanded authorities that permit investigations without
actual
evidence of wrongdoing , the FBI
has also targeted minority communities for interviews based on race, ethnicity, national origin, and religion. It
has used informants to conduct surveillance in community centers, mosques, and other public gathering places and against people exercising their First Amendment
right to worship or to engage in political advocacy. And among
America’s minority communities, “flying while brown” soon
joined “driving while black” as a truism of government-sanctioned discrimination and stigma. It’s hard to
overstate the damage done to the FBI’s relationship with minorities, particularly American Muslims. The damage,
spread further. When federal law enforcement leads in discriminatory profiling, state and local
law enforcement will follow. Nowhere is that clearer than in New York City, where the NYPD – which is twice the size of the
however, has
FBI – launched
a massive program of discriminatory surveillance and investigation of American Muslims,
mapping the places where they carry out daily activities and sending informants to spy on mosques and Muslim community organizations, student groups, and
businesses. After the Associated Press broke a series of stories describing this program in stark and shocking detail, the
NYPD defended itself,
arguing that it was only doing what the FBI was permitted to do. Again, it’s hard to overstate the harm.
From the ACLU’s work with New York’s Muslim communities, we know that a generation of youth is
growing up fearful of its local police force, scared to exercise the rights to freedom of worship, speech, and
association. Fortunately, the issuance of the revised Guidance on Race has been delayed and both the Justice Department and the civil rights community
have a crucial opportunity to put a spotlight on the FBI, which vigorously opposes those fighting for equality. According to the New York Times, the FBI’s
argument seems to be that it needs to identify where Somalis live to investigate potential Somali terrorism suspects.
But that argument must be rejected for the same reason that we reject it in other contexts .
Many mass shooters are young white males, yet we rightly don’t map where whites live or send informants to
majority white communities to ferret out potential mass shooters. Put another way, the FBI’s argument presumes what the Ashcroft
Guidance “emphatically rejects”: that
crime can be prevented by the mass stereotyping of entire communities. Not only is
that wrong , it is a ham-handed approach that squanders resources that should properly be devoted to
investigating actual wrongdoing.
We reject the racialized notions of Surveillance and Security. These practices falsely
construct threats and shut-down dissent in many forms.
Kumar & Kundnani ‘15
Deepa Kumar is an associate professor of Media Studies and Middle East Studies at Rutgers University. She is the author of
Islamophobia and the Politics of Empire (Haymarket Books, 2012). Arun Kundnani is research fellow at the International Centre
for Counter-Terrorism. He is a writer and activist, and a professor at NYU. “Race, surveillance, and empire” – International
Socialist Review - Issue #96 – Spring - http://isreview.org/issue/96/race-surveillance-and-empire
In the second part, we
turn our attention to the current conjuncture in which the politics of the War on Terror shape
national security surveillance practices . The intensive surveillance of Muslim Americans has been
carried out by a vast security apparatus that has also been used against dissident movements such as
Occupy Wall Street and environmental rights activists, who represent a threat to the neoliberal order.
This is not new; the process of targeting dissenters has been a constant feature of American history. For instance, the Alien and Sedition Acts of the late 1790s were
passed by the Federalist government against the Jeffersonian sympathizers of the French Revolution. The British hanged Nathan Hale because he spied for
surveillance regimes have always sought to monitor and penalize a wide range
of dissenters, radicals, and revolutionaries. Race was a factor in some but by no means all of these cases. Our focus here is on the production of
racialized “others” as security threats and the ways this helps to stabilize capitalist social relations. Further, the current system of mass
surveillance of Muslims is analogous to and overlaps with other systems of racialized security surveillance that
feed the mass deportation of immigrants under the Obama administration and that disproportionately target African
Americans, contributing to their mass incarceration and what Michelle Alexander refers to as the New Jim Crow.4 We argue that
racialized groupings are produced in the very act of collecting information about certain groups deemed
Washington’s army in the American Revolution. State
as “threats” by the national security state— the Brown terrorist , the Black and Brown drug
dealer and user, and the immigrant who threatens to steal jobs. We conclude that “ security” has become one of
the primary means through which racism is ideologically reproduced in the “post-racial,” neoliberal
era. Drawing on W. E. B. Dubois’s notion of the “psychological wage,” we argue that neoliberalism has been legitimized in part through racialized notions of security
that offer a new “psychological wage” as compensation for the decline of the social wage and its reallocation to “homeland security.”
Surveillance is racist – it’s the modern COINTELPRO. Reject the security justifications
that prop-up these forms of violence.
Kumar & Kundnani ‘15
Deepa Kumar is an associate professor of Media Studies and Middle East Studies at Rutgers University. She is the author of
Islamophobia and the Politics of Empire (Haymarket Books, 2012). Arun Kundnani is research fellow at the International Centre
for Counter-Terrorism. He is a writer and activist, and a professor at NYU. “Race, surveillance, and empire” – International
Socialist Review - Issue #96 – Spring - http://isreview.org/issue/96/race-surveillance-and-empire
As of 2008, the
FBI had a roster of 15,000 paid informants and, according to Senator Dianne Feinstein of the Senate Intelligence
Committee, the bureau had 10,000 counterterrorism intelligence analysts in 2013.63 The proportion of these informants and analysts who are
assigned to Muslim populations in the United States is unknown but is likely to be substantial. The kinds of infiltration and provocation tactics that
had been practiced against Black radicals in the 1960s are being repeated today. What has changed are the
rationales used to justify them: it is no longer the threat of Black nationalist subversion, but the threat of
Muslim radicalization that is invoked. With new provisions in the Clinton administration’s 1996 Antiterrorism and Effective Death Penalty Act,
the FBI can launch investigations of a suspected individual or organization simply for providing “material support” to terrorism—a vague term that could include
ideological activity unrelated to any actual plot to carry out violence. While
COINTELPRO violated federal laws, today similar kinds
of investigation and criminalization of political dissent can be carried out legitimately in the name of
countering terrorism.
Bigotry Advantage 1AC – Shorter version
Bigotry Advantage – shorter version
Contention # ____ is Bigotry
Warrantless surveillance boosts a distinct form of racial, religious, and ethnic
discrimination. The Neg’s security interests only drive this racialized violence.
Unegbu ‘13
Cindy C. Unegbu - J.D. Candidate, Howard University School of Law - NOTE AND COMMENT: National Security Surveillance on
the Basis of Race, Ethnicity, and Religion: A Constitutional Misstep - Howard Law Journal - 57 How. L.J. 433 - Fall, 2013 – lexis;
lawrev
Picture this: you live in a society in which the government is allowed to partake in intrusive surveillance
measures without the institutionalized checks and balances upon which the government was founded. In this society, the
government pursues citizens who belong to a particular race or ethnicity, practice a certain religion, or have affiliations with
specific interest groups. Individuals who have these characteristics are subject to surreptitious monitoring, which
includes undercover government officials disguising themselves as community members in order to attend various community events and programs. The government may
also place these individuals on watch lists, even where there is no evidence of wrongdoing. These watch lists classify
domestic individuals as potential or suspected terrorists and facilitate the monitoring of their personal activity through various law enforcement agencies for an extended period of time.
This "hypothetical" society is not hypothetical at all; in fact, it is the current state of American
surveillance. The government's domestic spying activities have progressed to intrusive levels,
primarily due to an increased fear of terrorism . n1 This fear has resulted in governmental intelligence
efforts that are focused on political activists, racial and religious minorities, and immigrants. n2 [*435] The
government's domestic surveillance efforts are not only geared toward suspected terrorists and those partaking in criminal activity, but reach any
innocent, non-criminal, non-terrorist national, all in the name of national security. The government's power
to engage in suspicionless surveillance and track innocent citizens' sensitive information has been granted through the creation and revision of the National
Counterterrorism Center n3 and the FBI's (Federal Bureau of Investigation) Domestic Investigations and Operations Guide. n4 The grant of surveillance power has resulted in many opponents,
including those within the current presidential administration, who challenge the order for numerous reasons. n5 These reasons include the inefficiency of storing citizens' random personal
information for extended periods of time, n6 the broad unprecedented authority granted to this body of government without proper approval from Congress, n7 and the constitutional
violations due to the deprivation of citizens' rights. n8 [*436] This Comment argues that the wide-sweeping surveillance authority granted to the government
results in a violation of
the Fourteenth Amendment's Equal Protection Clause due to far-reaching domestic monitoring practices. Surveillance practices, such as posing as members of the community and placing
individuals on watch lists without suspicion of terrorist activity, result in the
impermissible monitoring of individuals on the basis of their
race or ethnicity . These practices, although done in the name of national security, an established compelling government interest, violate the Equal Protection Clause of
the Fourteenth Amendment because they are not narrowly tailored to the stated interest.
The procedures are not narrowly tailored to the
interest of national security because of the over-inclusiveness of the measures .
Most everyone violates some law from time-to-time. Mass surveillance results in
selective enforcement that disproportionately impacts those lacking privilege.
Stanfill ‘13
Mel - The author now holds a Ph.D. from the University of Illinois, Urbana-Champaign in Communications and Media. The
Author was working on that PhD at this time of this writing. When this piece was written, the author held an M.A. from
California State University, East Bay in Media and Cultural Studies and had Graduate minors in Gender and Women’s Studies
and Queer Studies. The author also held a B.A. from University of California, Berkeley - English with Distinction in General
Scholarship. At the time of this writing, the author had published several Peer-Reviewed Publications. The author is internally
quoting Daniel J. Solove is the John Marshall Harlan Research Professor of Law at the George Washington University Law
School. “NSA Prism Part III: Due Process and Presumed Guilty” - July 1, 2013 – http://www.melstanfill.com/nsa-prism-part-iiidue-process-and-presumed-guilty/
Posing this as a due process question could be the way to get some traction in light of the nonchalance about privacy discussed last week: The problem with NSA
PRISM is that we are all being treated as guilty until proven innocent. This has been going on since 9/11, of course, with airport security being one highly visible
iteration, but there’s a chance that this new level of awareness of just how much everyone is being treated as criminal without due process of law could be the
straw. Solove describes the stakes well: “Even
if a person is doing nothing wrong, in a free society, that person shouldn’t have
to justify every action that government officials might view as suspicious. A key component of freedom
is not having to worry about how to explain oneself all the time.” Crossing this line into blanket assumption of guilt is what
animates the Stop Watching US petition, which says “the contents of communications of people both abroad and in the U.S. can be swept in without any suspicion
of crime or association with a terrorist organization,” though they tie their concern to the 1st and 4th amendment and “citizens’ right to speak and associate
anonymously, guard against unreasonable searches and seizures, and protect their right to privacy” without mentioning due process. (That people feel due process
has gone out the window is clear from the fact that RootsAction sent me a petition to President Obama “not to engage in any abduction or other foul play against
Snowden,” ironic when the administration’s line on why they’re disappointed that Hong Kong let him leave is that they want there to be rule of law.) Wired perhaps
elaborates the worst-case-scenario best: “Police
already abuse the immense power they have, but if everyone’s every
action were being monitored, and everyone technically violates some obscure law at some time, then
punishment becomes purely selective . Those in power will essentially have what they need to punish
anyone they’d like, whenever they choose, as if there were no rules at all.” Of course, black and Latino citizens have
been living under presumed-guilty, surveilled-within-an inch-of-their-lives, selectively-punished conditions for decades:
they’re more likely to get caught at things white folks also do and be punished more
harshly for them, even as early as middle school (see Ann Ferguson’s Bad Boys). Muslim and Arab citizens have been living
under it since 9/11.
Reject this discrimination as an unacceptable wrong that must be rejected as an end
onto itself.
Shamsi ‘14
(et al; Hina Shamsi is a lecturer-in-law at Columbia Law School, where she teaches a course in international human rights. She is
also the Director of the ACLU’s National Security Project, which is dedicated to ensuring that U.S. national security policies and
practices are consistent with the Constitution, civil liberties, and human rights. She has litigated cases upholding the freedoms
of speech and association, and challenging targeted killing, torture, unlawful detention, and post-9/11 discrimination against
racial and religious minorities. Her work includes a focus on the intersection of national security and counterterrorism policies
with international human rights and humanitarian law. She also served as Senior Advisor to the U.N. Special Rapporteur on
Extrajudicial Executions. Hina is a graduate of Mount Holyoke College and Northwestern University School of Law. “The
Perversity of Profiling” – April 14th – available at the ACLU website - https://www.aclu.org/blog/perversity-profiling)
Using expanded authorities that permit investigations without
actual
evidence of wrongdoing , the FBI
has also targeted minority communities for interviews based on race, ethnicity, national origin, and religion. It
has used informants to conduct surveillance in community centers, mosques, and other public gathering places and against people exercising their First Amendment
right to worship or to engage in political advocacy. And among
America’s minority communities, “flying while brown” soon
joined “driving while black” as a truism of government-sanctioned discrimination and stigma. It’s hard to
overstate the damage done to the FBI’s relationship with minorities, particularly American Muslims. The damage,
spread further. When federal law enforcement leads in discriminatory profiling, state and local
law enforcement will follow. Nowhere is that clearer than in New York City, where the NYPD – which is twice the size of the
however, has
FBI – launched
a massive program of discriminatory surveillance and investigation of American Muslims,
mapping the places where they carry out daily activities and sending informants to spy on mosques and Muslim community organizations, student groups, and
businesses. After the Associated Press broke a series of stories describing this program in stark and shocking detail, the
NYPD defended itself,
arguing that it was only doing what the FBI was permitted to do. Again, it’s hard to overstate the harm.
From the ACLU’s work with New York’s Muslim communities, we know that a generation of youth is
growing up fearful of its local police force, scared to exercise the rights to freedom of worship, speech, and
association. Fortunately, the issuance of the revised Guidance on Race has been delayed and both the Justice Department and the civil rights community
have a crucial opportunity to put a spotlight on the FBI, which vigorously opposes those fighting for equality. According to the New York Times, the FBI’s
argument seems to be that it needs to identify where Somalis live to investigate potential Somali terrorism suspects.
But that argument must be rejected for the same reason that we reject it in other contexts .
Many mass shooters are young white males, yet we rightly don’t map where whites live or send informants to
majority white communities to ferret out potential mass shooters. Put another way, the FBI’s argument presumes what the Ashcroft
Guidance “emphatically rejects”: that
crime can be prevented by the mass stereotyping of entire communities. Not only is
that wrong , it is a ham-handed approach that squanders resources that should properly be devoted to
investigating actual wrongdoing.
1AC – Journalism Advantage
Journalism Advantage - 1AC
Journalism Advantage
Contention # ____ is Journalism
Status quo mass surveillance chills journalism and crushes government accountability.
Wong ‘15
Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before joining Human
Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of their Project on
Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom, with a particular
focus on international free expression and privacy. She also served as co-chair of the Policy & Learning Committee of the Global
Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and human rights in the
technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights Fellow at Human Rights
in China (HRIC). There, she contributed to the organization’s work in the areas of business and human rights and freedom of
expression online. Wong earned her law degree from New York University School of Law – From the essay: “Internet at a
Crossroads: How Government Surveillance Threatens How We Communicate” - http://www.hrw.org/worldreport/2015/essays/internet-crossroads
A joint report published by Human Rights Watch and the American Civil Liberties Union in July 2014 documented the insidious effects of
large-scale surveillance on the practice of journalism and law in the US. Interviews with dozens of journalists
showed that increased surveillance, combined with tightened measures to prevent leaks and government contact with media, are
intimidating sources, keeping them from talking to journalists (even about unclassified topics of public concern) out of fear that they could face
retaliation, lose their security clearances or jobs, or even face prosecution. Ultimately,
this is having a detrimental impact on the
coverage, particularly on matters related to national security, intelligence, and law
enforcement. This effect undermines the role of the fourth estate in holding government to account.
amount and quality of news
Steve
Coll, staff writer for the New Yorker and dean of the Graduate School of Journalism at Columbia University, explained: “ Every
national security
reporter I know would say that the atmosphere in which professional reporters seek insight into policy
failures [and] bad military decisions is just much tougher and much chillier.” Public understanding of
national security policies that are carried out in our name is essential to the functioning of healthy democracies and open
societies.
Indiscriminate collection is the vital internal link. It hampers aggressive journalism on
bad national security decisions.
Sinha ‘14
(et al; Authors Include: G. Alex Sinha, Aryeh Neier fellow with the US Program at Human Rights Watch and the Human Rights
Program at the American Civil Liberties Union. Sinha holds a J.D. from New York University’s School of Law. This includes a
specialization as a Scholar from NYU’s Institute for International Law & Justice. The author also holds a Ph.D. in Philosophy
University of Toronto. Additional authors include - Maria McFarland Sanchez-Moreno, US Program deputy director at Human
Rights Watch, who participated in some of the research interviews; and Andrea Prasow, deputy Washington Director at Human
Rights Watch, who also participated in one of the research interviews and provided key contacts. Human Rights Watch is an
independent, international organization that works as part of a vibrant movement to uphold human dignity and advance the
cause of human rights for all. This card also internally quotes Steve Coll, Dean of the Graduate School of Journalism at Columbia
University. From the Report: WITH LIBERTY TO MONITOR ALL How Large-Scale US Surveillance is Harming Journalism, Law and
American Democracy – This report is based on extensive interviews with some 50 journalists covering intelligence, national
security, and law enforcement for outlets including the New York Times, the Associated Press, ABC, and NPR. JULY 2014 –
available at: http://www.hrw.org/node/127364)
Every national security reporter I know would say that the atmosphere in which professional reporters seek
insight into policy failures [and] bad military decisions is just much tougher and much chillier. — Steve Coll, staff
writer for The New Yorker and Dean of the Graduate School of Journalism at Columbia University, February 14, 2014
Numerous US-based journalists covering intelligence, national security, and law enforcement describe the current reporting landscape
as, in some respects, the most difficult they have ever faced. “This is the worst I’ve seen in terms of the government’s efforts to control
information,” acknowledged Jonathan Landay, a veteran national security and intelligence correspondent for McClatchy Newspapers.68 “It’s a terrible time to be
covering government,” agreed Tom Gjelten, who has worked with National Public Radio for over 30 years.69 According to Kathleen Carroll, senior vice president and
executive editor of The Associated Press, “We say this every time there’s a new occupant in the White House, and it’s true every time: each is more secretive than
the last.”70 Journalists are struggling harder than ever before to protect their sources, and sources are more reluctant to speak. This environment makes reporting
both slower and less fruitful. Journalists interviewed for this report described
the difficulty of obtaining sources and covering
sensitive topics in an atmosphere of uncertainty about the range and effect of the government’s power over them. Both surveillance and leak
investigations loomed large in this context—especially to the extent that there may be a relationship
between the two. More specifically, many journalists see the government’s power as menacing because they know little about when various government
agencies share among themselves information collected through surveillance, and when they deploy that information in leak [what they] will do with it,” observed
James Asher, Washington Bureau Chief for McClatchy Co., the third largest newspaper group in the country.72 One Pulitzer Prize-winning reporter for a newspaper
noted that even a decrease in leak prosecutions is unlikely to help, “unless we [also] get clear lines about what is collectable and usable.”73 Others agreed. “I’m
pretty worried that NSA information will make its way into leak investigations,” said one investigative journalist for a major outlet.74 A reporter who covers national
defense expressed concern about the possibility of a “porous wall” between the NSA and the Department of Justice, the latter of which receives referrals connected
to leak investigations.75 Jonathan Landay wondered whether the government might analyze metadata records to identify his contacts.76 A national security
reporter summarized the situation as follows: “Do we trust [the intelligence] portion of the government’s knowledge to be walled off from leak investigations?
That’s not a good place to be.”77 While most journalists
said that their difficulties began a few years ago, particularly with the increase in
leak prosecutions, our interviews confirmed that for many journalists largescale surveillance by the US government
contributes substantially to the new challenges they encounter. The government’s largescale collection of metadata and communications makes it significantly more difficult for them to
protect themselves and their sources, to confirm details for their stories, and ultimately to inform the public.
This erodes meaningful checks on inappropriate government officials. It spills beyond
national security into many policy issues.
Brown ‘14
Bruce Brown - Counsel of Record. BRIEF OF THE REPORTERS COMMITTEE FOR FREEDOM OF THE PRESS AND 17 MEDIA
ORGANIZATIONS AS AMICI CURIAE IN SUPPORT OF PLAINTIFF-APPELLANT - The Reporters Committee for Freedom of the Press
is an unincorporated association of reporters. The Reporters Committee has provided representation, guidance and research in
First Amendment and Freedom of Information Act litigation since 1970.Amicus Brief for Smith v. Obama – before the United
States Ninth Circuit Court of Appeals. “Amici” means “friend of the court” and – in this context - is legal reference to the
Reporters Committee – Sept 9th - https://www.eff.org/document/rcfp-smith-amicus-brief
In a report that former Washington Post executive editor Leonard Downie Jr. wrote for the Committee to Protect Journalists, numerous
journalists
said surveillance programs and leak prosecutions deter sources from speaking to them. Comm. To Protect Journalists, The
Obama Administration and the Press: Leak Investigations and Surveillance in Post-9/11 America 3 (Oct. 10, 2013), http://bit.ly/1c3Cnfg. In the report, Associated
Press senior managing editor Michael Oreskes commented: “There’s
Sources are more jittery and more standoffish, not
no question that sources are looking over their shoulders.
just in national security reporting. A lot of skittishness is at the more routine level.” Id.
One of the most pernicious effects is the chilling
effect created across government on matters that are less sensitive but certainly in
the public interest as a check on government and elected officials. ” Id. Discussing the NSA
Washington Post national security reporter Rajiv Chandrasekaran said: “
surveillance programs, New York Times investigative reporter and three-time Pulitzer Prize winner David Barstow stated, “I have
absolutely
no doubt whatsoever that stories have not gotten done because of this. ” Jamie Schuman, The Shadows
of the Spooks, The News Media and the Law, Fall 2013, at 9.
Aggressive press is vital to check corrupt governance practices. It builds more
accountable governance.
Sinha ‘14
(et al; Authors Include: G. Alex Sinha, Aryeh Neier fellow with the US Program at Human Rights Watch and the Human Rights
Program at the American Civil Liberties Union. Sinha holds a J.D. from New York University’s School of Law. This includes a
specialization as a Scholar from NYU’s Institute for International Law & Justice. The author also holds a Ph.D. in Philosophy
University of Toronto. Additional authors include - Maria McFarland Sanchez-Moreno, US Program deputy director at Human
Rights Watch, who participated in some of the research interviews; and Andrea Prasow, deputy Washington Director at Human
Rights Watch, who also participated in one of the research interviews and provided key contacts. Human Rights Watch is an
independent, international organization that works as part of a vibrant movement to uphold human dignity and advance the
cause of human rights for all. From the Report: WITH LIBERTY TO MONITOR ALL How Large-Scale US Surveillance is Harming
Journalism, Law and American Democracy – This card also internally quotes Steve Coll, Dean of the Graduate School of
Journalism at Columbia University. This report is based on extensive interviews with some 50 journalists covering intelligence,
national security, and law enforcement for outlets including the New York Times, the Associated Press, ABC, and NPR. JULY
2014 – available at: http://www.hrw.org/node/127364)
In recent decades,
the press has played an important role in checking government , and in particular,
the intelligence community .
