SWS FISA NEG Global Economy 1nc data pullout Foreign, not domestic, surveillance is what is driving data pull out – Chander and Le 15 (Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis; Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D., University of California, Davis School of Law) Anupam Chander and Uyên P. Lê, DATA NATIONALISM, EMORY LAW JOURNAL, Vol. 64:677, http://law.emory.edu/elj/_documents/volumes/64/3/articles/chander-le.pdf) First, the United States, like many countries, concentrates much of its surveillance efforts abroad. Indeed, the Foreign Intelligence Surveillance Act is focused on gathering information overseas, limiting data gathering largely only when it implicates U.S. persons.174 The recent NSA surveillance disclosures have revealed extensive foreign operations.175 Indeed, constraints on domestic operations may well have spurred the NSA to expand operations abroad. As the Washington Post reports, “Intercepting communications overseas has clear advantages for the NSA, with looser restrictions and less oversight.”176 Deterred by a 2011 ruling by the Foreign Intelligence Surveillance Court barring certain broad domestic surveillance of Internet and telephone traffic,177 the NSA may have increasingly turned its attention overseas. Second, the use of malware eliminates even the need to have operations on the ground in the countries in which surveillance occurs. The Dutch newspaper NRC Handelsblad reports that the NSA has infiltrated every corner of the world through a network of malicious malware.178 A German computer expert noted that “data was intercepted here [by the NSA] on a large scale.”179 The NRC Handelsblad suggests that the NSA has even scaled the Great Firewall of China,180 demonstrating that efforts to keep information inside a heavily secured and monitored ironclad firewall do not necessarily mean that it cannot be accessed by those on the other side of the earth. This is a commonplace phenomenon on the Internet, of course. The recent enormous security breach of millions of Target customers in the United States likely sent credit card data of Americans to servers in Russia, perhaps through the installation of malware on point-of-sale devices in stores. 1nc tech not key This advantage has no card on how a public advocate stops mass surveillance in programs like PRISM and BULLRUN, which is what the link chain talks about being key to reviving the tech industry. Tech not key – companies don’t even fully make use of existing digital tech AND manufacturing is an alt cause Tom and Fosler 14 (Josh Tom, Senior Analyst for The GailFosler Group , Gail D Fosler, president of The GailFosler Group, “How Important Is Digital Technology to Our Economic Future?: An Interview With Rob Atkinson”, Rob Atkinson is an economist and the president of the Information Technology and Innovation Foundation, Gailfosler.com, http://www.gailfosler.com/important-digital-technology-economic-future-interview-rob-atkinson) Q: In 1987, Robert Solow famously wrote, “You can see the computer age everywhere except in the productivity numbers.” Today, it seems you can see the digital revolution everywhere but in the economic numbers. Where is this new age of prosperity that all the “techno-optimists” are talking about? Let’s begin with an important premise. Digital technology is an important dimension in our economy, but it is by no means the only driver of economic activity or opportunity. In contrast to the universal and almost magical properties that “techno-optimists” attribute to digital technology, we need to make a critical distinction between the promise of technology and the use of technology. People are blaming technology for not living up to its promises because of poor economic performance in recent years when it is really its use as manifest in the lack of basic investment in the economy that is limiting growth. Without increased capital investment in equipment and software, innovation and technology have no way to spread throughout the economy. Long-run growth is lower as a consequence. The slowdown in investment has little to do with technology. Rather it is due in part to an increasing short-termism on the part of U.S. businesses, leading them to invest less for the longer term. As a result, we are investing less in machines and equipment and structures than we did a decade ago. The slowdown also appears to be caused by a decline in manufacturing. Manufacturing is a very high-investment, high-productivity sector that pays good wages relative to some of the service industries. But manufacturing’s decline is due in large part to international competition, not to digital technology. Indeed, without digital manufacturing equipment and robotics U.S. manufacturing would have become even less internationally competitive. Advances in digital technology have created important new industries and new jobs. Unfortunately, the decline in manufacturing has offset these gains to a great extent. Tech doesn’t impact economy-stock increasing now Cordero 14 [Carrie Cordero is the Director of National Security Studies and an Adjunct Professor of Law at Georgetown University Law Center], Lawfare, “exploring the effect of NSA disclosures on the US technology industry,” 4/12/14 http://www.lawfareblog.com/exploring-effect-nsa-disclosures-us-technology-industry This past Monday, I had the honor of moderating a panel organized by students at the American University Washington College of Law’s National Security Law Brief, on Understanding the Global Implications of the NSA Disclosures on the U.S. Technology Industry. The panel (Elizabeth Banker (ZwillGen), David Fagan (Covington), Joseph Moreno (Cadwalader), Gerard Stegmaier (Wilson Sonsoni) and Lawrence Greenberg (Motley Fool)) was stacked with practitioners who are navigating, on a daily basis, issues related to data privacy, transparency, and cooperation with law enforcement/government requests, among other related issues. As we explored during the discussion, there are a number of recent media and other reports describing the “fallout” for U.S. industry as a result of the disclosures. So, at least two questions arise: first, are the reports to be believed, and second, if so, will there be a lasting impact, or is this only temporary?