225 That has not always been the case. Betty Medsger, a former Washington Post reporter whose series of stories in 1971 first revealed the FBI’s targeting
of dissenters, recalled that there was “very little investigative work” before her articles appeared.226 Even her FBI stories derived from documents stolen by activists, rather than through Medsger’s cultivation of sources inside the
intelligence community. “I was given these files. I didn’t have clever techniques. Nobody was trying to develop inside sources until then.”227 Tim Weiner, a Pulitzer Prize-winning reporter for the New York Times, who also won a
National Book Award for his history of the CIA, offered an earlier timeline for the development of investigative journalism on the intelligence community, observing that “serious investigative reporting into the CIA started in the
mid-1960’s, and then seriously expanded a decade later.”228 Phil Bennett elaborated:
The growth of the intelligence community and of a more critical, more
adversarial press occurred in tandem, on overlapping timelines. Although there have been state secrets since the founding of the Republic, the current institutional structure that
manufactures and protects those secrets emerged near the end of World War II and the beginning of the Cold War. For the most part, at first journalists did little to contest the government's monopoly on secrets. But the
Vietnam War led some journalists to see secrecy as a tool for the government to deceive the public. The
Pentagon Papers case ratified this view. Disclosing government secrets then became a central part of the birth of modern
investigative reporting. This has carried over to the digital era.229 Ultimately, the government’s own
investigations into the intelligence community in the mid-1970s—most famously among them, the Church
Committee in the Senate—provided a sound basis for ongoing and active investigative work by journalists on the
intelligence community ever since.230 Those inquiries revealed significant and widespread misconduct by the
intelligence community
dating back decades. By offering the public significant and early insight into objectionable practices by the FBI, Medsger’s stories formed a major part of the
environment that gave rise to those investigations,231 complementing pressure resulting from the Vietnam War and Seymour Hersh’s 1974 reporting on the CIA.232
intelligence community has recently
(once again)
But coverage of the
become more challenging to undertake. “It seems to me that at some point it became very difficult
again to cover these institutions and get inside sources,” Medsger observed.233 Many journalists who spoke to us expressed a strong commitment to their work, and were unwilling to be dissuaded from continued efforts to cover
increasingly difficult beats. “I’m not in any way going to stop reporting,” remarked Adam Goldman. “In most cases, I am not the vulnerable one,” added Steve Aftergood.234 Peter Maass also identified a silver lining: “Even though
it’s harder, it’s also very exciting. We’re being given an amazing opportunity to do exciting work that could help shape society for years to come.”235 Nevertheless,
surveillance
and leak investigations
the effects that
have had on coverage are working to undermine effective
democratic
participation
and governance. “ What makes government better is our work exposing information ,” argued Dana
It makes the country less
safe. Institutions work less well, and it increases the risk of corruption. Secrecy works
against all of us.”
National security journalism is especially important for a
functioning,
accountable system
There’s a real loss to the public
Priest, a Pulitzer Prize-winning national security reporter at the Washington Post.236 “It’s not just that it’s harder for me to do my job, though it is.
also
237 Charlie Savage added, “
democratically
.”238 Steve Coll agreed as well, noting, “
,
It is thus inherently important for journalists to seek out certain
information that the government treats as sensitive and, when appropriate, share it with the public. Kathleen Carroll also emphasized the responsibility typically
demonstrated by journalists who work on national security topics. “This is not a bunch of bratty journalists trying to undermine legitimate
government operations,” she argued. Moreover, though she believes “that a government’s actions on behalf of the people it serves should be public, [m]ost news organizations [including her outlet, the
Associated Press] will recognize that certain things the government is doing need to remain secret, at least for now. The disputes take place because the government
the voters. For James Asher, “The role of the press is to be challenging and critical.”240
idea of what should remain secret is much more sweeping.” 241
Building more accountable government – not sweeping rejecting it – is vital to check a
laundry list of existential risks.
Eckersley ‘4
Robyn, Reader/Associate Professor in the Department of Political Science at the University of Melbourne, “The Green State:
Rethinking Democracy and Sovereignty”, MIT Press, 2004, Google Books, pp. 3-8
While acknowledging the basis for this antipathy toward the nation- state, and the limitations of state-centric analyses of global ecological
degradation, I
seek to draw attention to the positive role that states have played, and might increasingly play, in
global and domestic politics. Writing more than twenty years ago, Hedley Bull (a proto-constructivist and leading writer in the English school)
outlined the state's positive role in world affairs, and his arguments continue to provide a powerful challenge to those who
somehow seek to "get beyond the state," as if such a move would provide a more lasting solution to the
threat of armed conflict or nuclear war , social and economic in justice, or environmental
degradation. 10 As Bull argued, given that the state is here to stay whether we like it or not, then the call
to get "beyond the state is a counsel of despair, at all events if it means that we have to begin by abolishing or
subverting the state, rather than that there is a need to build upon it.""¶ In any event, rejecting the "statist frame" of
world politics ought not prohibit an inquiry into the emancipatory potential of the state as a crucial "node"
in any future network of global ecological governance. This is especially so, given that one can expect states to persist as major
sites of social and political power for at least the foreseeable future and that any green transformations of the present political
order will, short of revolution, necessarily be state-dependent. Thus, like it or not, those concerned about ecological destruction must contend
with existing institutions and, where possible, seek to "rebuild the ship while still at sea." And if states are so implicated in ecological
destruction, then an inquiry into the potential for their transformation even their modest reform into something that is at least more conducive
to ecological sustainability would seem to be compelling.¶ Of
course, it would be unhelpful to become singularly fixated
on the redesign of the state at the expense of other institutions of governance. States are not the only institutions that
limit, condition, shape, and direct political power, and it is necessary to keep in view the broader spectrum of formal and informal institutions
of governance (e.g., local, national, regional, and international) that are implicated in global environmental change. Nonetheless,
while
the state constitutes only one modality of political power, it is an especially significant one because of its
historical claims to exclusive rule over territory and peoples—as expressed in the principle of state sovereignty. As Gianfranco Poggi explains,
the political power concentrated in the state "is a momentous, pervasive, critical phenomenon. Together with other forms of social power, it
constitutes an indispensable medium for constructing and shaping larger social realities, for establishing, shaping and maintaining all broader
and more durable collectivities."12 States play, in varying degrees, significant roles in structuring life chances, in distributing wealth, privilege,
information, and risks, in upholding civil and political rights, and in securing private property rights and providing the legal/regulatory
framework for capitalism. Every one of these dimensions of state activity has, for good or ill, a significant bearing on the global environmental
crisis. Given that the
green political project is one that demands far-reaching changes to both economies and societies,
it is difficult to imagine how such changes might occur on the kind of scale that is needed without the
active support of states. While it is often observed that states are too big to deal with local ecological problems and too small to deal with
global ones, the state nonetheless holds, as Lennart Lundqvist puts it, "a unique position in the constitutive hierarchy from individuals through
villages, regions and nations all the way to global organizations. The state is inclusive of lower political and administrative levels, and
exclusive in speaking for its whole territory and population in relation to the outside world."13 In short, it seems to me inconceivable to
advance ecological emancipation without also engaging with and seeking to transform state power.¶ Of course, not all states are democratic
states, and the green movement has long been wary of the coercive powers that all states reputedly enjoy. Coercion (and not democracy) is
also central to Max Weber's classic sociological understanding of the state as "a human community that (successfully) claims the monopoly of
the legitimate use of physical force within a given territory."14 Weber believed that the state could not be defined sociologically in terms of its
ends* only formally as an organization in terms of the particular means that are peculiar to it.15 Moreover his concept of legitimacy was merely
concerned with whether rules were accepted by subjects as valid (for whatever reason); he did not offer a normative theory as to the
circumstances when particular rules ought to be accepted or whether beliefs about the validity of rules were justified. Legitimacy was a
contingent fact, and in view of his understanding of politics as a struggle for power in the context of an increasingly disenchanted world,
likely to become an increasingly unstable achievement.16 In contrast to Weber, my approach to the state is explicitly normative and explicitly
concerned with the purpose of states, and the democratic basis of their legitimacy. It focuses on the limitations of liberal normative theories of
the state (and associated ideals of a just constitutional arrangement), and it proposes instead an alternative green theory that seeks to redress
the deficiencies in liberal theory. Nor is my account as bleak as Weber's. The fact that states possess a monopoly of control over the means of
coercion is a most serious matter, but it does not necessarily imply that they must have frequent recourse to that power. In any event,
whether the use of the state's coercive powers is to be deplored or welcomed turns on the purposes for which
the manner in which it is exercised , and whether it is managed in
public , transparent, and accountable ways —a judgment that must be made against a background of changing problems,
practices, and under- standings. The coercive arm of the state can be used to "bust" political
demonstrations and invade privacy. It can also be used to prevent human rights abuses, curb the
that power is exercised,
excesses of corporate power, and
protect the environment. In short, although the political autonomy of states is widely believed to
are still few social institution that can match the same degree of capacity and potential legitimacy that
states have to redirect societies and economies along more ecologically sustainable lines to address ecological problems
be in decline, there
such as global warming and pollution, the buildup of toxic and nuclear wastes and the rapid erosion of the earth's biodiversity. States—
particularly when they act collectively—have the capacity to curb the socially and ecologically harmful consequences of capitalism. They are
also more amenable to democratization than cor- porations, notwithstanding the ascendancy of the neoliberal state in the increasingly
competitive global economy. There are therefore many good reasons why green political theorists need to think not only critically but also
constructively about the state and the state system. While the state is certainly not "healthy" at the present historical juncture, in this book I
nonetheless join Poggi by offering "a timid two cheers for the old beast," at least as a potentially more significant ally in the green cause.17
Unlike the current Freedom Act, the original Act is perceived by sources as sufficient
to restore trust.
HRW ‘14
(Internally quoting Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before
joining Human Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of
their Project on Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom,
with a particular focus on international free expression and privacy. She also served as co-chair of the Policy & Learning
Committee of the Global Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and
human rights in the technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights
Fellow at Human Rights in China (HRIC). There, she contributed to the organization’s work in the areas of business and human
rights and freedom of expression online. Wong earned her law degree from New York University School of Law. Human Rights
Watch is an independent, international organization that works as part of a vibrant movement to uphold human dignity and
advance the cause of human rights for all. “US Senate: Salvage Surveillance Reform House Bill Flawed” - Human Rights Watch May 22, 2014 – http://www.hrw.org/news/2014/05/22/us-senate-salvage-surveillance-reform)
It is up to the US Senate to salvage surveillance reform, Human Rights Watch said today. The version of the USA
Freedom Act that the US House of Representatives passed on May 22, 2014, could ultimately fail to end mass data
collection. The version the House passed is a watered-down version of an earlier bill that was
designed to end bulk collection of business records and phone metadata. The practice has been almost
universally condemned by all but the US security establishment. “This so-called reform bill won’t restore the trust of
Internet users in the US and around the world,” said Cynthia Wong, senior Internet researcher at
Human Rights Watch. “ Until Congress passes real reform, US credibility and leadership on
Internet freedom will continue to fade .” The initial version of the bill aimed to prohibit bulk
collection by the government of business records, including phone metadata. The bill only addressed one component
of the surveillance programs revealed by the former National Security Agency contractor Edward Snowden, that of US record
collections. However, it
had broad support as a first step, including from Human Rights Watch. On
May 7, a diluted version of the bill passed unanimously out of the House Judiciary Committee, followed by Intelligence Committee approval on
May 8. While better than alternative bills offered, the
version the House passed could leave the door wide open to
continued indiscriminate data collection practices potentially invading the privacy of millions of people without
justification, Human Rights Watch said.
1AC - Global Internet Freedom Advantage
Global Internet Advantage - 1AC Econ module
Global Internet Advantage – Econ module
Contention # ____ is Global internet freedom
New Freedom Act fails to restore US’s global credibility on Internet freedom. The
original version solves by closing SST loopholes.
Brinkerhoff ‘14
(Internally quoting Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before
joining Human Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of
their Project on Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom,
with a particular focus on international free expression and privacy. She also served as co-chair of the Policy & Learning
Committee of the Global Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and
human rights in the technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights
Fellow at Human Rights in China (HRIC). There, she contributed to the organization’s work in the areas of business and human
rights and freedom of expression online. Wong earned her law degree from New York University School of Law. Human Rights
Watch is an independent, international organization that works as part of a vibrant movement to uphold human dignity and
advance the cause of human rights for all. Noel Brinkerhoff is a Political reporter and writer covering state and national politics
for 15 years. “With Support of Obama Administration, House NSA Surveillance Reform Bill Includes Gaping Loopholes” – AllGov
– May 26th - http://www.allgov.com/news/top-stories/with-support-of-obama-administration-house-nsa-surveillance-reformbill-includes-gaping-loopholes-140526?news=853242)
Lawmakers in the U.S. House of Representatives claim they have addressed the problems of the National Security Agency’s (NSA)
notorious bulk collection of data, made so famous last year by whistleblower Edward Snowden. But the
legislation adopted to end this controversial practice contains huge loopholes that could allow the
NSA to keep vacuuming up large amounts of Americans’ communications records, all with the blessing of the Obama
administration. Dubbed the
USA Freedom Act, the bill overwhelmingly approved by the House (303 to 121) was criticized
for not going far enough to keep data out of the hands of government. “This so-called
reform bill won’t restore the trust of Internet users in the U.S. and around the world,” Cynthia Wong,
senior Internet researcher at Human Rights Watch (HRW), said. “Until Congress passes real
reform , U.S. credibility and leadership on Internet freedom will continue to fade.” Julian Sanchez, a
researcher at the Cato Institute, a libertarian think tank, warned that the changes could mean the continuation of bulk collection of phone records by another name.
“The
core problem is that this only ends ‘bulk’ collection in the sense the intelligence community uses
that term,” Sanchez told Wired. “As long as there’s some kind of target , they don’t call that bulk collection,
even if you’re still collecting millions of records…If they say ‘give us the record of everyone who visited
these thousand websites,’ that’s not bulk collection, because they have a list of targets.” HRW says the bill,
which now goes to the Senate for consideration, contains ambiguous definitions about what can and cannot be collected by the agency. For
an earlier version more clearly defined the scope of what the NSA could grab under Section 215 of the
Patriot Act, which has formed the legal basis for gathering the metadata of phone calls. “ Under an earlier version of the USA
instance,
Freedom Act, the government would have been required to base any demand for phone metadata or
other records on a “ specific selection term” that “uniquely describe[s] a person, entity, or account.” Under
the House version, this definition was broadened to mean “a discrete term, such as a term specifically identifying a
person, entity, account, address, or device, used by the government to limit the scope” of information sought,” according to Human Rights Watch. “ This
definition is too open-ended and ambiguous to prevent the sort of creative interpretation by intelligence agencies that has been used to
justify overbroad collection practices in the past,” the group claims. The New America Foundation’s Open Technology Institute is similarly
disappointed in the final House bill. “Taken together,” the Institute wrote, “ the changes to this definition may still allow for massive
collection of millions of Americans’ private information based on very broad selection terms such as a
zip code, an area code , the physical address of a particular email provider or financial institution , or
the IP address of a web hosting service that hosts thousands of web sites.”
The US can alter global practices that threaten internet freedom – but only when US
image is seen as less hypocritical.
Wong ‘13
Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before joining Human
Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of their Project on
Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom, with a particular
focus on international free expression and privacy. She also served as co-chair of the Policy & Learning Committee of the Global
Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and human rights in the
technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights Fellow at Human Rights
in China (HRIC). There, she contributed to the organization’s work in the areas of business and human rights and freedom of
expression online. Wong earned her law degree from New York University School of Law – “ Surveillance and the Corrosion of
Internet Freedom” - July 30, 2013 - Published in: The Huffington Post and also available at the HRW website at this address:
http://www.hrw.org/news/2013/07/30/surveillance-and-corrosion-internet-freedom
Defenders of US and UK surveillance programs argue that collecting metadata is not as problematic as “listening to the content
of people’s phone calls” or reading emails. This is misleading. Technologists have long recognized that metadata can reveal incredibly sensitive information, especially if it is
collected at large scale over long periods of time, since digitized data can be easily combined and analyzed. The revelations have also exposed glaring
contradictions about the US Internet freedom agenda. This has emboldened the Chinese state media, for example, to cynically
denounce US hypocrisy, even as the Chinese government continues to censor the Internet, infringe on privacy rights, and curb anonymity online. Though there is hypocrisy on both sides,
the widening rift between US values and actions has real, unintended human rights consequences. For the human
rights movement, the Internet’s impact on rights crystalized in 2005 after we learned that Yahoo! uncritically turned user account
information over to the Chinese government, leading to a 10-year prison sentence for the journalist Shi Tao. The US government
forcefully objected to the Chinese government’s actions and urged the tech industry to act responsibly. In the end, that incident
catalyzed a set of new human rights standards that pushed some companies to improve safeguards for
user privacy in the face of government demands for data. US support was critical back then , but it
is hard to imagine the government having the same influence or credibility now. The mass surveillance scandal has damaged
the US government’s ability to press for better corporate practices as technology companies expand globally. It
will also be more difficult for companies to resist overbroad surveillance mandates if they are seen as
complicit in mass US infringements on privacy. Other governments will feel more entitled to ask for the
same cooperation that the US receives. We can also expect governments around the world to pressure companies to store user data locally or maintain a local
presence so that governments can more easily access it, as Brazil and Russia are now debating. While comparisons to the Chinese government are overstated, there is reason to
worry about the broader precedent the US has set. Just months before the NSA scandal broke, India began rolling out a centralized
system to monitor all phone and Internet communications in the country, without much clarity on
safeguards to protect rights. This development is chilling, considering the government’s problematic use of sedition and Internet laws in recent arrests. Over the last
few weeks, Turkish officials have condemned social media as a key tool for Gezi Park protesters. Twitter has drawn particular ire. Now the
government is preparing new regulations that would make it easier to get data from Internet companies and identify
individual users online. The Obama administration and US companies could have been in a strong position to push back in
India and Turkey. Instead, the US has provided these governments with a roadmap for conducting secret, mass
surveillance and conscripting the help of the private sector.
(Note to students: “conscripting” means compulsory enlistment of companies for state service.)
Washington will inevitably push for global Internet freedom – but US image is vital.
The Internet freedom agenda’s key to the Global Economy.
Kalathil ‘10
Shanthi Kalathil - Adjunct Faculty and Adjunct Lecturer in the Communication, Culture, and Technology (CCT) Master of Arts
Program at Georgetown University. Kalathil has extensive experience advising the U.S. government, international organizations
and nonprofits on supporting civil society, independent media, technology, transparency and accountability. Previously a senior
Democracy Fellow at the U.S. Agency for International Development and she has authored or edited numerous policy and
scholarly publications, including the edited volume Diplomacy, Development and Security in the Information Age. She has
taught courses on international relations in the information age at the Monterey Institute of International Studies and
Georgetown University. Kalathil holds degrees from U.C. Berkeley and the London School of Economics and Political Science –
“Internet Freedom: A Background Paper” – October 2010 - Available via:
http://www.aspeninstitute.org/sites/default/files/content/images/Internet_Freedom_A_Background_Paper_0.pdf
As use of the Internet has grown exponentially around the world, so too have concerns about its defining
attribute as a free and open means of communication. Around the world, countries, companies and citizens are
grappling with thorny issues of free expression, censorship and trust. With starkly different visions for the Internet
developing, this era presents challenges—and also opportunities—for those who wish to ensure the Internet
remains a backbone of liberty and economic growth. U.S. officials have made clear their
vision for the Internet ’s future. President Obama, in a speech before the UN General Assembly, said that the U.S. is
committed to promoting new communication tools, “so that people are empowered to connect with one
another and, in
repressive societies, to do so with security. We will support a free and open Internet, so individuals have the information to make up
their own minds.” His words were reinforced by FCC Chairman Julius Genachowski: “ It is essential that we preserve the open Internet and
stand firmly behind the right of all people to connect with one another and to exchange ideas freely and without fear.”1 Indeed, a free, widely accessible
Internet stands at the heart of both global communication and global commerce. Internet freedom enables
dialogue and direct diplomacy between people and civilizations, facilitating the exchange of ideas and culture while bolstering trade and economic
growth. Conversely, censorship and other blockages stifle both expression and innovation. When arbitrary rules
privilege some and not others, the investment climate suffers. Nor can access be expanded if end users have no trust in the network. However, making reality live
up to aspirations for Internet freedom can prove difficult. Numerous global
initiatives—spearheaded by governments, private sector and civil society—are
attempting to enshrine the norms, principles and standards that will ensure the Internet remains a public space for free
expression. At the same time, other norms are fast arising—particularly those defined by authoritarian
countries that wish to splinter the Internet into independently controlled fiefdoms. Even as Internet access has expanded around
the world, many governments are attempting to control, regulate and censor the Internet in all its forms: blogs, mobile
communication, social media, etc. Such governments have devoted vast resources to shaping the Internet’s
development within their own borders, and they are now seeking to shape the Internet outside their
borders as well. Indeed, Internet experts are worried that national governments of all stripes will increasingly seek to extend their regulatory authority over the
global Internet, culminating in a balkanized Internet with limited interoperability. Hence, the next few years
present a distinct window of opportunity to elevate the principles of the free exchange of ideas, knowledge and commerce on
the Internet. While U.S. leadership within this window is vital, a global effort is necessary to ensure that these norms
become a standard part of the Internet’s supporting architecture.
Global economic decline risks nuclear war.
Merlini ‘11
[Cesare Merlini, nonresident senior fellow at the Center on the United States and Europe and chairman of the Board of Trustees of the Italian
Institute for International Affairs (IAI) in Rome. He served as IAI president from 1979 to 2001. Until 2009, he also occupied the position of
executive vice chairman of the Council for the United States and Italy, which he co-founded in 1983. His areas of expertise include transatlantic
relations, European integration and nuclear non-proliferation, with particular focus on nuclear science and technology. A Post-Secular World?
DOI: 10.1080/00396338.2011.571015 Article Requests: Order Reprints : Request Permissions Published in: journal Survival, Volume 53, Issue 2
April 2011 , pages 117 - 130 Publication Frequency: 6 issues per year Download PDF Download PDF (~357 KB) View Related Articles To cite
this Article: Merlini, Cesare 'A Post-Secular World?', Survival, 53:2, 117 – 130]
Two neatly opposed scenarios
for the future of the world order illustrate the range of possibilities, albeit at the risk of
oversimplification. The first scenario entails the premature crumbling of the post-Westphalian system. One or more of the acute tensions
apparent today evolves into an open and traditional conflict between states, perhaps even involving the use
of nuclear weapons. The crisis might be triggered by a collapse of the global economic and financial
system, the vulnerability of which we have just experienced, and the prospect of a second Great Depression, with
consequences for peace and democracy similar to those of the first. Whatever the trigger, the unlimited exercise of
national sovereignty, exclusive self-interest and rejection of outside interference would likely be amplified, emptying,
perhaps entirely, the half-full glass of multilateralism, including the UN and the European Union. Many of the more likely conflicts, such as between Israel and Iran
or India and Pakistan, have potential religious dimensions. Short of war, tensions such as those related to immigration might become unbearable. Familiar issues of
creed and identity could be exacerbated. One way or another, the secular rational approach would be sidestepped by a return to theocratic absolutes, competing or
converging with secular absolutes such as unbridled nationalism.
The new Freedom Act won’t solve US image. Protections from the original version do
solve, even without protections for persons outside the US.
Ries ‘14
(Internally quoting Zeke Johnson, director of Amnesty International's Security & Human Rights Program. Also internally quoting
Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before joining Human
Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of their Project on
Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom, with a particular
focus on international free expression and privacy. She also served as co-chair of the Policy & Learning Committee of the Global
Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and human rights in the
technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights Fellow at Human Rights
in China (HRIC). There, she contributed to the organization’s work in the areas of business and human rights and freedom of
expression online. Wong earned her law degree from New York University School of Law. Also internally quoting Center for
Democracy and Technology Senior Counsel Harley Geiger – Brian Ries is Mashable’s Real-Time News Editor. Prior to working at
Mashable, Brian was Social Media Editor at Newsweek & The Daily Beast, responsible for using Twitter, Facebook, and Tumblr
to cover revolutions, disasters, and presidential elections. During his time at The Daily Beast, he contributed to a team that won
two Webby Awards for “Best News Site”. “Critics Slam 'Watered-Down' Surveillance Bill That Congress Just Passed” - Mashable May 22, 2014 – http://mashable.com/2014/05/22/congress-nsa-surveillance-bill/)
As a result, many
of its initial supporters pulled their support. “We supported the original USA Freedom
act, even though it didn’t do much for non-US persons,” Zeke Johnson, director of Amnesty
International's Security & Human Rights Program told Mashable after Thursday's vote. He described the
original version as “a good step to end bulk collection. ” However, in its current version, it's
not even clear that this bill does that at all, Johnson said. He added that Congress left a lot of "wiggle room" in the
bill — something he said is a real problem. "Where there is vagueness in a law, you can count on the
administration to exploit it," Johnson said. However, Laura W. Murphy, director of the ACLU Washington Legislative Office, took a more
positive view of the bill. "While far from perfect, this bill is an unambiguous statement of congressional intent to rein in the out-of-control NSA," she said in a
statement. "While we share the concerns of many — including members of both parties who rightly believe the bill does not go far enough — without it we would
be left with no reform at all, or worse, a House Intelligence Committee bill that would have cemented bulk collection of Americans’ communications into law." The
Electronic Frontier Foundation simply called it "a weak attempt at NSA reform." “ The
ban on bulk collection was deliberately
watered down to be ambiguous and exploitable,” said Center for Democracy and Technology Senior Counsel Harley Geiger. “We
withdrew support for USA FREEDOM when the bill morphed into a codification of large-scale,
untargeted collection of data about Americans with no connection to a crime or terrorism.” And
Cynthia Wong , senior Internet researcher at Human Rights Watch, said, “This so-called reform bill won’t restore
the trust of Internet users in the US and around the world. Until Congress passes real reform, U.S.
credibility and leadership on Internet freedom will continue to fade.”
Unlike the current Act, the original bill does solve US image. This holds even if plan’s
about bulk collection – instead of every surveillance practices.
HRW ‘14
(Internally quoting Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before
joining Human Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of
their Project on Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom,
with a particular focus on international free expression and privacy. She also served as co-chair of the Policy & Learning
Committee of the Global Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and
human rights in the technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights
Fellow at Human Rights in China (HRIC). There, she contributed to the organization’s work in the areas of business and human
rights and freedom of expression online. Wong earned her law degree from New York University School of Law. Human Rights
Watch is an independent, international organization that works as part of a vibrant movement to uphold human dignity and
advance the cause of human rights for all. “US Senate: Salvage Surveillance Reform House Bill Flawed” - Human Rights Watch May 22, 2014 – http://www.hrw.org/news/2014/05/22/us-senate-salvage-surveillance-reform)
It is up to the US Senate to salvage surveillance reform, Human Rights Watch said today. The version of the USA Freedom
Act that the US House of Representatives passed on May 22, 2014, could ultimately fail to end mass data collection. The
version the House passed is a watered-down version of an earlier bill that was designed to end bulk
collection of business records and phone metadata. The practice has been almost universally condemned by all but the US security
establishment. “This so-called reform bill won’t restore the trust of Internet users in the US and around the
world, ” said Cynthia Wong, senior Internet researcher at Human Rights Watch . “Until Congress
passes real reform , US credibility and leadership on Internet freedom will continue to fade .”
The initial version of the bill aimed to prohibit bulk collection by the government of business records, including phone
metadata.
The bill only addressed one component of the surveillance programs revealed by the former National Security Agency
contractor Edward Snowden, that of US record collections.
Human Rights Watch.
However, it had broad support as a first step, including from
On May 7, a diluted version of the bill passed unanimously out of the House Judiciary Committee, followed by Intelligence Committee
the version the House passed could leave the door wide open to
continued indiscriminate data collection practices potentially invading the privacy of millions of people without
approval on May 8. While better than alternative bills offered,
justification, Human Rights Watch said.
Global Internet Adv - 1AC Democracy version
Global Internet Advantage – Democracy module
New Freedom Act fails to restore US’s global credibility on Internet freedom. The
original version solves by closing SST loopholes.
Brinkerhoff ‘14
(Internally quoting Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before
joining Human Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of
their Project on Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom,
with a particular focus on international free expression and privacy. She also served as co-chair of the Policy & Learning
Committee of the Global Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and
human rights in the technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights
Fellow at Human Rights in China (HRIC). There, she contributed to the organization’s work in the areas of business and human
rights and freedom of expression online. Wong earned her law degree from New York University School of Law. Human Rights
Watch is an independent, international organization that works as part of a vibrant movement to uphold human dignity and
advance the cause of human rights for all. Noel Brinkerhoff is a Political reporter and writer covering state and national politics
for 15 years. “With Support of Obama Administration, House NSA Surveillance Reform Bill Includes Gaping Loopholes” – AllGov
– May 26th - http://www.allgov.com/news/top-stories/with-support-of-obama-administration-house-nsa-surveillance-reformbill-includes-gaping-loopholes-140526?news=853242)
Lawmakers in the U.S. House of Representatives claim they have addressed the problems of the National Security Agency’s (NSA)
notorious bulk collection of data, made so famous last year by whistleblower Edward Snowden. But the
legislation adopted to end this controversial practice contains huge loopholes that could allow the
NSA to keep vacuuming up large amounts of Americans’ communications records, all with the blessing of the Obama
administration. Dubbed the
USA Freedom Act, the bill overwhelmingly approved by the House (303 to 121) was criticized
for not going far enough to keep data out of the hands of government. “This so-called
reform bill won’t restore the trust of Internet users in the U.S. and around the world,” Cynthia Wong,
senior Internet researcher at Human Rights Watch (HRW), said. “Until Congress passes real
reform , U.S. credibility and leadership on Internet freedom will continue to fade.” Julian Sanchez, a
researcher at the Cato Institute, a libertarian think tank, warned that the changes could mean the continuation of bulk collection of phone records by another name.
“The
core problem is that this only ends ‘bulk’ collection in the sense the intelligence community uses
that term,” Sanchez told Wired. “As long as there’s some kind of target , they don’t call that bulk collection,
even if you’re still collecting millions of records…If they say ‘give us the record of everyone who visited
these thousand websites,’ that’s not bulk collection, because they have a list of targets.” HRW says the bill,
which now goes to the Senate for consideration, contains ambiguous definitions about what can and cannot be collected by the agency. For
an earlier version more clearly defined the scope of what the NSA could grab under Section 215 of the
Patriot Act, which has formed the legal basis for gathering the metadata of phone calls. “ Under an earlier version of the USA
instance,
Freedom Act, the government would have been required to base any demand for phone metadata or
other records on a “ specific selection term” that “uniquely describe[s] a person, entity, or account.” Under
the House version, this definition was broadened to mean “a discrete term, such as a term specifically identifying a
person, entity, account, address, or device, used by the government to limit the scope” of information sought,” according to Human Rights Watch. “This
definition is too open-ended and ambiguous to prevent the sort of creative interpretation by intelligence agencies that has been used to
justify overbroad collection practices in the past,” the group claims. The New America Foundation’s Open Technology Institute is similarly
disappointed in the final House bill. “Taken together,” the Institute wrote, “the changes to this definition may still allow for massive
collection of millions of Americans’ private information based on very broad selection terms such as a
zip code, an area code , the physical address of a particular email provider or financial institution , or
the IP address of a web hosting service that hosts thousands of web sites.”
The US can alter global practices that threaten internet freedom – but only when US
image is seen as less hypocritical.
Wong ‘13
Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before joining Human
Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of their Project on
Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom, with a particular
focus on international free expression and privacy. She also served as co-chair of the Policy & Learning Committee of the Global
Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and human rights in the
technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights Fellow at Human Rights
in China (HRIC). There, she contributed to the organization’s work in the areas of business and human rights and freedom of
expression online. Wong earned her law degree from New York University School of Law – “ Surveillance and the Corrosion of
Internet Freedom” - July 30, 2013 - Published in: The Huffington Post and also available at the HRW website at this address:
http://www.hrw.org/news/2013/07/30/surveillance-and-corrosion-internet-freedom
Defenders of US and UK surveillance programs argue that collecting metadata is not as problematic as “listening to the content
of people’s phone calls” or reading emails. This is misleading. Technologists have long recognized that metadata can reveal incredibly sensitive information, especially if it is
collected at large scale over long periods of time, since digitized data can be easily combined and analyzed. The revelations have also exposed glaring
contradictions about the US Internet freedom agenda. This has emboldened the Chinese state media, for example, to cynically
denounce US hypocrisy, even as the Chinese government continues to censor the Internet, infringe on privacy rights, and curb anonymity online. Though there is hypocrisy on both sides,
the widening rift between US values and actions has real, unintended human rights consequences. For the human
rights movement, the Internet’s impact on rights crystalized in 2005 after we learned that Yahoo! uncritically turned user account
information over to the Chinese government, leading to a 10-year prison sentence for the journalist Shi Tao. The US government
forcefully objected to the Chinese government’s actions and urged the tech industry to act responsibly. In the end, that incident
catalyzed a set of new human rights standards that pushed some companies to improve safeguards for
user privacy in the face of government demands for data. US support was critical back then , but it
is hard to imagine the government having the same influence or credibility now. The mass surveillance scandal has damaged
the US government’s ability to press for better corporate practices as technology companies expand globally. It
will also be more difficult for companies to resist overbroad surveillance mandates if they are seen as
complicit in mass US infringements on privacy. Other governments will feel more entitled to ask for the
same cooperation that the US receives. We can also expect governments around the world to pressure companies to store user data locally or maintain a local
presence so that governments can more easily access it, as Brazil and Russia are now debating. While comparisons to the Chinese government are overstated, there is reason to
worry about the broader precedent the US has set. Just months before the NSA scandal broke, India began rolling out a centralized
system to monitor all phone and Internet communications in the country, without much clarity on
safeguards to protect rights. This development is chilling, considering the government’s problematic use of sedition and Internet laws in recent arrests. Over the last
few weeks, Turkish officials have condemned social media as a key tool for Gezi Park protesters. Twitter has drawn particular ire. Now the
government is preparing new regulations that would make it easier to get data from Internet companies and identify
individual users online. The Obama administration and US companies could have been in a strong position to push back in
India and Turkey. Instead, the US has provided these governments with a roadmap for conducting secret, mass
surveillance and conscripting the help of the private sector.
(Note to students: “conscripting” means compulsory enlistment of companies for state service.)
US global democracy promotion is inevitable. Success in the internet freedom agenda
is key to a successful push.
Fontaine ‘11
(et al; Richard Fontaine graduated summa cum laude with a B.A. in International Relations from Tulane University. He also holds
a M.A. in International Affairs from the Johns Hopkins School of Advanced International Studies (SAIS) in Washington, and he
attended Oxford University. He is a member of the Council on Foreign Relations and has been an adjunct professor in the
Security Studies Program at Georgetown University’s School of Foreign Service. He is currently the President of President of the
Center for a New American Security (CNAS). “Internet Freedom A Foreign Policy Imperative in the Digital Age” – June, 2011 http://www.cnas.org/files/documents/publications/CNAS_InternetFreedom_FontaineRogers_0.pdf)
The United States has a long history of providing diplomatic and financial support for the promotion of human
rights abroad, including the right to free expression. While each presidential administration emphasizes human rights to differing
degrees, during recent decades they have all consistently held that human rights are a key U.S. interest. Promoting
freedom of the Internet expands human rights support into cyberspace, an environment in which an
ever-greater proportion of human activity takes place. The United States advocates for freedom of the Internet because it accords not
only with American values, but also with rights America believes are intrinsic to all humanity. For years, the U.S. government has
programmatically and rhetorically supported democracy promotion abroad. The State Department
routinely disburses millions of dollars in funding for democracy-building programs around the world, many
of which are aimed explicitly at expanding free expression. Presidential and other speeches regularly refer to the American belief
in the universality of this right; to cite but one example, a March 2011 White House statement on Syria noted that, “The United States stands for a
set of universal rights, including the freedom of expression and peaceful assembly.”8 The Obama administration’s 2010 National Security Strategy specifically called
for marshaling the Internet and other information technologies to support freedom of expression abroad,9 and the Bush administration adopted a policy of
maximizing access to information and ideas over the Internet.10 America’s interest in promoting freedom via the Internet comes from the same fundamental belief
in democratic values and human rights. Despite inevitable inconsistencies and difficult
tradeoffs, the United States continues to
support democracy. The Bush administration’s 2006 National Security Strategy committed to support democratic institutions abroad through
transformational diplomacy.11 President Obama, after entering office with an evident desire to move away from the
sweeping tone of his predecessor’s “freedom agenda,” nevertheless told the U.N. General Assembly in 2009 that “there are basic
principles that are universal; there are certain truths which are self-evident – and the United States of America will never waver in our efforts
to stand up for the right of people everywhere to determine their own destiny.”12 To the extent that
supporting Internet freedom advances America’s democracy-promotion agenda, the rationale for promoting
online freedom is clear. However, cause and effect are not perfectly clear and the United States must choose its policies under conditions of
uncertainty. Both the Bush and Obama administrations have wagered that by promoting global Internet freedom the
United States will not only operate according to universal values but will
promote tools that
may, on balance,
benefit societies
over the autocrats that oppress them . Secretary of State Hillary Rodham Clinton urged countries to “join us in the bet we have
made, a bet that an open Internet will lead to stronger, more prosperous countries.”13 Given the evidence we discuss
throughout this report, this bet is one worth making.
Global democracy consolidation checks inevitable extinction.
Diamond ‘95
(Larry, Senior Fellow at the Hoover Institution, Promoting Democracy in the 1990s, December,
http://www.wilsoncenter.org/subsites/ccpdc/pubs/di/fr.htm)
This hardly exhausts the lists of threats to our security and well-being in the coming years and decades. In the former Yugoslavia nationalist aggression tears at the
stability of Europe and could easily spread. The flow of illegal drugs intensifies through increasingly powerful international crime syndicates that have made common
Nuclear, chemical, and biological
weapons continue to proliferate. The very source of life on Earth, the global ecosystem, appears
increasingly endangered. Most of these new and unconventional threats to security are associated with or aggravated by
the weakness or absence of democracy, with its provisions for legality, accountability, popular sovereignty, and openness. LESSONS OF THE TWENTIETH
CENTURY The experience of this century offers important lessons. Countries that govern themselves in a truly democratic fashion
do not go to war with one another. They do not aggress against their neighbors to aggrandize themselves or glorify
their leaders. Democratic governments do not ethnically "cleanse" their own populations, and they are much
less likely to face ethnic insurgency. Democracies do not sponsor terrorism against one another. They
do not build weapons of mass destruction to use on or to threaten one another. Democratic countries form more reliable,
open, and enduring trading partnerships. In the long run they offer better and more stable climates for investment. They are more environmentally
responsible because they must answer to their own citizens, who organize to protest the destruction of their environments. They are better bets
cause with authoritarian regimes and have utterly corrupted the institutions of tenuous, democratic ones.
to honor international treaties since they value legal obligations and because their openness makes it much more difficult to breach agreements in secret. Precisely
and the rule of law, democracies are the only reliable
foundation on which a new world order of international security and prosperity can be built.
because, within their own borders, they respect competition, civil liberties, property rights,
The new Freedom Act won’t solve US image. Protections from the original version do
solve, even without protections for persons outside the US.
Ries ‘14
(Internally quoting Zeke Johnson, director of Amnesty International's Security & Human Rights Program. Also internally quoting
Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before joining Human
Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of their Project on
Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom, with a particular
focus on international free expression and privacy. She also served as co-chair of the Policy & Learning Committee of the Global
Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and human rights in the
technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights Fellow at Human Rights
in China (HRIC). There, she contributed to the organization’s work in the areas of business and human rights and freedom of
expression online. Wong earned her law degree from New York University School of Law. Also internally quoting Center for
Democracy and Technology Senior Counsel Harley Geiger – Brian Ries is Mashable’s Real-Time News Editor. Prior to working at
Mashable, Brian was Social Media Editor at Newsweek & The Daily Beast, responsible for using Twitter, Facebook, and Tumblr
to cover revolutions, disasters, and presidential elections. During his time at The Daily Beast, he contributed to a team that won
two Webby Awards for “Best News Site”. “Critics Slam 'Watered-Down' Surveillance Bill That Congress Just Passed” - Mashable May 22, 2014 – http://mashable.com/2014/05/22/congress-nsa-surveillance-bill/)
As a result, many
of its initial supporters pulled their support. “We supported the original USA Freedom
act, even though it didn’t do much for non-US persons,” Zeke Johnson, director of Amnesty
International's Security & Human Rights Program told Mashable after Thursday's vote. He described the
original version as “a good step to end bulk collection. ” However, in its current version, it's
not even clear that this bill does that at all, Johnson said. He added that Congress left a lot of "wiggle room" in the
bill — something he said is a real problem. "Where there is vagueness in a law, you can count on the
administration to exploit it," Johnson said. However, Laura W. Murphy, director of the ACLU Washington Legislative Office, took a more
positive view of the bill. "While far from perfect, this bill is an unambiguous statement of congressional intent to rein in the out-of-control NSA," she said in a
statement. "While we share the concerns of many — including members of both parties who rightly believe the bill does not go far enough — without it we would
be left with no reform at all, or worse, a House Intelligence Committee bill that would have cemented bulk collection of Americans’ communications into law." The
Electronic Frontier Foundation simply called it "a weak attempt at NSA reform." “ The
ban on bulk collection was deliberately
watered down to be ambiguous and exploitable,” said Center for Democracy and Technology Senior Counsel Harley Geiger. “We
withdrew support for USA FREEDOM when the bill morphed into a codification of large-scale,
untargeted collection of data about Americans with no connection to a crime or terrorism.” And
Cynthia Wong , senior Internet researcher at Human Rights Watch, said, “This so-called reform bill won’t restore
the trust of Internet users in the US and around the world. Until Congress passes real reform, U.S.
credibility and leadership on Internet freedom will continue to fade.”
Unlike the current Act, the original bill does solve US image. This holds even if plan’s
about bulk collection – instead of every surveillance practices.
HRW ‘14
(Internally quoting Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before
joining Human Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of
their Project on Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom,
with a particular focus on international free expression and privacy. She also served as co-chair of the Policy & Learning
Committee of the Global Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and
human rights in the technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights
Fellow at Human Rights in China (HRIC). There, she contributed to the organization’s work in the areas of business and human
rights and freedom of expression online. Wong earned her law degree from New York University School of Law. Human Rights
Watch is an independent, international organization that works as part of a vibrant movement to uphold human dignity and
advance the cause of human rights for all. “US Senate: Salvage Surveillance Reform House Bill Flawed” - Human Rights Watch May 22, 2014 – http://www.hrw.org/news/2014/05/22/us-senate-salvage-surveillance-reform)
It is up to the US Senate to salvage surveillance reform, Human Rights Watch said today. The version of the USA Freedom
Act that the US House of Representatives passed on May 22, 2014, could ultimately fail to end mass data collection. The
version the House passed is a watered-down version of an earlier bill that was designed to end bulk
collection of business records and phone metadata. The practice has been almost universally condemned by all but the US security
establishment. “This so-called reform bill won’t restore the trust of Internet users in the US and around the
world, ” said Cynthia Wong, senior Internet researcher at Human Rights Watch . “Until Congress
passes real reform , US credibility and leadership on Internet freedom will continue to fade .”
The initial version of the bill aimed to prohibit bulk collection by the government of business records, including phone
metadata.
The bill only addressed one component of the surveillance programs revealed by the former National Security Agency
contractor Edward Snowden, that of US record collections.
Human Rights Watch.
However, it had broad support as a first step, including from
On May 7, a diluted version of the bill passed unanimously out of the House Judiciary Committee, followed by Intelligence Committee
the version the House passed could leave the door wide open to
continued indiscriminate data collection practices potentially invading the privacy of millions of people without
approval on May 8. While better than alternative bills offered,
justification, Human Rights Watch said.
1AC - India advantages
India Adv - 1AC - financial markets scenario
India Advantage - financial markets scenario
Contention # ____ is India
The US can alter India’s surveillance practices by pressuring global internet companies
to demand privacy. But, this only works when US is less hypocritical.