¶ The short answer is that it is too soon to judge. But, as we all read these reports, such as this one produced by NTT Communications and cited in a Guardian article late last month, it will be important to look at the source and potential motivations behind them before drawing firm conclusions about the state of U.S. industry.¶ Of interest, several of the panelists suggested that the reactions to the recent disclosures perhaps represent the tipping point of what was already a growing discomfort with, if not outright opposition to, changes to the law in the national security area since the USA Patriot Act of October 2001. Another panelist noted that despite the reports of dramatic effects, stock prices of certain affected U.S. technology companies have gone up in recent months (while some others have gone down). It is an important point: drawing conclusions about the long term effects on U.S. industry will take careful study, over a sustained period of time. In the meantime, I intend to spend more time looking into this issue. It seems to me that, given that foreign intelligence surveillance activities conducted by the United States are subject to more laws, rules, procedures and oversight than any other nation, the rush – if there is one – to displace U.S. companies, may be misguided. There just may be a different story to tell. 2nc tech not key Technology’s benefit to the economy is overstated – the benefits are concentrated among a small portion of the population Bhajaria 15 (Nishant Bhajaria, senior product architect at Nike and a career coach, “Why isn't the tech boom helping the economy?”, 5/5/2015, LinkedIn, https://www.linkedin.com/pulse/why-isnt-tech-boom-helping-economy-nishant-bhajaria, DJE) As I wrote last week, the hi-tech sector in the U.S. is red hot in terms of job opportunities. Even as the rest of the economy barely registers a pulse for many, hi-tech is vibrant with capital and jobs. This made me wonder: why is the tech boom not boosting the overall economy? Just so we’re clear, no one can deny the innovation and disruption to daily life that technology makes possible. My argument is that it is possible to have a major impact on our daily life while generating wealth without growing the overall economy. To understand why the tech boom has a limited impact on economic growth, consider the following reasons. First, unlike traditional sectors like agriculture, infrastructure and healthcare, technology is inherently different in terms of the relationship between output and labor. In those sectors, you need a lot of workers consistently to convert plans into product. That is not the case with tech jobs, where one of the main appeals of technology is to use automation to do more with less labor and fewer iterations. For example, when Facebook acquired WhatsApp for $19 Billion, the latter employed just 55 employees. This purchase was great for WhatsApp employees, but did not create any profit or income for anyone outside of those 55 people. Similarly, when Yahoo bought Tumblr, about 40 employees made millions, and about 178 employees made about $300K. There are other examples similar to this one all over the world. As far as tech sector being a jobs engine is concerned, reputation is not the reality. As advertised, technology creates great wealth; that wealth, however is distributed among a small slice of society. There is a bright green line between those who make millions and the remaining minions. Put simply, the tech sector can create wealth without creating a lot of work. Second, 90% of startup tech ventures fail. In such instances, employees come away with marketable skills and contacts, but the benefit to the rest of the economy is negligible in the near term. For a business to create jobs outside of its immediate scope, the business needs to sustain itself to profitability. Third, the tech sector is more of an urban phenomenon compared to sectors that have historically boosted the U.S. economy. This is significant since technology and resultant automation are at least partly responsible for the decline of manufacturing jobs. That decline in manufacturing affected the whole country. Tech jobs are mainly concentrated on the coasts, along with venture capital funders (See Figures 1 and 2 below), tech-centric universities and a workforce with transferable skills. Urban America, therefore, had an easier transition from a manufacturing to a service-oriented economy while the rest of the country did not. Vast areas of the U.S. have been historically dependent on manufacturing with skills to match for ages. During my undergraduate years in rural Missouri, driving through the midwest often made for depressing viewing. Town after town featured abandoned homes and factories, all a symbol of what once was and will never be. These are shards