Wong ‘13
Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before joining Human
Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of their Project on
Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom, with a particular
focus on international free expression and privacy. She also served as co-chair of the Policy & Learning Committee of the Global
Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and human rights in the
technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights Fellow at Human Rights
in China (HRIC). There, she contributed to the organization’s work in the areas of business and human rights and freedom of
expression online. Wong earned her law degree from New York University School of Law – “ Surveillance and the Corrosion of
Internet Freedom” - July 30, 2013 - Published in: The Huffington Post and also available at the HRW website at this address:
http://www.hrw.org/news/2013/07/30/surveillance-and-corrosion-internet-freedom
Defenders of US and UK surveillance programs argue that collecting metadata is not as problematic as “listening to the content
of people’s phone calls” or reading emails. This is misleading. Technologists have long recognized that metadata can reveal incredibly sensitive information, especially if it is
collected at large scale over long periods of time, since digitized data can be easily combined and analyzed. The revelations have also exposed glaring
contradictions about the US Internet freedom agenda. This has emboldened the Chinese state media, for example, to cynically
denounce US hypocrisy, even as the Chinese government continues to censor the Internet, infringe on privacy rights, and curb anonymity online. Though there is hypocrisy on both sides,
the widening rift between US values and actions has real, unintended human rights consequences. For the human
rights movement, the Internet’s impact on rights crystalized in 2005 after we learned that Yahoo! uncritically turned user account
information over to the Chinese government, leading to a 10-year prison sentence for the journalist Shi Tao. The US government
forcefully objected to the Chinese government’s actions and urged the tech industry to act responsibly. In the end, that incident
catalyzed a set of new human rights standards that pushed some companies to improve safeguards for
user privacy in the face of government demands for data. US support was critical back then , but it
is hard to imagine the government having the same influence or credibility now. The mass surveillance scandal has damaged
the US government’s ability to press for better corporate practices as technology companies expand globally. It
will also be more difficult for companies to resist overbroad surveillance mandates if they are seen as
complicit in mass US infringements on privacy. Other governments will feel more entitled to ask for the
same cooperation that the US receives. We can also expect governments around the world to pressure companies to store user data locally or maintain a local
presence so that governments can more easily access it, as Brazil and Russia are now debating. While comparisons to the Chinese government are overstated, there is reason to
worry about the broader precedent the US has set. Just months before the NSA scandal broke, India began rolling out a centralized
system to monitor all phone and Internet communications in the country, without much clarity on
safeguards to protect rights. This development is chilling, considering the government’s problematic use of sedition and Internet laws in recent arrests. Over the last
few weeks, Turkish officials have condemned social media as a key tool for Gezi Park protesters. Twitter has drawn particular ire. Now the
government is preparing new regulations that would make it easier to get data from Internet companies and identify
individual users online. The Obama administration and US companies could have been in a strong position to push back
in India and Turkey. Instead, the US has provided these governments with a roadmap for conducting secret,
mass surveillance and conscripting the help of the private sector.
(Note to students: “conscripting” means compulsory enlistment of companies for state service.)
Independently, US bulk surveillance sets precedent that causes indiscriminate
surveillance in India.
Sinha ‘14
(et al; Authors Include: G. Alex Sinha, Aryeh Neier fellow with the US Program at Human Rights Watch and the Human Rights
Program at the American Civil Liberties Union. Sinha holds a J.D. from New York University’s School of Law. This includes a
specialization as a Scholar from NYU’s Institute for International Law & Justice. The author also holds a Ph.D. in Philosophy
University of Toronto. Additional authors include - Maria McFarland Sanchez-Moreno, US Program deputy director at Human
Rights Watch, who participated in some of the research interviews; and Andrea Prasow, deputy Washington Director at Human
Rights Watch, who also participated in one of the research interviews and provided key contacts. Human Rights Watch is an
independent, international organization that works as part of a vibrant movement to uphold human dignity and advance the
cause of human rights for all. From the Report: WITH LIBERTY TO MONITOR ALL How Large-Scale US Surveillance is Harming
Journalism, Law and American Democracy – This report is based on extensive interviews with some 50 journalists covering
intelligence, national security, and law enforcement for outlets including the New York Times, the Associated Press, ABC, and
NPR. JULY 2014 – available at: http://www.hrw.org/node/127364)
The questions raised
by surveillance are complex. The government has an obligation to protect national security, and in some
cases, it is legitimate for government to restrict certain rights to that end. At the same time, international human rights and
constitutional law
set limits on the state’s authority to engage in activities like surveillance, which have the potential to
large-scale , often indiscriminate US approach to surveillance
carries enormous costs. It erodes global digital privacy and sets a terrible example for other countries
like India , Pakistan, Ethiopia, and others that are in the process of expanding their surveillance capabilities. It
also damages US credibility in advocating internationally for internet freedom, which the US has
undermine so many other rights. The current,
listed as an important foreign policy objective since at least 2010. As this report documents, US surveillance programs
are also doing damage to some of the values the United States claims to hold most dear. These include freedoms of
expression and association, press freedom, and the right to counsel, which are all protected by both international human rights law and the US
Constitution.
India’s surveillance is not narrowly-targeted. This indiscriminate, bulk collection hurts
India’s financial markets.
Trivedi ‘13
Anjani Trivedi. The author holds a Master Degree in Journalism from the University of Hong Kong and a Bachelor’s Degree in
Mathematics from MIT. The author has previously held internships at the New York Times and CNN International. This piece
internally quotes Meenakshi Ganguly, The South Asia director for Human Rights Watch; Anja Kovacs of the Internet Democracy
Project; and Sunil Abraham, executive director of India’s Centre for Internet and Society. “In India, Prism-like Surveillance Slips
Under the Radar” – Time Magazine – 6-30-13 - http://world.time.com/2013/06/30/in-india-prism-like-surveillance-slips-underthe-radar/#ixzz2YpWhRsrB
CMS is an ambitious surveillance system that monitors text messages, social-media engagement and phone calls on landlines and
cell phones, among other communications. That means 900 million landline and cell-phone users and 125 million Internet users. The project, which is being implemented by
the government’s Centre for Development of Telematics (C-DOT), is meant to help national law-enforcement agencies save time and avoid manual intervention, according to the Department of Telecommunications’ annual report.
This has been in the works since 2008, when C-DOT started working on a proof-of-concept, according to an older report. The government set aside approximately $150 million for the system as part of its 12th five-year plan,
although the Cabinet ultimately approved a higher amount. Within the internal-security ministry though, the surveillance system remains a relatively “hush-hush” topic, a project official unauthorized to speak to the press tells
TIME. In April 2011, the Police Modernisation Division of the Home Affairs Ministry put out a 90-page tender to solicit bidders for communication-interception systems in every state and union territory of India. The system
requirements included “live listening, recording, storage, playback, analysis, postprocessing” and voice recognition.
Civil-liberties groups concede that states often need
to undertake targeted- monitoring operations. However, the move toward extensive “surveillance capabilities enabled by digital communications,”
suggests that governments are now “casting the net wide, enabling intrusions into private lives,” according to Meenakshi Ganguly, South Asia director for Human Rights Watch. This extensive communications surveillance through
the likes of Prism and CMS are “out of the realm of judicial authorization and allow unregulated, secret surveillance, eliminating any transparency or accountability on the part of the state,” a recent U.N. report stated. India is no
stranger to censorship and monitoring — tweets, blogs, books or songs are frequently blocked and banned. India ranked second only to the U.S. on Google’s list of user-data requests with 4,750 queries, up 52% from two years
back, and removal requests from the government increased by 90% over the previous reporting period. While these were largely made through police or court orders, the new system will not require such a legal process. In recent
times, India’s democratically elected government has barred access to certain websites and Twitter handles, restricted the number of outgoing text messages to five per person per day and arrested citizens for liking Facebook
posts and tweeting. Historically too, censorship has been India’s preferred means of policing social unrest. “Freedom of expression, while broadly available in theory,” Ganguly tells TIME, “is endangered by abuse of various India
laws.” There is a growing discrepancy and power imbalance between citizens and the state, says Anja Kovacs of the Internet Democracy Project. And, in an environment like India where “no checks and balances [are] in place,” that
is troubling. The potential for misuse and misunderstanding, Kovacs believes, is increasing enormously. Currently, India’s laws relevant to interception “disempower citizens by relying heavily on the executive to safeguard
individuals’ constitutional rights,” a recent editorial noted. The power imbalance is often noticeable at public protests, as in the case of the New Delhi gang-rape incident in December, when the government shut down public
transport near protest grounds and unlawfully detained demonstrators. With an already sizeable and growing population of Internet users, the government’s worries too are on the rise. Netizens in India are set to triple to 330
million by 2016, according to a recent report. “As [governments] around the world grapple with the power of social media that can enable spontaneous street protests, there appears to be increasing surveillance,” Ganguly
explains. India’s junior minister for telecommunications attempted to explain the benefits of this system during a recent Google+ Hangout session. He acknowledged that CMS is something that “most people may not be aware of”
because it’s “slightly technical.” A participant noted that the idea of such an intrusive system was worrying and he did not feel safe. The minister, though, insisted that it would “safeguard your privacy” and national security. Given
the high-tech nature of CMS, he noted that telecom companies would no longer be part of the government’s surveillance process. India currently does not have formal privacy legislation to prohibit arbitrary monitoring. The
new system comes under the jurisdiction of the Indian Telegraph Act of 1885, which allows for monitoring communication in the “interest of public safety. The surveillance system is not
only an “abuse of privacy rights and security-agency overreach,” critics say, but also counterproductive in terms of
security. In the process of collecting data to monitor criminal activity, the data itself may become a
target for
criminals a “honeypot,” according to Sunil Abraham, executive director of India’s
Centre for Internet and Society. Additionally, the wide-ranging tapping undermines financial
markets , Abraham says by compromising confidentiality, trade secrets and intellectual property
terrorists and
—
,
. What’s more,
Whether the nation’s patchy infrastructure will be able to
handle a complex web of surveillance and networks, no one can say. That, Abraham contends, is what attackers will target.
vulnerabilities will have to be built into the existing cyberinfrastructure to make way for such a system.
Financial markets key to India’s Economy.
Goyal ‘14
Dr. Sakshi Goyal, former Faculty member at the Kaling Institute of Management Studies, Faridabad, Haryana (India). “Indian
Financial Markets: A Global Perspective” - Journal of Business Management & Social Sciences Research (JBM&SSR) - Volume 3,
No.6, June 2014 - ISSN No: 2319-5614. Available at:
http://www.borjournals.com/a/index.php/jbmssr/article/viewFile/1729/1078
Financial markets are a vital part of an economy making it possible for industry, trade and commerce to
flourish without any obstacle in terms of resources. Today most economies around the world are judged by the performance of
their financial markets. The financial markets have indicators in place that reflect the performance of companies whose securities are traded in those markets. The financial markets also serve a vital
purpose in the growth and development of a company, which wants to expand. Such companies with expansion plans and new projects are in need of funding and the financial market serves as the best platform from which a
company can determine the feasibility of such possibilities
Krishnan (2011) mentioned that, the economic literature acknowledged that efficient and developed financial markets could lead to
increased economic growth by improving the efficiency of allocation and utilization of savings in the economy. Better functioning financial systems ease the external financing constraints that impede firm and industrial expansion.
“
There is a growing body of empirical analyses, including firm-level studies, industry-level studies, individual country
studies, and cross-country comparisons, which prove this strong, positive link between the functioning of the
financial system and long-run economic growth.
they better allocate resources, monitor managers and
exert corporate control, mobilize savings, and facilitate the exchange of goods and services”. A capital market is a market for securities (debt or equity), where business
In addition,
enterprises (companies) and governments can raise long-term funds. It is defined as a market in which money is provided for periods longer than a year as the raising of short-term funds takes place on other markets (e.g., the
money market). The capital market includes the stock market (equity securities) and the bond market (debt) The capital market of a country can be considered as one of the leading indicators in determining the growth of its
economy. As mentioned by C.Rangarajan, Ex Governor, RBI (1998), “The growth process of any economy depends on the functioning of financial markets which also helps to augment its Capital formation. According to Professor
Hicks, the industrial Revolution in England was ignited more by the presence of liquid financial market than the technological investment”. He writes interestingly- “What happened in the Industrial Revolution is that the Range of
fixed capital goods that were used in production Began noticeably to increase. But fixed capital is sunk; it is embodied in a particular form, from which it can only gradually be released. In order that people should be willing to sink
large amounts of capital it is the availability of liquid funds which is crucial. This condition was satisfied in England ...by the first half of the eighteenth century The liquid asset was there, as it would not have been even a few years
earlier “ Thus, liquidity is a very important component of Financial Market and plays a very vital role in the long run economic development of any country as it helps not only in promoting the savings of the economy but also to
adopt an effective channel to transmit various financial policies by creating liquidity in the market. Therefore Financial System of any country should be well developed, competitive, efficient and integrated to face all shocks. The
financial system and infrastructure of any country at any time can be considered as the result of its own peculiar historical evolution. This evolution is resulted by continuous interaction between all the participants existing in the
system and public policy interventions. The evolution of Indian financial markets and the regulatory system has also followed a similar path. India began with the central bank, Reserve Bank of India (RBI), as the banking sector
regulator, and the Ministry of Finance as the regulator for all other financial sectors. Today, most financial service providers and their regulatory agencies exist. The role of regulators has evolved over time from that of an
instrument for planned development in the initial stage to that of a referee of a relatively more modern and complex financial sector at present. Over this period, a variety of financial sector reform measures have been undertaken
in India, with many important successes. An important feature of these reforms has been the attempt of the authorities to align the regulatory view the needs of the country and domestic factors. These reforms can be broadly
classified as steps taken towards: a) Liberalizing the overall macroeconomic and regulatory environment within which financial sector institutions function. b) Strengthening the institutions and improving their efficiency and
competitiveness. c) Establishing and strengthening the regulatory framework and institutions for overseeing the financial system.The history of Indian capital markets spans back 200 years, around the end of the 18th century. It
was at this time that India was under the rule of the East India Company. The capital market of India initially developed around Mumbai; with around 200 to 250 securities brokers participating in active trade during the second half
of the 19th century. There are a number of factors that have paved path for India market growth. After the economic liberalization, policies were undertaken in the 1990s, the economy of the country has been steadily rising which
has led to more demands and supply circles. This has introduced diverse market sectors and industries in the country, which has led to a competitive consumer market. Through this research paper, an attempt is made to
understand the evolution of Global financial system with more emphasis on Indian markets. It also aims to study the global perspective of financial markets of any country and to understand that how a country’s financial markets is
integrated with the other world markets. Also the concept of efficiency is highlighted which says that a country whose financial markets are well integrated with the world markets are more efficient as compared to one whose
financial markets are not very well integrated. Lastly the paper concludes by leaving scope and opportunities to understand these global concepts in an easier way to the reader and further can be used for extensive research. A
the areas of surplus to the areas of deficit. A Financial System is a composition of various institutions, markets, regulations
and laws, practices, money manager, analysts, transactions and claims and liabilities. Indian Financial market can be considered as one of the oldest across the globe and is experiencing
financial system or financial sector functions as an intermediary and facilitates the flow of funds from
favorable time during the recent years, which have prospered the economy of the country to a
great extent.
Presently, India is rated by six international credit rating agencies, namely Standard and Poor’s (S&P), Moody’s Investor Services, FITCH, Dominion Bond Rating Service (DBRS), the Japanese
Credit Rating agency (JCRA), and the Rating and Investment Information Inc., Tokyo( R&I).
Indian economic upheaval sparks nuclear war with Pakistan – risks of accident,
miscalc, and unauthorized theft all increase.
Busch ‘4
Please note that an updated edition of this book was re-released in Feb of 2015, but the original date was placed in the citation.
Dr. Nathan Busch, Professor of Government and co-director of the Center for American Studies at Christopher Newport
University. The author holds a Ph.D. in International relations from the University of Toronto and an MA in Political Science
from Michigan State University. The author previously held the position of Research Fellow, Belfer Center for Science and
International Affairs, Kennedy School of Government, Harvard University and also held the position of Visiting Faculty, National
Security Office, Los Alamos National Laboratory. This piece of evidence internally quotes George Perkovich, a South Asia expert
at the Carnegie Endowment for International Peace. It also internally quotes François Heisbourg. He chairs the Geneva Centre
for Security Policy and the London-based International Institute for Strategic Studies. His career has included positions in
government (member of the French mission to the UN, international security adviser to the Minister of Defence), in the defense
industry (vice-president of Thomson-CSF; senior vice president for strategy at Matra Défense Espace) and in academia
(professor of world politics at Sciences-Po Paris, director of the IISS). He is also a member of the International Commission on
nuclear non-proliferation and disarmament, and has sat on a number of national and international blue-ribbon bodies. From
the book: No End in Sight: The Continuing Menace of Nuclear Proliferation - p. 202-209
In addition, because
the Indian military currently has little experience handling nuclear weapons, the risks of
accidental use could be very high during a crisis situation, at least for some time to come. If the order were given to prepare India's
nuclear weapons for possible use, the military (perhaps in conjunction with India's nuclear scientists) would need to assemble the warheads rapidly; mate them to
the deliver)' vehicles (gravity bombs or missiles); and prepare them for use, either by loading them into bombers or by aiming the missiles and preparing them for
launch. All these procedures require training and precision, and, given the early stages of India's new command-and-control arrangements, it is not at all clear that
the Indian military would be able to carry them out safely under extreme time constraints.194 If India decided to develop a rapid-response capability, some of these
dangers would be lessened, but more serious dangers would be introduced. In particular, there would be a significantly increased risk of an accidental launch of
nuclear-armed missiles. India
would need to engage in a great deal of additional research into safety mechanisms
to prevent such an accidental launch, and it is simply not known how much effort India is devoting, or
will devote, to this area.195 Because the Prithvi and the two-stage Agni-I missiles contain a nonstorable liquid fuel, it would be impossible to deploy
the current configuration of either missile to allow for a rapid response. This significantly reduces the likelihood of these missiles being launched accidentally during
normal circumstances, though the
risks of accidental launches would probably increase significantly if they were fueled during a
crisis situation. As noted, however, India has conducted several successful flight tests of the Agni and Agni-II missiles. Because these missiles use a solid fuel, they
could be deployed in a rapid-response state. If India were to choose such a deployment option, the risks of an accidental launch could increase significantly. These
risks would depend on the extent to which India integrates use-control devices into its weapons to prevent accidental launches, but there is little evidence that India
is currently devoting significant efforts to develop such use-control devices.196 Furthermore, even if India intends to develop such use-control devices, if a nuclear
crisis were to arise before India had developed them, it still might be tempted to mate warheads on its missiles. If India does decide to weaponize its arsenal, it still
remains to be seen what type of deployment option it would choose. According to a statement in November 1999 by India's foreign minister, Jaswant Singh, India
would not keep its weapons on a "hair-trigger alert," though he did suggest that these weapons would be dispersed and made mobile to improve their chances of
surviving a first strike.197 If this statement is true, then the risks of accidental launch would be relatively small during normal circumstances.198 But these risks
would increase significantly during crisis situations, when India would presumably mate the warheads to the missiles.199 If the military still has not been given
physical control over the warheads, this would further reduce risks of accidental use during peacetime, though the transfer of nuclear weapons to the military
during a crisis could significantly increase the risks of an accident due to the military's inexperience in handling the nuclear weapons.200 What deployment option
Pakistan might adopt depends in part on India's weapon deployment. It appears that if India were to adopt a rapid-response option, Pakistan would probably adopt
a similar missile deployment, thereby increasing the risks of an accidental launch of its nuclear weapons as well. But even if India were to deploy its weapons (in
field positions) withour the warheads mated, concerns about survivability might nevertheless cause Pakistan to adopt a rapid-response capability. If such an event
were to occur, the risks of Pakistani accidental missile launches could be quite high, especially because it is unlikely that Pakistan currently has the technical capacity
to integrate sophisticated launch controls into its missile designs. Just
as in India, it is also unlikely that Pakistan's nuclear
devices are designed to minimize risks of accidents.201 Because Pakistan's warheads are based on an
early Chinese warhead design, they probably do not contain one-point safety designs, IHE, or fire-resistant
pits. If Pakistan were to assemble its nuclear warheads, there could be an unacceptable risk of an
accidental detonation of its nuclear weapons. Moreover; if Pakistan were to mate nuclear warheads to its missiles, either because it chose
to establish a rapid-response capability or because of an ongoing nuclear crisis, then similar concerns would exist about accidental launches of Pakistani nuclear
risks of unauthorized use of nuclear weapons in India and Pakistan are probably relatively
small because they have a very small number of nuclear weapons and those weapons are tightly controlled by their nuclear establishments. But there are a
number of factors that could increase risks of unauthorized use in the future. Although both India and Pakistan currently
weapons. The current
possess nuclear weapons that could be delivered by aircraft, and are both actively developing nuclear-capable ballistic missiles, none of their weapons appear to
contain sophisticated use-control devices to prevent unauthorized use. Instead, the nuclear
controls in both countries appear to be based on
guards, gates, and guns . As we have seen in the Russian and Chinese cases, while the "3 G's" might be sufficient
during normal circumstances, they are particularly vulnerable during political, economic , and social
upheaval s. The Russian case has demonstrated that severe domestic upheavals can undermine central controls and weaken the
infrastructures that previously maintained the security
for nuclear weapons. In particular, such upheavals can undermine the
loyalty of guards and workers at nuclear facilities, especially if the state collapses economically and can no longer
afford to pay those employees. Neither India nor Pakistan appears to have taken the necessary steps to
prevent such weaknesses from arising in their nuclear controls. Because Indian and Pakistani nuclear controls
rely on the "3 G's" while reportedly lacking personnel reliability programs, there could be a significant risk of thefts
of nuclear weapons during severe upheavals.
The Russian analogy is particularly relevant in the Pakistani case. The
Pakistani state is far from stable. After the nuclear tests in 1998 and the military coup in 1999, the Pakistani economy came close to collapsing and remained quite
unstable for the next several years.202 In the aftermath of the September 11, 2001, terrorist attacks, the United States removed economic sanctions and approved
nearly $1 billion in international foreign aid to Pakistan. But with a debt burden of nearly $39 billion, massive economic disparities, and continuing low levels of
foreign investment, there still is significant cause for concern about the prospects for Pakistan's long-term political and economic stability.203 If the Pakistani state
were to fail, there could be significant risks of a collapse in its nuclear controls. Were such an event to occur, there could be an extreme risk of thefts of nuclear
weapons or of nuclear weapons falling into the hands of Islamic militants.204 In the events following the September 11 attacks and President Musharraf's decision
to support U.S. military strikes in Afghanistan, there were serious concerns about a potential collapse of Pakistani nuclear controls. These concerns were spurred by
reports of public riots, a close affiliation among some elements of the Pakistani military and intelligence community with the Taliban regime and al Qaeda, and the
tenuous hold that Pakistani president Musharraf appears to have in Pakistan.205 In October 2001, President Musharraf took significant steps to centralize his
control by removing high-level military and intelligence officers with ties to the Taliban, but analysts have nevertheless continued to raise concerns about
Musharraf's ability to maintain control.206 Due to the seriousness of these risks, President Musharraf ordered an emergency redeployment of Pakistan's nuclear
arsenal, and the United States has offered to advise Pakistan on methods for securing its nuclear stockpile. ' If the U.S. military strikes in Afghanistan had extended
for a longer period, Musharraf might have found it increasingly difficult to remain in power and reign in the more extreme elements in his country. One also
cannot rule out the possibility that terrorists might choose to target nuclear facilities in India and Pakistan,
especially if domestic instability were to increase.
Both India and Pakistan have serious problems with domestic
terrorism.208 These terrorists are increasingly well-armed and have targeted critical infrastructures and military bases in the past.209 Although current defenses at
both Indian and Pakistani nuclear weapons storage facilities are probably sufficient to defend against most terrorist attacks,210 the physical protection systems at
other nuclear facilities might be less effective.211 Moreover, if the defenses
at the most sensitive facilities were weakened by
domestic upheavals, then the risks of successful terrorist attacks—either for purposes of theft or sabotage—could
increase significantly. But even if such extreme events did not occur, the tightly controlled decision-making and underdeveloped command-and-control
structures in both India and Pakistan could potentially allow unauthorized use, particularly during crises. In India, some of these risks have been minimized by the
because India
probably still lacks clearly defined, detailed operational procedures and established, resilient communication channels, there would
formalization of its command structure, though the military units are still fairly inexperienced with handling these weapons.212 Moreover,
still be a fairly high risk of unauthorized use arising from confusion or miscommunication during a
crisis. These concerns will probably remain for some time to come, though the specific risks could eventually be improved, depending on the training the military
receives and the degree of professionalism among the troops. Because Pakistan is currently under military rule, and its nuclear weapons are controlled by the
military, one would expect a better coordination of nuclear decision-making and command-and-control systems. Nevertheless, there are potential problems with
Pakistani command and control as well. The lack of a clear operational use doctrine, combined with inadequate C3I could increase the risks of unauthorized use
during crises: "there is no enunciated nuclear doctrine, nor are there decision-making and communications systems adequate for either strategic or tactical
command and control in the nuclear environment. Nuclear targeting information could not be passed in time to be of use in a rapidly changing situation, which
would increase the probability of own-troop strikes by tactical [nuclear] missiles."213 The risks or unauthorized use would increase if India and Pakistan were to
deploy their weapons on ballistic missiles. Risks of decapitation and questions about the survivability of the nuclear forces would probably cause both India and
Pakistan to deploy mobile systems if they were to operationalize their nuclear forces. These systems would significantly increase difficulties in command and
control, especially because their weapons lack use-control devices.214 In addition, because of the risks of decapitation, Pakistan is likely to adopt a "delegative"
system, where the authority to launch nuclear weapons is given to a number of military officials.215 As the number of people authorized to launch nuclear weapons
increases, so does the risk of a use of nuclear weapons that has not been commanded by the central authorities.216 The
greatest concerns have
been raised about a possible inadvertent use of nuclear weapons in South Asia. The combined effects of mutual
mistrust, very short flight times for missiles, continual armed conflicts along their borders, and few reliable CBMs make the risks of inadvertent use quite severe,
especially during crisis situations. According
to George Perkovich, a South Asia expert at the Carnegie Endowment
for International Peace, "Kargil proved that having nuclear weapons would not deter new
conflicts. It also showed that unless such conflicts themselves were prevented, the possibility of an accidental or deliberate nuclear exchange would also
increase given both states' relatively poor systems of intelligence surveillance and nuclear command and control."217 Due
to continual mistrust
between the two countries, each would be likely to misinterpret military movements, missile tests, or accidental
detonations as an impending attack by the other side. The risks of misinterpreting each other's motives are compounded by the
vulnerability of their nuclear forces and the short flight times of the forces to key targets. For example, because the runways at Pakistani Air Force bases could be
destroyed by a conventional air strike or nuclear attack,218 India could effectively eliminate Pakistan's nuclear bomber capability. During
an acute crisis,
Pakistan might be faced with a "use them or lose them" dilemma, in that it would need to attack rapidly
or lose its ability to retaliate altogether. For this reason, Pakistani officials would be extremely
suspicious of any Indian actions that could be interpreted as preparations for an
attack. Because the flight time of Indian bombers is approximately ten minutes, Pakistani leaders would have a very limited amount of time to decide
whether to launch their own attack.219 These conditions thus create an ongoing environment in which inadvertent use is quite possible. In addition, both countries
have unreliable intelligence systems, which have repeatedly misinterpreted the other's intentions. For example, during the Brasstacks incident, Pakistani
intelligence reported that India's exercise was merely a cover for an attack. Meanwhile, Indian intelligence overlooked the defensive nature of the Pakistani troops'
position. These intelligence failures caused each side to escalate the tensions unnecessarily. In addition, their intelligence systems have sometimes failed to detect
major troop movements altogether. As we have seen, during the Brasstacks crisis, Indian surveillance planes did not detect Pakistani troops positioned at their
border for two weeks. And in the 1999 Kargil war, Indian intelligence failed to detect the Pakistani invasion until several months after they had positioned
themselves at strategic locations in the Kargil heights. These intelligence failures could have two consequences. First, if either side were surprised by comparatively
benign actions (such as Pakistan's defensive positioning during the Brasstacks crisis), it would be more likely to overreact and mistakenly conclude that an attack is
imminent. And second, if one side (especially Pakistan) is confident that an invasion would not be detected at first, it might be more likely to launch attacks across
the border: Each of these scenarios would greatly increase the risks of nuclear escalation.220 Presumably owing to the massive intelligence failure prior to the 1999
Kargil war, however, India has recently made significant investments in its intelligence-gathering capabilities, which could reduce risks of such failures by India in the
future.221 The
dangers of miscalculations and intelligence failures are increased by the crude early-warning
systems employed by both countries, particularly Pakistan. Several incidents serve to illustrate this point. First, prior to Pakistan's
nuclear tests in 1998, Pakistan reported that it had detected an air force attack on its radars and warned that it had mated a number of warheads to its Ghauri
missiles.222 While this report might have been circulated in order to justify their nuclear tests, circulating such a report could have caused India to mate weapons to
its missiles, greatly increasing the risks of inadvertent use (as well as accidental and unauthorized use). Another, perhaps more troubling, incident occurred prior to
the U.S. missile strike on Afghanistan in August 1998. The United States sent a high-level U.S. official to Pakistan because it feared Pakistan would detect the missile
and interpret it as an Indian strike. Pakistan never even detected the missile, however. Scholars have pointed out that this incident emphasizes not only the U.S.
concern about inadvertent nuclear war between India and Pakistan, but also that Pakistan's early-warning system "has serious flaws, and such shortcomings are
more likely to foster nervousness than calm. To the extent that they lack reliable early-warning systems, India or Pakistan could base launch decisions on unreliable
sources, increasing the chance of mistakes."223 But even if India and Pakistan had reliable early-warning systems, the risks of inadvertent war would still be
extremely high. If Indian or Pakistani radars detected aircraft headed toward them, they would have very little time to decide what to do before the aircraft reached
their targets. In addition, because there would be a great deal of uncertainty about whether attacking bombers carried conventional or nuclear weapons, the
attacked side (especially Pakistan) could
face a "use them or lose them" scenario and be tempted to launch a
nuclear attack to ensure that its nuclear capability was not destroyed.224 Thus, even if India and Pakistan do not deploy
nuclear weapons on missiles, the risks of an inadvertent use in these circumstances could be extremely high. If India and Pakistan were to deploy their nuclear
weapons on missiles (a scenario that is quite likely, given the vulnerability of Pakistani airfields and India's stated need for deterrence against the People's Republic
of China), the risks of inadvertent use would become even worse. Because the flight time for ballistic missiles between the two countries is less than five
minutes,225 Indian and Pakistani leaders would have virtually no time to decide what action to take (or perhaps even to launch a retaliatory strike) before the
missiles hit their targets.226 The psychological effect on the two countries would be tremendous. According
to Francois Heisbourg, once theater
missiles are deployed in South Asia, the strategic
situation will resemble the Cuban missile crisis, except that it "would be
permanent rather than tempo-rary, would occur without adequate C3I in place, and with political leadership located less than
five minutes from mutual Armageddon." 227
(Note to students: “3 G’s” – internally referenced – stands for “guards, gates, and guns” as a security
measure to protect an installation. “C3I” – also internally referenced – stands for “Command, Control,
Communications and Intelligence”).
Even a limited nuclear war between India & Pakistan causes extinction – smoke and
yields prove
Toon ’07
(et al, O. B. Toon -- Department of Atmospheric and Oceanic Sciences, Laboratory for Atmospheric and Space Physics, University
of Colorado, Boulder, CO, -- “Atmospheric effects and societal consequences of regional scale nuclear conflicts and acts of
individual nuclear terrorism” – Atmospheric Chemistry & Physics – April 19th -- http://www.atmos-chemphys.net/7/1973/2007/acp-7-1973-2007.pdf)
We assess the potential damage and smoke production associated with the detonation of small nuclear
weapons in modern megacities. While the number of nuclear warheads in the world has fallen by about a factor of three since its peak in 1986, the number of
nuclear weapons states is increasing and the potential exists for numerous regional nuclear arms races. Eight countries are known to have nuclear weapons, 2 are
constructing them, and an additional 32 nations already have the fissile material needed to build substantial arsenals of low-yield (Hiroshima-sized) explosives.
Population and economic activity worldwide are congregated to an increasing extent in megacities, which might be targeted in a nuclear conflict. We
find
that low yield weapons, which new nuclear powers are likely to construct, can produce 100 times as
many fatalities and 100 times as much smoke from fires per kt yield as previously estimated in analyses
for full scale nuclear wars using high-yield weapons , if the small weapons are targeted at city centers. A single
“small” nuclear detonation in an urban center could lead to more fatalities, in some cases by orders of magnitude, than have occurred in the major historical
a regional nuclear exchange involving 100 15-kt explosions (less than 0.1% of the
explosive yield of the current global nuclear arsenal). We find that such an exchange could produce direct fatalities comparable to all of
those worldwide in World War II, or to those once estimated for a “counterforce” nuclear war between the
superpowers. Megacities exposed to atmospheric fallout of long-lived radionuclides would likely be abandoned indefinitely, with severe national and
international implications. Our analysis shows that smoke from urban firestorms in a regional war would rise into the
upper troposphere due to pyro-convection. Robock et al. (2007) show that the smoke would subsequently rise deep into the stratosphere due to
atmospheric heating, and then might induce significant climatic anomalies on global scales. We also anticipate
substantial perturbations of global ozone. While there are many uncertainties in the predictions we make here, the principal unknowns are
conflicts of many countries. We analyze the likely outcome of
the type and scale of conflict that might occur. The
scope and severity of the hazards identified pose a significant
threat to the global community. They deserve careful analysis by governments worldwide advised by a broad section of the world scientific community,
as well as widespread public debate. In the 1980s, quantitative studies of the consequences of a nuclear conflict between the superpowers provoked international scientific and political
debate, and deep public concern (Crutzen and Birks, 1982; Turco et al., 1983; Pittock et al., 1985). The resulting recognition that such conflicts could produce global scale damage at
unacceptable levels contributed to an ongoing reduction of nuclear arsenals and improvements in relationships between the major nuclear powers. Here we discuss the effects of the use of a
single nuclear weapon by a state or terrorist. We then provide the first comprehensive quantitative study of the consequences of a nuclear conflict involving multiple weapons between the
emerging smaller nuclear states. Robock et al. (2007) explore the climate changes that might occur due to the smoke emissions from such a conflict. The results of this study show that the
potential effects of nuclear explosions having yields similar to those of the weapons used over Japan during the Second World War (WW-II) are, in relation to yield, unexpectedly large. At least
eight countries are capable of transport and detonation of such nuclear devices. Moreover, North Korea appears to have a growing stockpile of warheads, and Iran is suspiciously pursuing
uranium enrichment – a necessary precursor to weapons construction. Thirty-two other countries that do not now have nuclear weapons possess sufficient fissionable nuclear materials to
construct weapons, some in a relatively short period of time. For these nations, a regional conflict involving modest numbers of 15-kiloton (kt, the TNT explosive yield equivalent) weapons to
attack cities could cause casualties that exceed, in some cases by orders of magnitude, their losses in previous conflicts. Indeed, in some case, the casualties can rival previous estimates for a
limited strategic war between the superpowers involving thousands of weapons carrying several thousand megatons (Mt) of yield. Early radioactive fallout from small nuclear ground bursts
would leave large sections of target areas contaminated and effectively uninhabitable. (Hiroshima and Nagasaki were attacked by airbursts, which will not deposit large amounts of local
radiation unless it is raining. They were continuously inhabited.) Because of the smoke released in fires ignited by detonations, there is a possibility that 100 15-kt weapons used against city
centers would produce global climate disturbances unprecedented in recorded human history (Robock et al., 2007). An individual in possession of one of the thousands of existing lightweight
nuclear weapons could kill or injure a million people in a terrorist attack. Below we first discuss the arsenals of the existing, and potential, nuclear powers. We then describe the casualties due
to blast and to fires set by thermal radiation from an attack on a single megacity with one low yield nuclear weapon. Next we discuss the casualties if current and projected arsenals of such
weapons were ever used in a regional conflict. We then discuss the impact of radioactive contamination. Finally, we describe the amounts of smoke that may be generated in a regional scale
conflict. At the end of each of these sections we outline the associated uncertainties.
We have attempted to employ realistic scenarios in
this analysis. However, we do not have access to the war plans of any countries, nor to verifiable data on existing nuclear arsenals, delivery systems, or plans
to develop, build or deploy nuclear weapons. There are obviously many possible pathways for regional conflicts to develop. Opinions concerning the likelihood of a
regional nuclear war range from highly improbable to apocalyptic. Conservatism in such matters requires that a range of plausible scenarios be considered, given
the availability of weapons hardware and the history of regional conflict.
In the present analysis, we adopt two potential scenarios: i) a single small
nuclear device detonated in a city center by terrorists; and ii) a regional nuclear exchange between two newly minted nuclear weapons states involving a total of
most citizens and politicians today are aware of the
potential disaster of an Israeli-Iranian-Syrian nuclear confrontation, or a Indian-Pakistani territorial confrontation. Moreover,
100 low yield (15-kt) detonations. We do not justify these scenarios any further except to note that
as nuclear weapons knowledge and implementation proliferates, the possible number and combinations of flash points multiplies. The fact that nuclear weapons of
the type assumed here have been used in past hostilities substantiates the idea that such scenarios as we propose are executable.
The new Freedom Act won’t solve US image. Protections from the original version do
solve, even without protections for persons outside the US.
Ries ‘14
(Internally quoting Zeke Johnson, director of Amnesty International's Security & Human Rights Program. Also internally quoting
Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before joining Human
Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of their Project on
Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom, with a particular
focus on international free expression and privacy. She also served as co-chair of the Policy & Learning Committee of the Global
Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and human rights in the
technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights Fellow at Human Rights
in China (HRIC). There, she contributed to the organization’s work in the areas of business and human rights and freedom of
expression online. Wong earned her law degree from New York University School of Law. Also internally quoting Center for
Democracy and Technology Senior Counsel Harley Geiger – Brian Ries is Mashable’s Real-Time News Editor. Prior to working at
Mashable, Brian was Social Media Editor at Newsweek & The Daily Beast, responsible for using Twitter, Facebook, and Tumblr
to cover revolutions, disasters, and presidential elections. During his time at The Daily Beast, he contributed to a team that won
two Webby Awards for “Best News Site”. “Critics Slam 'Watered-Down' Surveillance Bill That Congress Just Passed” - Mashable May 22, 2014 – http://mashable.com/2014/05/22/congress-nsa-surveillance-bill/)
As a result, many
of its initial supporters pulled their support. “We supported the original USA Freedom
act, even though it didn’t do much for non-US persons,” Zeke Johnson, director of Amnesty
International's Security & Human Rights Program told Mashable after Thursday's vote. He described the
original version as “a good step to end bulk collection. ” However, in its current version, it's
not even clear that this bill does that at all, Johnson said. He added that Congress left a lot of "wiggle room" in the
bill — something he said is a real problem. "Where there is vagueness in a law, you can count on the
administration to exploit it," Johnson said. However, Laura W. Murphy, director of the ACLU Washington Legislative Office, took a more
positive view of the bill. "While far from perfect, this bill is an unambiguous statement of congressional intent to rein in the out-of-control NSA," she said in a
statement. "While we share the concerns of many — including members of both parties who rightly believe the bill does not go far enough — without it we would
be left with no reform at all, or worse, a House Intelligence Committee bill that would have cemented bulk collection of Americans’ communications into law." The
Electronic Frontier Foundation simply called it "a weak attempt at NSA reform." “ The
ban on bulk collection was deliberately
watered down to be ambiguous and exploitable,” said Center for Democracy and Technology Senior Counsel Harley Geiger. “We
withdrew support for USA FREEDOM when the bill morphed into a codification of large-scale,
untargeted collection of data about Americans with no connection to a crime or terrorism.” And
Cynthia Wong , senior Internet researcher at Human Rights Watch, said, “This so-called reform bill won’t restore
the trust of Internet users in the US and around the world. Until Congress passes real reform, U.S.
credibility and leadership on Internet freedom will continue to fade.”
Unlike the current Act, the original bill does solve US image. This holds even if plan’s
about bulk collection – instead of every surveillance practices.
HRW ‘14
(Internally quoting Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before
joining Human Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of
their Project on Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom,
with a particular focus on international free expression and privacy. She also served as co-chair of the Policy & Learning
Committee of the Global Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and
human rights in the technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights
Fellow at Human Rights in China (HRIC). There, she contributed to the organization’s work in the areas of business and human
rights and freedom of expression online. Wong earned her law degree from New York University School of Law. Human Rights
Watch is an independent, international organization that works as part of a vibrant movement to uphold human dignity and
advance the cause of human rights for all. “US Senate: Salvage Surveillance Reform House Bill Flawed” - Human Rights Watch May 22, 2014 – http://www.hrw.org/news/2014/05/22/us-senate-salvage-surveillance-reform)
It is up to the US Senate to salvage surveillance reform, Human Rights Watch said today. The version of the USA Freedom
Act that the US House of Representatives passed on May 22, 2014, could ultimately fail to end mass data collection. The
version the House passed is a watered-down version of an earlier bill that was designed to end bulk
collection of business records and phone metadata. The practice has been almost universally condemned by all but the US security
establishment. “This so-called reform bill won’t restore the trust of Internet users in the US and around the
world, ” said Cynthia Wong, senior Internet researcher at Human Rights Watch . “Until Congress
passes real reform , US credibility and leadership on Internet freedom will continue to fade .”
The initial version of the bill aimed to prohibit bulk collection by the government of business records, including phone
metadata.
The bill only addressed one component of the surveillance programs revealed by the former National Security Agency
contractor Edward Snowden, that of US record collections.
Human Rights Watch.
However, it had broad support as a first step, including from
On May 7, a diluted version of the bill passed unanimously out of the House Judiciary Committee, followed by Intelligence Committee
the version the House passed could leave the door wide open to
continued indiscriminate data collection practices potentially invading the privacy of millions of people without
approval on May 8. While better than alternative bills offered,
justification, Human Rights Watch said.
India Advantage – 1AC, Cyber-Scenario
India Advantage - Cyber-Scenario
Contention # ____ is India
The US can alter India’s surveillance practices by pressuring global internet companies
to demand privacy. But, this only works when US is less hypocritical.
Wong ‘13
Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before joining Human
Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of their Project on
Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom, with a particular
focus on international free expression and privacy. She also served as co-chair of the Policy & Learning Committee of the Global
Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and human rights in the
technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights Fellow at Human Rights
in China (HRIC). There, she contributed to the organization’s work in the areas of business and human rights and freedom of
expression online. Wong earned her law degree from New York University School of Law – “ Surveillance and the Corrosion of
Internet Freedom” - July 30, 2013 - Published in: The Huffington Post and also available at the HRW website at this address:
http://www.hrw.org/news/2013/07/30/surveillance-and-corrosion-internet-freedom
Defenders of US and UK surveillance programs argue that collecting metadata is not as problematic as “listening to the content
of people’s phone calls” or reading emails. This is misleading. Technologists have long recognized that metadata can reveal incredibly sensitive information, especially if it is
collected at large scale over long periods of time, since digitized data can be easily combined and analyzed. The revelations have also exposed glaring
contradictions about the US Internet freedom agenda. This has emboldened the Chinese state media, for example, to cynically
denounce US hypocrisy, even as the Chinese government continues to censor the Internet, infringe on privacy rights, and curb anonymity online. Though there is hypocrisy on both sides,
the widening rift between US values and actions has real, unintended human rights consequences. For the human
rights movement, the Internet’s impact on rights crystalized in 2005 after we learned that Yahoo! uncritically turned user account
information over to the Chinese government, leading to a 10-year prison sentence for the journalist Shi Tao. The US government
forcefully objected to the Chinese government’s actions and urged the tech industry to act responsibly. In the end, that incident
catalyzed a set of new human rights standards that pushed some companies to improve safeguards for
user privacy in the face of government demands for data. US support was critical back then , but it
is hard to imagine the government having the same influence or credibility now. The mass surveillance scandal has damaged
the US government’s ability to press for better corporate practices as technology companies expand globally. It
will also be more difficult for companies to resist overbroad surveillance mandates if they are seen as
complicit in mass US infringements on privacy. Other governments will feel more entitled to ask for the
same cooperation that the US receives. We can also expect governments around the world to pressure companies to store user data locally or maintain a local
presence so that governments can more easily access it, as Brazil and Russia are now debating. While comparisons to the Chinese government are overstated, there is reason to
worry about the broader precedent the US has set. Just months before the NSA scandal broke, India began rolling out a centralized
system to monitor all phone and Internet communications in the country, without much clarity on
safeguards to protect rights. This development is chilling, considering the government’s problematic use of sedition and Internet laws in recent arrests. Over the last
few weeks, Turkish officials have condemned social media as a key tool for Gezi Park protesters. Twitter has drawn particular ire. Now the
government is preparing new regulations that would make it easier to get data from Internet companies and identify
individual users online. The Obama administration and US companies could have been in a strong position to push back
in India and Turkey. Instead, the US has provided these governments with a roadmap for conducting secret,
mass surveillance and conscripting the help of the private sector.
(Note to students: “conscripting” means compulsory enlistment of companies for state service.)
Independently, US bulk surveillance sets precedent that causes indiscriminate
surveillance in India.
Sinha ‘14
(et al; Authors Include: G. Alex Sinha, Aryeh Neier fellow with the US Program at Human Rights Watch and the Human Rights
Program at the American Civil Liberties Union. Sinha holds a J.D. from New York University’s School of Law. This includes a
specialization as a Scholar from NYU’s Institute for International Law & Justice. The author also holds a Ph.D. in Philosophy
University of Toronto. Additional authors include - Maria McFarland Sanchez-Moreno, US Program deputy director at Human
Rights Watch, who participated in some of the research interviews; and Andrea Prasow, deputy Washington Director at Human
Rights Watch, who also participated in one of the research interviews and provided key contacts. Human Rights Watch is an
independent, international organization that works as part of a vibrant movement to uphold human dignity and advance the
cause of human rights for all. From the Report: WITH LIBERTY TO MONITOR ALL How Large-Scale US Surveillance is Harming
Journalism, Law and American Democracy – This report is based on extensive interviews with some 50 journalists covering
intelligence, national security, and law enforcement for outlets including the New York Times, the Associated Press, ABC, and
NPR. JULY 2014 – available at: http://www.hrw.org/node/127364)
The questions raised
by surveillance are complex. The government has an obligation to protect national security, and in some
cases, it is legitimate for government to restrict certain rights to that end. At the same time, international human rights and
constitutional law
set limits on the state’s authority to engage in activities like surveillance, which have the potential to
large-scale , often indiscriminate US approach to surveillance
carries enormous costs. It erodes global digital privacy and sets a terrible example for other countries
like India , Pakistan, Ethiopia, and others that are in the process of expanding their surveillance capabilities. It
also damages US credibility in advocating internationally for internet freedom, which the US has
undermine so many other rights. The current,
listed as an important foreign policy objective since at least 2010. As this report documents, US surveillance programs
are also doing damage to some of the values the United States claims to hold most dear. These include freedoms of
expression and association, press freedom, and the right to counsel, which are all protected by both international human rights law and the US
Constitution.
India’s surveillance is not narrowly-targeted. This indiscriminate, bulk collection
becomes a “honeypot” for cyber-targeting.
Trivedi ‘13
Anjani Trivedi. The author holds a Master Degree in Journalism from the University of Hong Kong and a Bachelor’s Degree in
Mathematics from MIT. The author has previously held internships at the New York Times and CNN International. This piece
internally quotes Meenakshi Ganguly, The South Asia director for Human Rights Watch; Anja Kovacs of the Internet Democracy
Project; and Sunil Abraham, executive director of India’s Centre for Internet and Society. “In India, Prism-like Surveillance Slips
Under the Radar” – Time Magazine – 6-30-13 - http://world.time.com/2013/06/30/in-india-prism-like-surveillance-slips-underthe-radar/#ixzz2YpWhRsrB
CMS is an ambitious surveillance system that monitors text messages, social-media engagement and phone calls on
landlines and cell phones, among other communications. That means 900 million landline and cell-phone users and 125 million Internet
users. The project, which is being implemented by the government’s Centre for Development of Telematics (C-DOT), is meant to help national law-enforcement
agencies save time and avoid manual intervention, according to the Department of Telecommunications’ annual report. This has been in the works since 2008,
when C-DOT started working on a proof-of-concept, according to an older report. The government set aside approximately $150 million for the system as part of its
12th five-year plan, although the Cabinet ultimately approved a higher amount. Within the internal-security ministry though, the surveillance system remains a
relatively “hush-hush” topic, a project official unauthorized to speak to the press tells TIME. In April 2011, the Police Modernisation Division of the Home Affairs
Ministry put out a 90-page tender to solicit bidders for communication-interception systems in every state and union territory of India. The system requirements
included “live listening, recording, storage, playback, analysis, postprocessing” and voice recognition. Civil-liberties
groups concede that
states often need to undertake targeted- monitoring operations. However, the move toward extensive “surveillance
capabilities enabled by digital communications,” suggests that governments are now “casting the net wide, enabling intrusions into private lives,” according to
Meenakshi Ganguly, South Asia director for Human Rights Watch. This extensive communications surveillance through the likes of Prism and CMS are “out of the
realm of judicial authorization and allow unregulated, secret surveillance, eliminating any transparency or accountability on the part of the state,” a recent U.N.
report stated. India is no stranger to censorship and monitoring — tweets, blogs, books or songs are frequently blocked and banned. India ranked second only to
the U.S. on Google’s list of user-data requests with 4,750 queries, up 52% from two years back, and removal requests from the government increased by 90% over
the previous reporting period. While these were largely made through police or court orders, the new system will not require such a legal process. In recent times,
India’s democratically elected government has barred access to certain websites and Twitter handles, restricted the number of outgoing text messages to five per
person per day and arrested citizens for liking Facebook posts and tweeting. Historically too, censorship has been India’s preferred means of policing social unrest.
“Freedom of expression, while broadly available in theory,” Ganguly tells TIME, “is endangered by abuse of various India laws.” There is a growing discrepancy and
power imbalance between citizens and the state, says Anja Kovacs of the Internet Democracy Project. And, in an environment like India where “no checks and
balances [are] in place,” that is troubling. The potential for misuse and misunderstanding, Kovacs believes, is increasing enormously. Currently, India’s laws relevant
to interception “disempower citizens by relying heavily on the executive to safeguard individuals’ constitutional rights,” a recent editorial noted. The power
imbalance is often noticeable at public protests, as in the case of the New Delhi gang-rape incident in December, when the government shut down public transport
near protest grounds and unlawfully detained demonstrators. With an already sizeable and growing population of Internet users, the government’s worries too are
on the rise. Netizens in India are set to triple to 330 million by 2016, according to a recent report. “As [governments] around the world grapple with the power of
social media that can enable spontaneous street protests, there appears to be increasing surveillance,” Ganguly explains. India’s junior minister for
telecommunications attempted to explain the benefits of this system during a recent Google+ Hangout session. He acknowledged that CMS is something that “most
people may not be aware of” because it’s “slightly technical.” A participant noted that the idea of such an intrusive system was worrying and he did not feel safe.
The minister, though, insisted that it would “safeguard your privacy” and national security. Given the high-tech nature of CMS, he noted that telecom companies
would no longer be part of the government’s surveillance process. India currently does not have formal privacy legislation to prohibit arbitrary monitoring. The
new system comes under the jurisdiction of the Indian Telegraph Act of 1885, which allows for monitoring communication in the “interest of public safety.” The
surveillance system is not only an “abuse of privacy rights and security-agency overreach ,” critics say, but
also counterproductive in terms of security. In the process of collecting data to monitor
criminal activity, the data itself may become a target for terrorists and criminals — a “honeypot,” according
to Sunil Abraham, executive director of India’s Centre for Internet and Society. Additionally, the wideranging tapping undermines financial markets , Abraham says, by compromising confidentiality, trade
secrets and
intellectual property. What’s more, vulnerabilities will have to be built into the existing cyberinfrastructure to make way for such a
system. Whether the nation’s patchy infrastructure will be able to handle a complex web of surveillance and
networks, no one can say. That, Abraham contends,
is what attackers will target.
(Note to students: “CMS” – internally referenced – is India’s new surveillance system. “CMS” stands for
“Central Monitoring System”.)
A hack on the CMS will eventually succeed. That escalates to mass de-stabilization of
India.
Dilipraj ‘13
Mr E. Dilipraj is a Research Associate at Centre for Air Power Studies, New Delhi. He is also pursuing his PhD at the Centre for
Latin American Studies from JNU, New Delhi. This evidence is internally quoting Sunil Abraham, who is the Executive Director of
the Bangalore based research organisation, the Centre for Internet and Society. The Centre for Internet and Society is a nonprofit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with
disabilities, access to knowledge and IPR reform, and openness. Sunil Abraham also founded Mahiti in 1998, a company
committed to creating high impact technology and communications solutions. Sunil was elected an Ashoka fellow in 1999 to
'explore the democratic potential of the Internet' and was also granted a Sarai FLOSS fellowship in 2003. Between June 2004
and June 2007, Sunil also managed the International Open Source Network, a project of United Nations Development
Programme's Asia-Pacific Development Information Programme serving 42 countries in the Asia-Pacific region. Between
September 2007 and June 2008, he managed ENRAP an electronic network of International Fund for Agricultural Development
projects in the Asia-Pacific facilitated and co-funded by International Development Research Centre, Canada. Also internally
quoting Mr. Sachin Pilot, India’s Minister of State for Communications and Information Technology. Modified for potentially
objectionable language. “CYBER WARFARE AND NATIONAL SECURITY” - AIR POWER Journal Vol. 8 No. 3, MONSOON 2013 (JulySeptember) – available at: http://www.academia.edu/7534559/CYBER_WARFARE_AND_NATIONAL_SECURITY__AN_ANALYSIS_OF_INCIDENTS_BETWEEN_INDIA_AND_PAKISTAN
security providers for the cyber space have
always been lacking in vigilance to provide security to their country’s cyber networks and infrastructures. Sunil
Abraham, Executive Director of the Bangalore-based Centre for Internet and Society, said during an interview to ‘Al Jazeera,’ “The Indian
government has a very low level of cyber awareness and cyber security. We don’t take cyber security as
seriously as the rest of the world”. The problem of cyber attacks by the hacking groups would not be a big problem if it
stopped with the hacking and defacing of websites. But, in reality, it moves on to the next stages. The same
people who carry out hacking and website defacing jobs may get involved in cyber espionage and data
mining against their enemies. These people may also volunteer their expert services to the terrorist organisations in return for
While aggression is the only tactic followed by the hacker groups in both countries, on the contrary, the
money and other forms of remuneration.
According to a cyber security professional working with one of India’s
intelligence agencies , We once sat down to check the Delhi [internet] Backbone. We found thousands of systems
compromised. All were government systems, Research and Analysis Wing, Intelligence Bureau, Military Intelligence... we don’t realise how
much damage has already happened. The lack of awareness and the lethargic approach in monitoring and providing security to the cyber networks by India led to thousands of compromised
The infection ranges from small Viruses, Botnets to that of Stuxnet level malwares which can
hamper the total operations of the network connected to the compromised computer. It has been observed that out of
computers across the country.
the 10,000 Stuxnet infected Indian computers, 15 were located at critical infrastructure facilities. These included the Gujarat and Haryana Electricity Boards and an ONGC offshore oil rig.
Though Stuxnet reached the networks of these infrastructures, thankfully, it did not activate itself on
them. In other words, India was only a few flawed lines of code away from having its power and oil
sectors crippled (destroyed). The list of new malwares goes on – Stuxnet, Flame, Duqu, etc – and many more are in the process of coding; their abilities to
operate as cyber weapons are incredible and, at the same time, unbearable, if not protected against properly. Assuming that the hacker
groups get access such malwares, then the situation would become extremely dangerous for the national security as it is equivalent
to terrorists getting access to nuclear weapons. While talking about the same, Mr. Sachin Pilot , Minister
of State for Communications and Information Technology said: The entire economies of some countries
have been (destroyed) paralysed by viruses from across the border. We have to make ourselves more
resilient. Power, telecom, defence, these areas are on top of our agenda. A careful study of the series of hacking on one another’s websites
and networks by the private hacking groups of India and Pakistan would reveal a basic fact that something which started as a
small act of hate has now taken on a much different shape in the form of personal revenge, economic profits, a race to show off
technical supremacy, and anti-national propaganda. This was very much evident from one unwanted event that disturbed the internal security of India in August 2012. The Indian
government was alerted by the exodus after thousands of people from the northeast gathered at railway stations in various cities all over the country after being threatened by the rounds of
SMS and violent morphed pictures that were being circulated on more than 100 websites. The SMS threatened the northeastern people living in various cities in India of a targeted attack on
them, asking them to go back to their homeland, whereas the pictures circulated on the internet were images of some violent bloodshed. Out of the various SMS that were in circulation, one
said: It is a request to everyone to call back their relatives, sons and daughters in Bangalore as soon as possible. Last night, four northeastern guys were killed by Muslims in Bangalore (two
Manipuri, two Nepali). Two Nepali girls were kidnapped from Brigade Road. The reports say that from August 20, marking Ramzan, after 2 pm, they are going to attack every northeastern
person. The riot started because of the situation in Assam.32 Another SMS said: Many northeast students staying in Pune were beaten up by miscreants believed to be Muslims following the
Assam riots. Heard that it is happening in Muslim areas like Mumbai, Andhra Pradesh, Bangalore. At Neelasandra, two boys were killed and one near passport office.33 The Government of
India reacted soon on this matter and a 43-page report was prepared by intelligence agencies along with the National Technical Research Organisation (NTRO) and India Computer Emergency
Response Team (CERT-IN) which traced several doctored images to Pakistan. The origins of these morphed images were later traced back in specific to Lahore, Rawalpindi and other Pakistani
cities by the Indian intelligence agencies. "From all available forensic evidence, we are fairly convinced that all those postings came from Pakistan," said an official of NTRO.
Another
senior official who has been involved in India's Pakistan watch for several years said, It has been happening for several
months now.
This is a low cost, very effective way of destabilising us. They don't need to send terrorists and
explosives to create mayhem. Internet has been a very effective platform for instigating communal
divisions in India. They also have a multiplier effect , first resulting in anger and hatred, then riots and, finally, many taking
to terrorism. This act of unnecessary involvement by Pakistan-based elements is seen as cyber terrorism and cyber psychological warfare against India to cause internal security disturbance
and
eventually to create a huge crisis in the country. This incident which created major turmoil in the internal security of the country is the
biggest example of the adverse effects of wrong use of cyber technology.
(Note to students: “CMS” – internally referenced – is India’s new surveillance system. “CMS” stands for
“Central Monitoring System”.)
Mass instability in India sparks nuclear war with Pakistan – risks of miscalc, accidents,
and unauthorized theft all increase.
Busch ‘4
Please note that an updated edition of this book was re-released in Feb of 2015, but the original date was placed in the citation.
Dr. Nathan Busch, Professor of Government and co-director of the Center for American Studies at Christopher Newport
University. The author holds a Ph.D. in International relations from the University of Toronto and an MA in Political Science
from Michigan State University. The author previously held the position of Research Fellow, Belfer Center for Science and
International Affairs, Kennedy School of Government, Harvard University and also held the position of Visiting Faculty, National
Security Office, Los Alamos National Laboratory. This piece of evidence internally quotes George Perkovich, a South Asia expert
at the Carnegie Endowment for International Peace. It also internally quotes François Heisbourg. He chairs the Geneva Centre
for Security Policy and the London-based International Institute for Strategic Studies. His career has included positions in
government (member of the French mission to the UN, international security adviser to the Minister of Defence), in the defense
industry (vice-president of Thomson-CSF; senior vice president for strategy at Matra Défense Espace) and in academia
(professor of world politics at Sciences-Po Paris, director of the IISS). He is also a member of the International Commission on
nuclear non-proliferation and disarmament, and has sat on a number of national and international blue-ribbon bodies. From
the book: No End in Sight: The Continuing Menace of Nuclear Proliferation - p. 202-209
In addition, because
the Indian military currently has little experience handling nuclear weapons, the risks of
accidental use could be very high during a crisis situation, at least for some time to come. If the order were given to prepare India's
nuclear weapons for possible use, the military (perhaps in conjunction with India's nuclear scientists) would need to assemble the warheads rapidly; mate them to
the deliver)' vehicles (gravity bombs or missiles); and prepare them for use, either by loading them into bombers or by aiming the missiles and preparing them for
launch. All these procedures require training and precision, and, given the early stages of India's new command-and-control arrangements, it is not at all clear that
the Indian military would be able to carry them out safely under extreme time constraints.194 If India decided to develop a rapid-response capability, some of these
dangers would be lessened, but more serious dangers would be introduced. In particular, there would be a significantly increased risk of an accidental launch of
nuclear-armed missiles. India
would need to engage in a great deal of additional research into safety mechanisms
to prevent such an accidental launch, and it is simply not known how much effort India is devoting, or
will devote, to this area.195 Because the Prithvi and the two-stage Agni-I missiles contain a nonstorable liquid fuel, it would be impossible to deploy
the current configuration of either missile to allow for a rapid response. This significantly reduces the likelihood of these missiles being launched accidentally during
normal circumstances, though the
risks of accidental launches would probably increase significantly if they were fueled during a
crisis situation. As noted, however, India has conducted several successful flight tests of the Agni and Agni-II missiles. Because these missiles use a solid fuel, they
could be deployed in a rapid-response state. If India were to choose such a deployment option, the risks of an accidental launch could increase significantly. These
risks would depend on the extent to which India integrates use-control devices into its weapons to prevent accidental launches, but there is little evidence that India
is currently devoting significant efforts to develop such use-control devices.196 Furthermore, even if India intends to develop such use-control devices, if a nuclear
crisis were to arise before India had developed them, it still might be tempted to mate warheads on its missiles. If India does decide to weaponize its arsenal, it still
remains to be seen what type of deployment option it would choose. According to a statement in November 1999 by India's foreign minister, Jaswant Singh, India
would not keep its weapons on a "hair-trigger alert," though he did suggest that these weapons would be dispersed and made mobile to improve their chances of
surviving a first strike.197 If this statement is true, then the risks of accidental launch would be relatively small during normal circumstances.198 But these risks
would increase significantly during crisis situations, when India would presumably mate the warheads to the missiles.199 If the military still has not been given
physical control over the warheads, this would further reduce risks of accidental use during peacetime, though the transfer of nuclear weapons to the military
during a crisis could significantly increase the risks of an accident due to the military's inexperience in handling the nuclear weapons.200 What deployment option
Pakistan might adopt depends in part on India's weapon deployment. It appears that if India were to adopt a rapid-response option, Pakistan would probably adopt
a similar missile deployment, thereby increasing the risks of an accidental launch of its nuclear weapons as well. But even if India were to deploy its weapons (in
field positions) withour the warheads mated, concerns about survivability might nevertheless cause Pakistan to adopt a rapid-response capability. If such an event
were to occur, the risks of Pakistani accidental missile launches could be quite high, especially because it is unlikely that Pakistan currently has the technical capacity
to integrate sophisticated launch controls into its missile designs. Just
as in India, it is also unlikely that Pakistan's nuclear
devices are designed to minimize risks of accidents.201 Because Pakistan's warheads are based on an
early Chinese warhead design, they probably do not contain one-point safety designs, IHE, or fire-resistant
pits. If Pakistan were to assemble its nuclear warheads, there could be an unacceptable risk of an
accidental detonation of its nuclear weapons. Moreover; if Pakistan were to mate nuclear warheads to its missiles, either because it chose
to establish a rapid-response capability or because of an ongoing nuclear crisis, then similar concerns would exist about accidental launches of Pakistani nuclear
risks of unauthorized use of nuclear weapons in India and Pakistan are probably relatively
small because they have a very small number of nuclear weapons and those weapons are tightly controlled by their nuclear establishments. But there are a
number of factors that could increase risks of unauthorized use in the future. Although both India and Pakistan currently
weapons. The current
possess nuclear weapons that could be delivered by aircraft, and are both actively developing nuclear-capable ballistic missiles, none of their weapons appear to
contain sophisticated use-control devices to prevent unauthorized use. Instead, the nuclear
controls in both countries appear to be based on
guards, gates, and guns . As we have seen in the Russian and Chinese cases, while the "3 G's" might be sufficient
during normal circumstances, they are particularly vulnerable during political, economic, and social
upheaval s. The Russian case has demonstrated that severe domestic upheavals can undermine central controls and weaken the
infrastructures that previously maintained the security
for nuclear weapons. In particular, such upheavals can undermine the
loyalty of guards and workers at nuclear facilities, especially if the state collapses economically and can no longer
afford to pay those employees. Neither India nor Pakistan appears to have taken the necessary steps to prevent such weaknesses from arising in
their nuclear controls. Because Indian and Pakistani nuclear controls rely on the "3 G's" while reportedly lacking personnel reliability
there could be a significant risk of thefts of nuclear weapons during severe
upheavals. The Russian analogy is particularly relevant in the Pakistani case. The Pakistani state is far from stable. After the nuclear tests in 1998 and the
programs,
military coup in 1999, the Pakistani economy came close to collapsing and remained quite unstable for the next several years.202 In the aftermath of the September
11, 2001, terrorist attacks, the United States removed economic sanctions and approved nearly $1 billion in international foreign aid to Pakistan. But with a debt
burden of nearly $39 billion, massive economic disparities, and continuing low levels of foreign investment, there still is significant cause for concern about the
prospects for Pakistan's long-term political and economic stability.203 If the Pakistani state were to fail, there could be significant risks of a collapse in its nuclear
controls. Were such an event to occur, there could be an extreme risk of thefts of nuclear weapons or of nuclear weapons falling into the hands of Islamic
militants.204 In the events following the September 11 attacks and President Musharraf's decision to support U.S. military strikes in Afghanistan, there were serious
concerns about a potential collapse of Pakistani nuclear controls. These concerns were spurred by reports of public riots, a close affiliation among some elements of
the Pakistani military and intelligence community with the Taliban regime and al Qaeda, and the tenuous hold that Pakistani president Musharraf appears to have in
Pakistan.205 In October 2001, President Musharraf took significant steps to centralize his control by removing high-level military and intelligence officers with ties
to the Taliban, but analysts have nevertheless continued to raise concerns about Musharraf's ability to maintain control.206 Due to the seriousness of these risks,
President Musharraf ordered an emergency redeployment of Pakistan's nuclear arsenal, and the United States has offered to advise Pakistan on methods for
securing its nuclear stockpile. ' If the U.S. military strikes in Afghanistan had extended for a longer period, Musharraf might have found it increasingly difficult to
remain in power and reign in the more extreme elements in his country. One also cannot
rule out the possibility that terrorists might
choose to target nuclear facilities in India and Pakistan, especially if domestic instability were to
increase.
Both India and Pakistan have serious problems with domestic terrorism.208 These terrorists are increasingly well-armed and have targeted
critical infrastructures and military bases in the past.209 Although current defenses at both Indian and Pakistani nuclear weapons storage facilities are probably
sufficient to defend against most terrorist attacks,210 the physical protection systems at other nuclear facilities might be less effective.211 Moreover, if the
defenses at the most sensitive facilities were weakened by domestic upheavals, then the risks of successful
terrorist attacks—either for purposes of theft or sabotage—could increase significantly. But even if such extreme events did not
occur, the tightly controlled decision-making and underdeveloped command-and-control structures in both India and Pakistan could potentially allow unauthorized
use, particularly during crises. In India, some of these risks have been minimized by the formalization of its command structure, though the military units are still
fairly inexperienced with handling these weapons.212 Moreover, because
established, resilient
India probably still lacks clearly defined, detailed operational procedures and
communication channels, there would still be a fairly high risk of unauthorized use
arising from confusion or miscommunication during a crisis. These concerns will probably remain for some time to
come, though the specific risks could eventually be improved, depending on the training the military receives and the degree of professionalism among the troops.
Because Pakistan is currently under military rule, and its nuclear weapons are controlled by the military, one would expect a better coordination of nuclear decisionmaking and command-and-control systems. Nevertheless, there are potential problems with Pakistani command and control as well. The lack of a clear operational
use doctrine, combined with inadequate C3I could increase the risks of unauthorized use during crises: "there is no enunciated nuclear doctrine, nor are there
decision-making and communications systems adequate for either strategic or tactical command and control in the nuclear environment. Nuclear targeting
information could not be passed in time to be of use in a rapidly changing situation, which would increase the probability of own-troop strikes by tactical [nuclear]
missiles."213 The risks or unauthorized use would increase if India and Pakistan were to deploy their weapons on ballistic missiles. Risks of decapitation and
questions about the survivability of the nuclear forces would probably cause both India and Pakistan to deploy mobile systems if they were to operationalize their
nuclear forces. These systems would significantly increase difficulties in command and control, especially because their weapons lack use-control devices.214 In
addition, because of the risks of decapitation, Pakistan is likely to adopt a "delegative" system, where the authority to launch nuclear weapons is given to a number
of military officials.215 As the number of people authorized to launch nuclear weapons increases, so does the risk of a use of nuclear weapons that has not been
commanded by the central authorities.216 The
greatest concerns have been raised about a possible inadvertent use of
nuclear weapons in South Asia. The combined effects of mutual mistrust, very short flight times for missiles, continual armed conflicts along their
borders, and few reliable CBMs make the risks of inadvertent use quite severe, especially during crisis situations. According to George Perkovich,
a South Asia expert at the Carnegie Endowment for International Peace, "Kargil proved that having
nuclear weapons would not deter new conflicts. It also showed that unless such conflicts themselves were prevented, the
possibility of an accidental or deliberate nuclear exchange would also increase given both states' relatively poor systems of intelligence surveillance and nuclear
command and control."217 Due
to continual mistrust between the two countries, each would be likely to
misinterpret military movements, missile tests, or accidental detonations as an impending attack by the other side. The
risks of misinterpreting each other's motives are compounded by the vulnerability of their nuclear forces and the short flight times of the forces to key targets. For
example, because the runways at Pakistani Air Force bases could be destroyed by a conventional air strike or nuclear attack,218 India could effectively eliminate
Pakistan's nuclear bomber capability. During
an acute crisis, Pakistan might be faced with a "use them or lose them"
dilemma, in that it would need to attack rapidly or lose its ability to retaliate altogether. For this reason,
Pakistani officials would be extremely suspicious of any Indian actions that could be
interpreted as preparations for an attack. Because the flight time of Indian bombers is approximately ten minutes, Pakistani
leaders would have a very limited amount of time to decide whether to launch their own attack.219 These conditions thus create an ongoing environment in which
inadvertent use is quite possible. In addition, both countries have unreliable intelligence systems, which have repeatedly misinterpreted the other's intentions. For
example, during the Brasstacks incident, Pakistani intelligence reported that India's exercise was merely a cover for an attack. Meanwhile, Indian intelligence
overlooked the defensive nature of the Pakistani troops' position. These intelligence failures caused each side to escalate the tensions unnecessarily. In addition,
their intelligence systems have sometimes failed to detect major troop movements altogether. As we have seen, during the Brasstacks crisis, Indian surveillance
planes did not detect Pakistani troops positioned at their border for two weeks. And in the 1999 Kargil war, Indian intelligence failed to detect the Pakistani invasion
until several months after they had positioned themselves at strategic locations in the Kargil heights. These intelligence failures could have two consequences. First,
if either side were surprised by comparatively benign actions (such as Pakistan's defensive positioning during the Brasstacks crisis), it would be more likely to
overreact and mistakenly conclude that an attack is imminent. And second, if one side (especially Pakistan) is confident that an invasion would not be detected at
first, it might be more likely to launch attacks across the border: Each of these scenarios would greatly increase the risks of nuclear escalation.220 Presumably owing
to the massive intelligence failure prior to the 1999 Kargil war, however, India has recently made significant investments in its intelligence-gathering capabilities,
which could reduce risks of such failures by India in the future.221 The
dangers of miscalculations and intelligence failures are
increased by the crude early-warning systems employed by both countries, particularly Pakistan. Several
incidents serve to illustrate this point. First, prior to Pakistan's nuclear tests in 1998, Pakistan reported that it had detected an air force attack on its radars and
warned that it had mated a number of warheads to its Ghauri missiles.222 While this report might have been circulated in order to justify their nuclear tests,
circulating such a report could have caused India to mate weapons to its missiles, greatly increasing the risks of inadvertent use (as well as accidental and
unauthorized use). Another, perhaps more troubling, incident occurred prior to the U.S. missile strike on Afghanistan in August 1998. The United States sent a highlevel U.S. official to Pakistan because it feared Pakistan would detect the missile and interpret it as an Indian strike. Pakistan never even detected the missile,
however. Scholars have pointed out that this incident emphasizes not only the U.S. concern about inadvertent nuclear war between India and Pakistan, but also
that Pakistan's early-warning system "has serious flaws, and such shortcomings are more likely to foster nervousness than calm. To the extent that they lack reliable
early-warning systems, India or Pakistan could base launch decisions on unreliable sources, increasing the chance of mistakes."223 But even if India and Pakistan
had reliable early-warning systems, the risks of inadvertent war would still be extremely high. If Indian or Pakistani radars detected aircraft headed toward them,
they would have very little time to decide what to do before the aircraft reached their targets. In addition, because there would be a great deal of uncertainty about
whether attacking bombers carried conventional or nuclear weapons, the attacked side (especially Pakistan) could
face a "use them or lose
them" scenario and be tempted to launch a nuclear attack to ensure that its nuclear capability was not
destroyed.224 Thus, even if India and Pakistan do not deploy nuclear weapons on missiles, the risks of an inadvertent use in these circumstances could be
extremely high. If India and Pakistan were to deploy their nuclear weapons on missiles (a scenario that is quite likely, given the vulnerability of Pakistani airfields and
India's stated need for deterrence against the People's Republic of China), the risks of inadvertent use would become even worse. Because the flight time for
ballistic missiles between the two countries is less than five minutes,225 Indian and Pakistani leaders would have virtually no time to decide what action to take (or
perhaps even to launch a retaliatory strike) before the missiles hit their targets.226 The psychological effect on the two countries would be tremendous.
According to Francois Heisbourg, once theater missiles are deployed in South Asia, the strategic situation will resemble the
Cuban missile crisis, except that it "would be permanent rather than tempo-rary, would occur without adequate C3I in place, and
with political leadership located less than five minutes from mutual Armageddon." 227
(Note to students: “3 G’s” – internally referenced – stands for “guards, gates, and guns” as a security
measure to protect an installation. “C3I” – also internally referenced – stands for “Command, Control,
Communications and Intelligence”).
Even a limited nuclear war between India & Pakistan causes extinction – smoke and
yields prove
Toon ’07
(et al, O. B. Toon -- Department of Atmospheric and Oceanic Sciences, Laboratory for Atmospheric and Space Physics, University
of Colorado, Boulder, CO, -- “Atmospheric effects and societal consequences of regional scale nuclear conflicts and acts of
individual nuclear terrorism” – Atmospheric Chemistry & Physics – April 19th -- http://www.atmos-chemphys.net/7/1973/2007/acp-7-1973-2007.pdf)
We assess the potential damage and smoke production associated with the detonation of small nuclear
weapons in modern megacities. While the number of nuclear warheads in the world has fallen by about a factor of three since its peak in 1986, the number of
nuclear weapons states is increasing and the potential exists for numerous regional nuclear arms races. Eight countries are known to have nuclear weapons, 2 are
constructing them, and an additional 32 nations already have the fissile material needed to build substantial arsenals of low-yield (Hiroshima-sized) explosives.
Population and economic activity worldwide are congregated to an increasing extent in megacities, which might be targeted in a nuclear conflict. We
find
that low yield weapons, which new nuclear powers are likely to construct, can produce 100 times as
many fatalities and 100 times as much smoke from fires per kt yield as previously estimated in analyses
for full scale nuclear wars using high-yield weapons , if the small weapons are targeted at city centers. A single
“small” nuclear detonation in an urban center could lead to more fatalities, in some cases by orders of magnitude, than have occurred in the major historical
a regional nuclear exchange involving 100 15-kt explosions (less than 0.1% of the
could produce direct fatalities comparable to all of
those worldwide in World War II, or to those once estimated for a “counterforce” nuclear war between the
superpowers. Megacities exposed to atmospheric fallout of long-lived radionuclides would likely be abandoned indefinitely, with severe national and
international implications. Our analysis shows that smoke from urban firestorms in a regional war would rise into the
upper troposphere due to pyro-convection. Robock et al. (2007) show that the smoke would subsequently rise deep into the stratosphere due to
atmospheric heating, and then might induce significant climatic anomalies on global scales. We also anticipate
substantial perturbations of global ozone. While there are many uncertainties in the predictions we make here, the principal unknowns are
conflicts of many countries. We analyze the likely outcome of
explosive yield of the current global nuclear arsenal). We find that such an exchange
the type and scale of conflict that might occur. The
scope and severity of the hazards identified pose a significant
threat to the global community. They deserve careful analysis by governments worldwide advised by a broad section of the world scientific community,
as well as widespread public debate. In the 1980s, quantitative studies of the consequences of a nuclear conflict between the superpowers provoked international scientific and political
debate, and deep public concern (Crutzen and Birks, 1982; Turco et al., 1983; Pittock et al., 1985). The resulting recognition that such conflicts could produce global scale damage at
unacceptable levels contributed to an ongoing reduction of nuclear arsenals and improvements in relationships between the major nuclear powers. Here we discuss the effects of the use of a
single nuclear weapon by a state or terrorist. We then provide the first comprehensive quantitative study of the consequences of a nuclear conflict involving multiple weapons between the
emerging smaller nuclear states. Robock et al. (2007) explore the climate changes that might occur due to the smoke emissions from such a conflict. The results of this study show that the
potential effects of nuclear explosions having yields similar to those of the weapons used over Japan during the Second World War (WW-II) are, in relation to yield, unexpectedly large. At least
eight countries are capable of transport and detonation of such nuclear devices. Moreover, North Korea appears to have a growing stockpile of warheads, and Iran is suspiciously pursuing
uranium enrichment – a necessary precursor to weapons construction. Thirty-two other countries that do not now have nuclear weapons possess sufficient fissionable nuclear materials to
construct weapons, some in a relatively short period of time. For these nations, a regional conflict involving modest numbers of 15-kiloton (kt, the TNT explosive yield equivalent) weapons to
attack cities could cause casualties that exceed, in some cases by orders of magnitude, their losses in previous conflicts. Indeed, in some case, the casualties can rival previous estimates for a
limited strategic war between the superpowers involving thousands of weapons carrying several thousand megatons (Mt) of yield. Early radioactive fallout from small nuclear ground bursts
would leave large sections of target areas contaminated and effectively uninhabitable. (Hiroshima and Nagasaki were attacked by airbursts, which will not deposit large amounts of local
radiation unless it is raining. They were continuously inhabited.) Because of the smoke released in fires ignited by detonations, there is a possibility that 100 15-kt weapons used against city
centers would produce global climate disturbances unprecedented in recorded human history (Robock et al., 2007). An individual in possession of one of the thousands of existing lightweight
nuclear weapons could kill or injure a million people in a terrorist attack. Below we first discuss the arsenals of the existing, and potential, nuclear powers. We then describe the casualties due
to blast and to fires set by thermal radiation from an attack on a single megacity with one low yield nuclear weapon. Next we discuss the casualties if current and projected arsenals of such
weapons were ever used in a regional conflict. We then discuss the impact of radioactive contamination. Finally, we describe the amounts of smoke that may be generated in a regional scale
conflict. At the end of each of these sections we outline the associated uncertainties.
We have attempted to employ realistic scenarios in
this analysis. However, we do not have access to the war plans of any countries, nor to verifiable data on existing nuclear arsenals, delivery systems, or plans
to develop, build or deploy nuclear weapons. There are obviously many possible pathways for regional conflicts to develop. Opinions concerning the likelihood of a
regional nuclear war range from highly improbable to apocalyptic. Conservatism in such matters requires that a range of plausible scenarios be considered, given
the availability of weapons hardware and the history of regional conflict.
In the present analysis, we adopt two potential scenarios: i) a single small
nuclear device detonated in a city center by terrorists; and ii) a regional nuclear exchange between two newly minted nuclear weapons states involving a total of
most citizens and politicians today are aware of the
potential disaster of an Israeli-Iranian-Syrian nuclear confrontation, or a Indian-Pakistani territorial confrontation. Moreover,
100 low yield (15-kt) detonations. We do not justify these scenarios any further except to note that
as nuclear weapons knowledge and implementation proliferates, the possible number and combinations of flash points multiplies. The fact that nuclear weapons of
the type assumed here have been used in past hostilities substantiates the idea that such scenarios as we propose are executable.
The new Freedom Act won’t solve US image. Protections from the original version do
solve, even without protections for persons outside the US.
Ries ‘14
(Internally quoting Zeke Johnson, director of Amnesty International's Security & Human Rights Program. Also internally quoting
Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before joining Human
Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of their Project on
Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom, with a particular
focus on international free expression and privacy. She also served as co-chair of the Policy & Learning Committee of the Global
Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and human rights in the
technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights Fellow at Human Rights
in China (HRIC). There, she contributed to the organization’s work in the areas of business and human rights and freedom of
expression online. Wong earned her law degree from New York University School of Law. Also internally quoting Center for
Democracy and Technology Senior Counsel Harley Geiger – Brian Ries is Mashable’s Real-Time News Editor. Prior to working at
Mashable, Brian was Social Media Editor at Newsweek & The Daily Beast, responsible for using Twitter, Facebook, and Tumblr
to cover revolutions, disasters, and presidential elections. During his time at The Daily Beast, he contributed to a team that won
two Webby Awards for “Best News Site”. “Critics Slam 'Watered-Down' Surveillance Bill That Congress Just Passed” - Mashable May 22, 2014 – http://mashable.com/2014/05/22/congress-nsa-surveillance-bill/)
As a result, many
of its initial supporters pulled their support. “We supported the original USA Freedom
act, even though it didn’t do much for non-US persons,” Zeke Johnson, director of Amnesty
International's Security & Human Rights Program told Mashable after Thursday's vote. He described the
original version as “a good step to end bulk collection. ” However, in its current version, it's
not even clear that this bill does that at all, Johnson said. He added that Congress left a lot of "wiggle room" in the
bill — something he said is a real problem. "Where there is vagueness in a law, you can count on the
administration to exploit it," Johnson said. However, Laura W. Murphy, director of the ACLU Washington Legislative Office, took a more
positive view of the bill. "While far from perfect, this bill is an unambiguous statement of congressional intent to rein in the out-of-control NSA," she said in a
statement. "While we share the concerns of many — including members of both parties who rightly believe the bill does not go far enough — without it we would
be left with no reform at all, or worse, a House Intelligence Committee bill that would have cemented bulk collection of Americans’ communications into law." The
Electronic Frontier Foundation simply called it "a weak attempt at NSA reform." “ The
ban on bulk collection was deliberately
watered down to be ambiguous and exploitable,” said Center for Democracy and Technology Senior Counsel Harley Geiger. “We
withdrew support for USA FREEDOM when the bill morphed into a codification of large-scale,
untargeted collection of data about Americans with no connection to a crime or terrorism.” And
Cynthia Wong , senior Internet researcher at Human Rights Watch, said, “This so-called reform bill won’t restore
the trust of Internet users in the US and around the world. Until Congress passes real reform, U.S.
credibility and leadership on Internet freedom will continue to fade.”
Unlike the current Act, the original bill does solve US image. This holds even if plan’s
about bulk collection – instead of every surveillance practices.
HRW ‘14
(Internally quoting Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before
joining Human Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of
their Project on Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom,
with a particular focus on international free expression and privacy. She also served as co-chair of the Policy & Learning
Committee of the Global Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and
human rights in the technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights
Fellow at Human Rights in China (HRIC). There, she contributed to the organization’s work in the areas of business and human
rights and freedom of expression online. Wong earned her law degree from New York University School of Law. Human Rights
Watch is an independent, international organization that works as part of a vibrant movement to uphold human dignity and
advance the cause of human rights for all. “US Senate: Salvage Surveillance Reform House Bill Flawed” - Human Rights Watch May 22, 2014 – http://www.hrw.org/news/2014/05/22/us-senate-salvage-surveillance-reform)
It is up to the US Senate to salvage surveillance reform, Human Rights Watch said today. The version of the USA Freedom
Act that the US House of Representatives passed on May 22, 2014, could ultimately fail to end mass data collection. The
version the House passed is a watered-down version of an earlier bill that was designed to end bulk
collection of business records and phone metadata. The practice has been almost universally condemned by all but the US security
establishment. “This so-called reform bill won’t restore the trust of Internet users in the US and around the
world, ” said Cynthia Wong, senior Internet researcher at Human Rights Watch . “Until Congress
passes real reform , US credibility and leadership on Internet freedom will continue to fade .”
The initial version of the bill aimed to prohibit bulk collection by the government of business records, including phone
metadata.
The bill only addressed one component of the surveillance programs revealed by the former National Security Agency
contractor Edward Snowden, that of US record collections.
Human Rights Watch.
However, it had broad support as a first step, including from
On May 7, a diluted version of the bill passed unanimously out of the House Judiciary Committee, followed by Intelligence Committee
the version the House passed could leave the door wide open to
continued indiscriminate data collection practices potentially invading the privacy of millions of people without
approval on May 8. While better than alternative bills offered,
justification, Human Rights Watch said.
India Advantage – 1AC, Democracy Scenario
India Advantage - Democracy Scenario
Contention # ____ is India
The US can alter India’s surveillance practices by pressuring global internet companies
to demand privacy. But, this only works when US is less hypocritical.
Wong ‘13
Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before joining Human
Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of their Project on
Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom, with a particular
focus on international free expression and privacy. She also served as co-chair of the Policy & Learning Committee of the Global
Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and human rights in the
technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights Fellow at Human Rights
in China (HRIC). There, she contributed to the organization’s work in the areas of business and human rights and freedom of
expression online. Wong earned her law degree from New York University School of Law – “ Surveillance and the Corrosion of
Internet Freedom” - July 30, 2013 - Published in: The Huffington Post and also available at the HRW website at this address:
http://www.hrw.org/news/2013/07/30/surveillance-and-corrosion-internet-freedom
Defenders of US and UK surveillance programs argue that collecting metadata is not as problematic as “listening to the content
of people’s phone calls” or reading emails. This is misleading. Technologists have long recognized that metadata can reveal incredibly sensitive information, especially if it is
collected at large scale over long periods of time, since digitized data can be easily combined and analyzed. The revelations have also exposed glaring
contradictions about the US Internet freedom agenda. This has emboldened the Chinese state media, for example, to cynically
denounce US hypocrisy, even as the Chinese government continues to censor the Internet, infringe on privacy rights, and curb anonymity online. Though there is hypocrisy on both sides,
the widening rift between US values and actions has real, unintended human rights consequences. For the human
rights movement, the Internet’s impact on rights crystalized in 2005 after we learned that Yahoo! uncritically turned user account
information over to the Chinese government, leading to a 10-year prison sentence for the journalist Shi Tao. The US government
forcefully objected to the Chinese government’s actions and urged the tech industry to act responsibly. In the end, that incident
catalyzed a set of new human rights standards that pushed some companies to improve safeguards for
user privacy in the face of government demands for data. US support was critical back then , but it
is hard to imagine the government having the same influence or credibility now. The mass surveillance scandal has damaged
the US government’s ability to press for better corporate practices as technology companies expand globally. It
will also be more difficult for companies to resist overbroad surveillance mandates if they are seen as
complicit in mass US infringements on privacy. Other governments will feel more entitled to ask for the
same cooperation that the US receives. We can also expect governments around the world to pressure companies to store user data locally or maintain a local
presence so that governments can more easily access it, as Brazil and Russia are now debating. While comparisons to the Chinese government are overstated, there is reason to
worry about the broader precedent the US has set. Just months before the NSA scandal broke, India began rolling out a centralized
system to monitor all phone and Internet communications in the country, without much clarity on
safeguards to protect rights. This development is chilling, considering the government’s problematic use of sedition and Internet laws in recent arrests. Over the last
few weeks, Turkish officials have condemned social media as a key tool for Gezi Park protesters. Twitter has drawn particular ire. Now the
government is preparing new regulations that would make it easier to get data from Internet companies and identify
individual users online. The Obama administration and US companies could have been in a strong position to push back
in India and Turkey. Instead, the US has provided these governments with a roadmap for conducting secret,
mass surveillance and conscripting the help of the private sector.
(Note to students: “conscripting” means compulsory enlistment of companies for state service.)
Independently, US bulk surveillance sets precedent that causes indiscriminate
surveillance in India.
Sinha ‘14
(et al; Authors Include: G. Alex Sinha, Aryeh Neier fellow with the US Program at Human Rights Watch and the Human Rights
Program at the American Civil Liberties Union. Sinha holds a J.D. from New York University’s School of Law. This includes a
specialization as a Scholar from NYU’s Institute for International Law & Justice. The author also holds a Ph.D. in Philosophy
University of Toronto. Additional authors include - Maria McFarland Sanchez-Moreno, US Program deputy director at Human
Rights Watch, who participated in some of the research interviews; and Andrea Prasow, deputy Washington Director at Human
Rights Watch, who also participated in one of the research interviews and provided key contacts. Human Rights Watch is an
independent, international organization that works as part of a vibrant movement to uphold human dignity and advance the
cause of human rights for all. From the Report: WITH LIBERTY TO MONITOR ALL How Large-Scale US Surveillance is Harming
Journalism, Law and American Democracy – This report is based on extensive interviews with some 50 journalists covering
intelligence, national security, and law enforcement for outlets including the New York Times, the Associated Press, ABC, and
NPR. JULY 2014 – available at: http://www.hrw.org/node/127364)
The questions raised
by surveillance are complex. The government has an obligation to protect national security, and in some
cases, it is legitimate for government to restrict certain rights to that end. At the same time, international human rights and
constitutional law
set limits on the state’s authority to engage in activities like surveillance, which have the potential to
large-scale , often indiscriminate US approach to surveillance
carries enormous costs. It erodes global digital privacy and sets a terrible example for other countries
like India , Pakistan, Ethiopia, and others that are in the process of expanding their surveillance capabilities. It
also damages US credibility in advocating internationally for internet freedom, which the US has
undermine so many other rights. The current,
listed as an important foreign policy objective since at least 2010. As this report documents, US surveillance programs
are also doing damage to some of the values the United States claims to hold most dear. These include freedoms of
expression and association, press freedom, and the right to counsel, which are all protected by both international human rights law and the US
Constitution.
Absent surveillance reform that boosts privacy, India’s standing as a leader in
democracy will fall
Kaul ‘14
Mahima Kaul, heads the Cyber and Media Initiative at the Observer Research Foundation, New Delhi and is also the editor of its
monthly Cyber Monitor. The Initiative provides a vibrant platform for all stakeholders to discuss internet-related issues in India.
It also runs India's biggest internet policy platform: Cyfy: The India Conference on Cyber Security and Cyber Governance, which
brings governments, business, academia and civil society participation from over 12 countries to New Delhi, every October. She
is Member, India Project Advisory Committee Member for Association for Progressive Communications (APC) and the European
Union's project "Advancing Internet Freedoms" which looks at internet freedom in India, Pakistan and Malaysia. The author
holds an M.A. Communication Policy, University of Westminster, and a B. A. Political Science & History, McGill University.
“Ensuring Privacy in a Regime of Surveillance” - From the publication: Cyfy - March 30, 2014 http://cyfy.org/ensuring-privacy-ina-regime-of-surveillance/
This paper examines the legality of surveillance structures in India today (including mass surveillance
programmes), and an expanding e-government project, and juxtaposes them against the missing privacy legal framework
that is needed in a liberal democracy such as India. It concludes that accountability mechanisms and laws
are needed to safeguard a society that is increasingly adapting to mass surveillance and the lack of privacy. In India, as is the case globally, there is
no doubt that a necessary argument must and will be made for being able to use the same technologies for policing and security as are used to perpetrate crimes
and acts of terror. With increasing Internet penetration in the country, India released its first Cyber Security Policy in 2013, flagging the biggest areas of concerns for
the country, including protecting critical information infrastructure and training more cyber security personnel. There is also growing concern in the country about
the security of mobile networks given the increasing number of cheap and unverified products entering the market. With the increasing frequency of terror attacks
on Indian soil there is a necessity for law enforcement officials to be able to investigate suspects with speed. At the same time, there is also a need and desire to use
digital technologies to make governance more effective and efficient for the citizenry. Therefore, there are two broad aspects that need to be examined. The first
relates to the surveillance mechanisms that exist via previous legislation, and new mass surveillance schemes that are being built by leveraging current technology.
The second concerns the mass (and secure) collection of citizen data to build governance tools for smoother delivery of public services. A recent NATO publication
flagged the problems with the first issue well: ‘State-sponsored
surveillance tends to be discounted as a “passive” or invisible
intrusion, but when conducted on a pervasive scale, it is an activity that can severely harm rights in several dimensions. First, the invasion
of privacy occurs at the point of intrusion and capture of material, not only at the point of access or use of information. The inability to direct one’s communications
to only those who are intended recipients is a serious loss of control over one’s identity and autonomy; everyone has experienced the sensation of literally “being a
different person” when in public, as opposed to among intimates. The uncertainty over which communications will be accessed when, and by whom, can also chill
the exercise of many rights: freedom of expression, access to information, association with others, religious belief and practice, and assembly, for example.’1 India
has a number of laws that offer a basis for the kinds of surveillance that exists in the country. Some of these are listed below: The Indian Telegraph Act of 1885 was
drafted to cover the use of telegraphy, phones, communication, radio, telex and fax in India. Section 5 of the act allows for legal wiretapping, and the guidelines
state that only the home secretary, either of the Government of India or of a state government, can give an order for lawful interception. The order for the
wiretapping is valid for a period of two months and should not exceed six. The Indian Wireless Telegraphy Act of 1993 does not permit anyone to own wireless
transmission apparatus without a license, and in Section 7 gives power to any officer specially empowered by the central government to search any building, vessel
or place if there is reason to believe that there is any wireless telegraphy apparatus which has been used to commit an offence. The Indian Post Office Act of 1898,
Section 26, confers powers of interception of postal articles for the ‘public good’. Section 91 of the Code of Criminal Procedure, 1973, grants other powers to the
police; it states that: ‘Whenever any court or any officer in charge of a police station considers that the production of any document or other thing is necessary or
desirable for the purposes of any investigation, inquiry, trial or other proceeding under this code by or before such court or officer, such court may issue a
summons, or such officer a written order, to the person in whose possession or power such document or thing is believed to be, requiring him to attend and
produce it, or to produce it, at the time and place stated in the summons or order.’ The most recent and currently controversial legislation is the Information
Technology Act of 2000, amended in 2008 after the horrific Mumbai terror attack. Currently, the act contains some sections that require persons to reveal personal
information without much room for recourse. Section 44 lays out punishment and fines in case of failure to furnish any document, return or report to the controller
or the certifying authority. Section 66a lists out punishment upto three years with a fine for sending any communication through electronic means which could be
considered grossly offensive, menacing, false information for annoyance, inconvenience, hatred, ill-will and so on. Section 80 gives police and senior government
officials the power to enter any public place and search and arrest without warrant any person found therein who is reasonably suspected or having committed or
of committing or about to commit an offence under this act. However, in
2013, information about a mass surveillance scheme
being rolled out by the Government of India came to light. The Central Monitoring System ( CMS ) was launched in 2009, but
became public knowledge four years later. According to reports and interviews, the CMS will automate already existing data from other
interception and monitoring programmes, and will have a non-erasable command log of all provisioning activities. Simply put, ‘CMS
targets private information of individuals since it will enable real-time tracking of online activities, phone
calls, text messages and even social media conversations.’2 Further, CMS will not need permission from nodal officers of the Telecommunication
Service Providers (TSPs), and will provision requests from all law and enforcement agencies. It isn’t quite clear what the legal basis of CMS is, but it has been
suggested that it will operate under Section 52 (2) of the Indian Telegraph Act, which as we know allows for interception of (telegraphic) messages for various
reasons including ‘public emergency’ and ‘public safety’. It has not been created by, or answers to, Parliament. According to available information, the CMS can tap
information from various other monitoring and interception schemes across India. These include the Crime and Criminal Tracking Networks and Systems (CCTNS),
Lawful Intercept and Monitoring Program (LIM), Telephone Call Interception System (TCIS) and the Internet Monitoring System (IMS). The various
department/agencies that will have access to all this gathered data, through CMS, include the Central Bureau of Investigation (CBI), Defence Intelligence Agency
(DIA), Department of Revenue Intelligence (DRI), Enforcement Directorate, Intelligence Bureau, Narcotics Control Bureau, National Intelligence Agency, Central
Board of Direct Taxes, Ministry of Home Affairs, the Military Agencies of Assam and Jammu & Kashmir, and the Research and Analysis Wing (RAW). As reported in
The Hindu, ‘The CMS will have unfettered access to the existing Lawful Interception Systems (LIS) currently installed in the network of every fixed and mobile
operator, ISP, and International Long Distance service provider. Mobile and long distance operators, who were required to ensure interception only after they were
in receipt of the “authorization”, will no longer be in the picture. With CMS, all authorizations remain secret within government departments. This means that
government agencies can access in real time any mobile and fixed line phone conversation, SMS, fax, website visit, social media usage, Internet search and email,
including partially written emails in draft folders, of “targeted numbers”. This is because, contrary to the impression that the CMS was replacing the existing
surveillance equipment deployed by mobile operators and ISPs, it would actually combine the strength of two, expanding the CMS’s forensic capabilities multiple
times.’3 At the same time, limited resources to store citizen data are becoming a thing of the past. New technologies like cloud computing have allowed space for
storage to increase exponentially. Therefore, as the capacity of the state to accumulate data increases, for example with MeghRaj, a National Cloud launched by the
Government of India in February 2014, it will be able to expand its e-government services. Therefore, the common refrain among privacy experts and other
stakeholders is that the crux of the matter lies in India passing an all-inclusive privacy law. This, they believe, would take into account not just protection for the
individual viz-a-viz civil and criminal laws in India, but ensure there are privacy safeguards in the ambitious projects that the government of India is undertaking with
regards to citizens private data. These would include the massive rollout of e-governance projects under the National e-Government Programme, which includes 31
mission mode projects that seek to, in the first phase, digitize all available citizen data (such as land records and health records) for respective ministries, and then,
in the second phase, build responsive and efficient government service delivery platforms. In some states this means accessing healthcare through smartcards,
while in others citizens can access and pay their electricity bills online. For example, Bhoomi, an e-government project in Karnataka under the revenue department
has already computerized over 20 million land records of over 6.7 million farmers. These digitized ministries will soon not function as islands. The NATGRID – the
National Intelligence Grid – is a system that will connect several government departments and data-bases to collect ‘comprehensive patterns of intelligence that can
be readily accessed by intelligence agencies.’ While this means a single point to access citizen data from a variety of sources, it also allows a single window to steal
this personal information. Then there is the controversial UID – Universal ID card – that the Government of India plans on issuing to every resident of India, after
collecting his or her biometric data. Simply put, the UID will become a citizen identifier. This means that the government will now be able to confirm that it is indeed
citizen ‘x’ who is making phone calls or sending emails of some interest to the authorities, by immediately identifying the person through biometric data available
with the state. Conversely, this also means that the state now has not just biometric data on its people, but it will be linked to all their communication data in an
easy-to-find manner. All this is happening without a comprehensive privacy law passed by the Indian Parliament. Article 21 of the Indian Constitution declares that
no citizen can be denied his life and liberty except by law, and the right to privacy has been interpreted to be part of that. Further, Article 43A of the IT Act directs
corporate bodies who ‘possess, deal or handle’ any ‘sensitive personal data’ to implement and maintain ‘reasonable’ security practices, failing which they would be
liable to compensate those affected by any negligence attributable to this failure. This must necessarily extend to the government as well. It is instructive to refer to
the Report of the Group of Experts on Privacy, chaired by Justice A.P. Shah, former Chief Justice of the Delhi High Court.4 The report suggested a conceptual
framework for privacy regulation in India, touching upon five salient points. Technological neutrality and interoperability with international standards: the privacy
act should not refer to any specific technologies and should be generic enough to adapt to changes in society, helping build trust of global clients and users. Multidimensional privacy: the privacy act must include concerns related to a number of platforms including audio, video, personal identifiers, DNA, physical privacy and
so on. Horizontal applicability: any legislation must extend to the government and private sector. Conformity with privacy principles: this means that the data
controller should be accountable for the collection, processing and use of the data, therefore, guaranteeing privacy. Co-regulatory enforcement regime: establishing
the office of a privacy officer is also recommended as the primary authority for the enforcement of provisions in the act. However, it is also suggested that industry
specific self-regulation organizations also be established. The document also refers to court judgments from Indian courts that have helped shape some form of
privacy safeguards into the system. For example, in the 1997 case, PUCL vs Union of India, the court observed: ‘Telephone-tapping is a serious invasion of an
individual’s privacy. It is no doubt correct that every government, howsoever democratic, exercises some degree of sub rosaoperation as a part of its intelligence
outfit, but at the same time citizen’s right to privacy has to be protected from being abused by the authorities of the day.’ The court then placed restrictions on the
class of bureaucrats who could authorize such surveillance and also ordered the creation of a review committee, which would look at all surveillance measures
authorized under the act. The Shah Report lays out a road map of acts passed by the Indian Parliament that would need to be reviewed for balance between
individual privacy and national security. For example, when reviewing the UID scheme, the report points out that citizens should be informed if their data is
breached. They should also be informed about where and how their data will be used, and notified of any changes in UID’s privacy policy. These and other
suggestions are then placed in a broader regulatory framework that imagines a privacy commissioner for India. At the same time it is pertinent to remember that
there is no privacy law to safeguard citizens, the government itself does not have a legal framework for the kind of mass
surveillance India is moving towards. As pointed out by privacy experts: ‘The two laws covering interception are the Indian Telegraph Act of
while
1885 and the Information Technology Act of 2000, as amended in 2008, and they restrict lawful interception to time-limited and targeted interception. The targeted
interception both these laws allow ordinarily requires case-by-case authorization by either the home secretary or the secretary of the department of information
technology.’5 Where do these competing interests end up? There is no privacy law to shield citizens from upgraded mass surveillance technology and systems,
which themselves constantly need updated legal grounding. Ironically, just before the Snowden revelations, in his April 2013 report to the Human Rights Council of
the United Nations, Special Rapporteur Frank La Rue noted that he was ‘deeply concerned by actions taken by states against individuals communicating via the
Internet, frequently justified broadly as being necessary to protect national security or to combat terrorism. While such ends can be legitimate under international
human rights law, surveillance often takes place for political, rather than security reasons in an arbitrary and covert manner.’6 The report also highlights the fact
that national legal standards that impose little or no judicial oversight, or allow warrantless surveillance powers in the name of national security without any
particular demonstration of a genuine need or threat and that ‘every individual should also be able to ascertain which public authorities or private individuals or
bodies control or may control their files.’ Today, the concept of privacy is also undergoing a sea change due to the increasing ease with which citizens and customers
are handing over data to governments and businesses. This has been seen with information shared on social media – 93 million Indians are on Facebook – and was
seen in the almost unquestioned way in which e-governance projects were welcomed in the early days without any flags being raised about any data security or
privacy safeguards in the design. In his essay, ‘The Real Privacy Problem’,7 writer Evgeny Morozov wrestles with the evolving concept of ‘privacy’. He writes of a
privacy scholar named Spiros Simitis who grappled with data protection in the 1980s, and the three ideas he grappled with. The first was that with virtually every
employee, taxpayer, patient, bank customer, welfare recipient, or car driver handing over their personal data to private companies (and of course, government)
privacy was now everyone’s problem. The second was that CCTV and other recording technologies like smart cards were normalizing surveillance, weaving it into
our everyday life. The third was that by allowing everyday activities to be recorded, citizens were actually allowing ‘long-term strategies of manipulation intended to
mould and adjust individual conduct.’ Ultimately, while technology itself is always faulted for being the cause of privacy failures, the truth is that these gaps enter
the system through poor legislation. As discussed, when projects
are created without thinking of who could have unwarranted access to
the information could be used and abused outside the scope of what it is collected for, is when the problems truly begin.
Privacy safeguards, transparency about the intent and extent of a project (even when it was intended for surveillance) injects accountability
information, or how
into a system that remains static, despite the dynamic leaps in technology. This
is the best way forward should India want to
retain its spirit and label of being a liberal democracy.
If Indian democracy faltered, it would ruin the global democratic model
Gupta ‘13
Deepankar Gupta is an Indian sociologist. He is currently Distinguished Professor at Shiv Nadar University and director, Centre
for Public Affairs and Critical Theory. He was formerly Professor in the Centre for the Study of Social Systems, Jawaharlal Nehru
University, New Delhi. For a brief period from 1993–1994, he was also associated with the Delhi School of Economics as
Professor in the Department of Sociology. “The importance of being Indian: Despite its warts, India’s democracy has fired global
imagination for over six decades” – The Times of India - Mar 30, 2013 - http://timesofindia.indiatimes.com/edit-page/Theimportance-of-being-Indian-Despite-its-warts-Indias-democracy-has-fired-global-imagination-for-over-sixdecades/articleshow/19281689.cms?
When India dared to birth democracy, many thought it was premature and that it would soon be history. Sixty-six
action-filled years
later, India's democracy is now a little too old to die young. What is more, the world
watches every move we make ; in fact, cannot have enough of us. This is not because India is efficient and
affluent - far from it. Rather, it is the way India goes wrong that fires global imagination. In any other country
of comparative vintage and want, ethnicity, once introduced, would have run wild. Indian politici-ans too have repeatedly played this dirty
trick, but our democracy has limited its appeal. The ultra corrupt may be ultra rich but because of
India's judiciary and the press they often wake up in jail to swill bad tea. Even army officers might face court martial if they mess with the
rules. Political bosses, and their cronies, are forever bending and twisting the law, but for all their power and pelf, they can never quite ignore it. Indian
politicians err time and again, but their overbites serve as object lessons because procedures hold. This not
only pulls us out of periodic crises with a just-back-from-the-dentist feel, but also tells the world, the advanced West included, how
easily democracy can be lost. If India had been another underperforming tin-pot dictatorship, it would
not have been the thought experiment it is today.
Take a look at the following: Corruption, assaults and poli-tical
conspiracies happen worldwide, but when they strike India they excite the mind like nothing else. For example, South Africa is a serious centre of gang rapes, or
"jack rolling" in the local lingo, but that does not cause an international stir. Yet the news of the December rape and murder in Delhi ricocheted within minutes
across the world. This was not because the protests were passionate, or because the police should have gone to a finishing school. What was being observed was
whether our Cons-titution would hold. Eventually it did; false cases were withdrawn and, boorish cops notwithstanding, no bullets were fired. Ethnic intolerance
again is an international affliction. When Putin tells Russian minorities to put up or shut up he gets a standing ovation at home and hardly any press abroad. In
Burma, Rohingya Muslims foxhole themselves in fear, but that does not make big news. With India it is different. If the western world was horrified with the 2002
Gujarat killings, it was because our free press and civil society, also gifts of democracy, brought things out in the open. Corruption in China is monumental. It
periodically fells bridges and schools, killing hundreds. Brazil has a homicide rate three times higher than India's and political violence in Russia is just too bad to be
true. The world may condemn all of this, and it does. However, it
is only when India goes wrong that tongues wag the mind just about
everywhere. That India can make this happen again and again is what makes us special. Had we been too
perfect, we would be Scandinavia, and nothing unique. On the other hand, had we been too violent, we would
have been just another Honduras, or maybe Zimbabwe. But because our stubborn demo-cracy has held to its frame, our leadership blunders light
up the sky. This is our real USP! India's imperfections make for its significance. In terms of economic underdevelopment and dodgy politicians, we have a fair
amount in common with many troubled nations, some of whom are our neighbours. But even in the darkest of times, we hardly expect military coups and mass
arrests, as they do. To their credit, millions of Chinese bloggers also noticed that Delhi's anti-rape agitations did not turn Vijay Chowk into a Tiananmen Square.
Advanced democracies too owe us a debt of gratitude. For years India has acted as a not-for-profit
laboratory so that they might remember the fundamentals of citizenship that made them rich and kept them that way. It is now
payback time and they should tell us how exactly they set up universal health and education that served their citizens so well. When democracies
reach out to each other this way, the world becomes a better place and friendships stay secure. This is
something that neither G-20 nor Brics meets can do as it is in the nature of the economic beast to cross wires and compete. For starters, South Africa is as unhappy
with Brazilian chickens flying in as it is with China's promiscuity with other African countries. The distant hope of a Brics Development Bank or of currency swaps will
not blow these fears out of the water.
Democracy checks inevitable extinction.
Diamond ‘95
(Larry, Senior Fellow at the Hoover Institution and Coeditor of The Journal of Democracy , “Promoting Democracy in the 1990s”,
December, http://www.wilsoncenter.org/subsites/ccpdc/pubs/di/fr.htm)
This hardly exhausts the lists of threats to our security and well-being in the coming years and decades. In the former Yugoslavia nationalist aggression tears at the
stability of Europe and could easily spread. The flow of illegal drugs intensifies through increasingly powerful international crime syndicates that have made common
Nuclear, chemical, and biological
weapons continue to proliferate. The very source of life on Earth, the global ecosystem, appears
increasingly endangered. Most of these new and unconventional threats to security are associated with or aggravated by
the weakness or absence of democracy, with its provisions for legality, accountability, popular sovereignty, and openness. LESSONS OF THE TWENTIETH
CENTURY The experience of this century offers important lessons. Countries that govern themselves in a truly democratic fashion
do not go to war with one another. They do not aggress against their neighbors to aggrandize themselves or glorify
their leaders. Democratic governments do not ethnically "cleanse" their own populations, and they are much
less likely to face ethnic insurgency. Democracies do not sponsor terrorism against one another. They
do not build weapons of mass destruction to use on or to threaten one another. Democratic countries form more reliable,
open, and enduring trading partnerships. In the long run they offer better and more stable climates for investment. They are more environmentally
responsible because they must answer to their own citizens, who organize to protest the destruction of their environments. They are better bets
cause with authoritarian regimes and have utterly corrupted the institutions of tenuous, democratic ones.
to honor international treaties since they value legal obligations and because their openness makes it much more difficult to breach agreements in secret. Precisely
and the rule of law, democracies are the only reliable
foundation on which a new world order of international security and prosperity can be built.
because, within their own borders, they respect competition, civil liberties, property rights,
The new Freedom Act won’t solve US image. Protections from the original version do
solve, even without protections for persons outside the US.
Ries ‘14
(Internally quoting Zeke Johnson, director of Amnesty International's Security & Human Rights Program. Also internally quoting
Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before joining Human
Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of their Project on
Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom, with a particular
focus on international free expression and privacy. She also served as co-chair of the Policy & Learning Committee of the Global
Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and human rights in the
technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights Fellow at Human Rights
in China (HRIC). There, she contributed to the organization’s work in the areas of business and human rights and freedom of
expression online. Wong earned her law degree from New York University School of Law. Also internally quoting Center for
Democracy and Technology Senior Counsel Harley Geiger – Brian Ries is Mashable’s Real-Time News Editor. Prior to working at
Mashable, Brian was Social Media Editor at Newsweek & The Daily Beast, responsible for using Twitter, Facebook, and Tumblr
to cover revolutions, disasters, and presidential elections. During his time at The Daily Beast, he contributed to a team that won
two Webby Awards for “Best News Site”. “Critics Slam 'Watered-Down' Surveillance Bill That Congress Just Passed” - Mashable May 22, 2014 – http://mashable.com/2014/05/22/congress-nsa-surveillance-bill/)
As a result, many
of its initial supporters pulled their support. “We supported the original USA Freedom
act, even though it didn’t do much for non-US persons,” Zeke Johnson, director of Amnesty
International's Security & Human Rights Program told Mashable after Thursday's vote. He described the
original version as “a good step to end bulk collection. ” However, in its current version, it's
not even clear that this bill does that at all, Johnson said. He added that Congress left a lot of "wiggle room" in the
bill — something he said is a real problem. "Where there is vagueness in a law, you can count on the
administration to exploit it," Johnson said. However, Laura W. Murphy, director of the ACLU Washington Legislative Office, took a more
positive view of the bill. "While far from perfect, this bill is an unambiguous statement of congressional intent to rein in the out-of-control NSA," she said in a
statement. "While we share the concerns of many — including members of both parties who rightly believe the bill does not go far enough — without it we would
be left with no reform at all, or worse, a House Intelligence Committee bill that would have cemented bulk collection of Americans’ communications into law." The
Electronic Frontier Foundation simply called it "a weak attempt at NSA reform." “ The
ban on bulk collection was deliberately
watered down to be ambiguous and exploitable,” said Center for Democracy and Technology Senior Counsel Harley Geiger. “We
withdrew support for USA FREEDOM when the bill morphed into a codification of large-scale,
untargeted collection of data about Americans with no connection to a crime or terrorism.” And
Cynthia Wong , senior Internet researcher at Human Rights Watch, said, “This so-called reform bill won’t restore
the trust of Internet users in the US and around the world. Until Congress passes real reform, U.S.
credibility and leadership on Internet freedom will continue to fade.”
Unlike the current Act, the original bill does solve US image. This holds even if plan’s
about bulk collection – instead of every surveillance practices.
HRW ‘14
(Internally quoting Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before
joining Human Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of
their Project on Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom,
with a particular focus on international free expression and privacy. She also served as co-chair of the Policy & Learning
Committee of the Global Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and
human rights in the technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights
Fellow at Human Rights in China (HRIC). There, she contributed to the organization’s work in the areas of business and human
rights and freedom of expression online. Wong earned her law degree from New York University School of Law. Human Rights
Watch is an independent, international organization that works as part of a vibrant movement to uphold human dignity and
advance the cause of human rights for all. “US Senate: Salvage Surveillance Reform House Bill Flawed” - Human Rights Watch May 22, 2014 – http://www.hrw.org/news/2014/05/22/us-senate-salvage-surveillance-reform)
It is up to the US Senate to salvage surveillance reform, Human Rights Watch said today. The version of the USA Freedom
Act that the US House of Representatives passed on May 22, 2014, could ultimately fail to end mass data collection. The
version the House passed is a watered-down version of an earlier bill that was designed to end bulk
collection of business records and phone metadata. The practice has been almost universally condemned by all but the US security
establishment. “This so-called reform bill won’t restore the trust of Internet users in the US and around the
world, ” said Cynthia Wong, senior Internet researcher at Human Rights Watch . “Until Congress
passes real reform , US credibility and leadership on Internet freedom will continue to fade .”
The initial version of the bill aimed to prohibit bulk collection by the government of business records, including phone
metadata.
The bill only addressed one component of the surveillance programs revealed by the former National Security Agency
contractor Edward Snowden, that of US record collections.
Human Rights Watch.
However, it had broad support as a first step, including from
On May 7, a diluted version of the bill passed unanimously out of the House Judiciary Committee, followed by Intelligence Committee
the version the House passed could leave the door wide open to
continued indiscriminate data collection practices potentially invading the privacy of millions of people without
approval on May 8. While better than alternative bills offered,
justification, Human Rights Watch said.
Download