of a shattered past that would never join together again, and the jobs they once provided have gone forever. The tech sector, with its vast footprint, has not stepped in to fill that void. To the degree that rural America does offer job opportunities, it is from traditional sectors like healthcare and automobiles. Smaller towns in Nebraska and Indiana, for example, are surviving due to hospitals that offer high-paying jobs. Beyond those jobs, the next best options for locals include small, low-skill factories, the dollar store or a Dairy Queen. Similarly, the benefits of a reviving auto industry are not confined to states like Michigan and Ohio. Ford is building plants and creating jobs in other rural states. Alcoa is a supplier of aluminium to auto companies, and spent $300m expanding an aluminium plant in rural Iowa. It will soon spend $275m expanding a factory in rural Tennessee. The tech sector is different from these older sectors when it comes to job creation. Its power is deep, but its reach very limited. The above three points make clear: the booming tech sector creates a few vastly successful startups that create a handful of millionaires and many more failed startups that create no tangible economic benefit. The remaining middle-class jobs created by the tech boom are concentrated in pockets of the country among the highly educated. All this mitigates the economic impact. Fourth, even when tech companies venture outside of urban coastal locations, they provide limited benefits at best to their communities. Over-emphasizing the importance of technology in an economy drains capital away from a diversified entrepreneurial portfolio Kammer-Kerwick and Peterson 15 (Matthew Kammer-Kerwick, , James A. Peterson, , “Want to rebuild the economy? Stop obsessing over tech start-ups.”, 5/4/2015, The Washington Post, http://www.washingtonpost.com/posteverything/wp/2015/05/04/want-to-rebuild-the-economy-stop-obsessing-over-tech-start-ups/, DJE) Six years after the Great Recession ended, the nation’s economic recovery remains tenuous. The hiring rate has weakened; the manufacturing sector continues its rapid decline; and the labor force has shrunk to its lowest level since the 1970s. Nobody has felt this sluggishness more than millennials, who are facing lower incomes and higher unemployment than their parents did at their age. That’s a big problem: Projected to be 75 percent of the global workforce by 2025, millennials are the key to a sustainable economic recovery. But the leaders orchestrating our economy’s turnaround keep overlooking them and failing to cultivate their full economic potential. Millennials have made clear how they want to help rebuild our economy. Survey after survey has shown that the nation’s youngest workers have a hungry entrepreneurial spirit, driven by the opportunity for independence and creativity. A recent study by Bentley University found that most young adults dream of starting their own businesses: “Millennials view career success differently than their parents do. Rather than striving for the CEO spot, 66 percent of millennials would like to start their own business.” We conducted a study that found that, in terms of setting professional entrepreneurial goals and having formed an idea about the type of company they want to start, millennials outpace older Americans by approximately 10 percentage points. But despite their dreams of becoming business owners, few millennials actually do: Just 3.6 percent of households headed by young adults own stakes in private companies, compared with 10.6 percent in 1989, according to a recent Wall Street Journal analysis. The future of our economy depends on finding a way to shrink that chasm between having an idea and having a business. Cultivating entrepreneurs is great for the economy because the new firms they create are a prominent source of job growth. Washington understands that. This summer, the Obama administration will hold the first White House Demo Day, billed as an effort to make entrepreneurship more accessible to people from diverse backgrounds and geographies. This broad, inclusive goal is positive. But the White House has made it clear that its focus is actually much narrower. When it comes to celebrating entrepreneurship, our society, led by Washington and Wall Street, has become fixated on the technology industry, funneling money and support primarily into tech start-ups. That myopic focus is misguided. In contrast, most aspiring entrepreneurs dream about starting Main Street companies – restaurants, barbershops, boutiques and other everyday retail and services. The timing is perfect to capture the economic promise of millennial entrepreneurship. The oldest members of the generation are reaching what has historically been the prime entrepreneurial age, at a time that coincides with improving economic conditions and renewed optimism. The climate for Main Street start-ups is looking brighter, with consumers spending more and interest rates having remained low. Of course, the entrepreneurial process is complicated and fraught with risk: Hopeful business owners must turn their visions into solid business plans, assess the market, determine how much capital they need and find backers before they can even launch. After that, it gets even harder. Data from the Bureau of Labor Statistics show that approximately half of start-up companies fail to last more than five years. These are among the hurdles that have prevented many young people from becoming their own bosses. For this generation — already saddled with debt and struggling to get the privatesector experience that helps one launch a business — the risk can be especially intimidating. Although as a group, Main Street companies can be less risky than technology start-ups, they are often underfunded and poorly planned. In the absence of funding and planning, they are driven by passion, and that’s not sustainable. That’s why government and other institutions need to step up. For one, we need to demystify the start-up process for aspiring entrepreneurs. Colleges and universities are the best place to start encouraging Main Street entrepreneurs to plan and fund their companies in a way that reduces risk. Babson College is an excellent example of an existing program that could be expanded, requiring students to gain start-up experience on a small scale as part of their course work. The University of Houston is another great example of how education can include hands-on experience along with traditional classroom learning. The University of Texas at Austin, in addition to offering formal entrepreneurship-related courses, offers a variety of entrepreneurship programs for students, including Texas Venture Labs, Longhorn Startup, Longhorn Entrepreneur Agency and the Technology Entrepreneurship Society. These types of programs should be expanded to reach young people who seek to start businesses after their formal education is over, too. We also need to enhance connections between millennials and more experienced entrepreneurs as partners and mentors. Mentorship programs have been promoted at New Orleans Entrepreneur Week and South by Southwest, but we need more. These mentorships and targeted events help increase young people’s awareness of existing financing options and start-up support programs to launch their ideas. Too often, nascent entrepreneurs take easier – but riskier routes – to financing their ideas, like credit cards and relatives. Though those options are more expedient for the passion-driven entrepreneur, other funding routes, like SBA loans and bank loans, require the businessplanning process that reduces the financial risk and stress that can cripple a start-up. Great business ideas shouldn’t stall simply because they don’t yet have the acumen to engage angel investors or venture capitalist partners. New programs and opportunities for entrepreneurs shouldn’t just benefit aspiring business owners in their 20s and 30s. Generation X and baby boomers also have substantial interest in entrepreneurship and can benefit from more experience. When members of different generations work together – whether in a mentorship or as business partners — synergies can develop between their unique strengths and perspectives: Millennials are more confident about setting goals, more optimistic about future economic conditions and are driven by a desire to make a difference in society. In contrast, Generation X and baby boomers are marginally more likely to value persistence in recovering from setbacks and focus on the concrete benefits of employment: job security, reliable health insurance and retirement savings. If we continue to undervalue the potential of young entrepreneurship, the consequences will trickle throughout our economy. Inaction promises a less robust and less diversified economic recovery, and one in which fewer At this point in our tenuous recovery, now is exactly the best time to invest in a diversified and inclusive portfolio of entrepreneurs. Americans pursue their entrepreneurial dreams. Such inaction is akin to inadequate planning for retirement. The benefit of technological growth is sidelined by a deficit in US Stem education Engler 12 (John Engler, journalist for US News, “STEM Education Is the Key to the U.S.'s Economic Future”, 6/15/2012, U.S. News and World Report, http://www.usnews.com/opinion/articles/2012/06/15/stem-education-is-the-key-to-the-uss-economic-future) A close look at American unemployment statistics reveals a contradiction: Even with unemployment at historically high levels , large numbers of jobs are going unfilled. Many of these jobs have one thing in common–the need for an educational background in science, technology, engineering, and mathematics. Increasingly, one of our richest sources of employment and economic growth will be jobs that require skills in these areas, collectively known as STEM. The question is: Will we be able to educate enough young Americans to fill them? Yes, the unemployment numbers have been full of bad news for the past few years. But there has been good news too. While the overall unemployment rate has slowly come down to May's still-high 8.2 percent, for those in STEM occupations the story is very different. According to a recently released study from Change the Equation, an organization that supports STEM education, there are 3.6 unemployed workers for every job in the United States. That compares with only one unemployed STEM worker for two unfilled STEM jobs throughout the country. Many jobs are going unfilled simply for lack of people with the right skill sets. Even with more than 13 million Americans unemployed, the manufacturing sector cannot find people with the skills to take nearly 600,000 unfilled jobs, according to a study last fall by the Manufacturing Institute and Deloitte. The hardest jobs to fill were skilled positions, including well-compensated blue collar jobs like machinists, operators, and technicians, as well as engineering technologists and sciences. As Raytheon Chairman and CEO William Swanson said at a Massachusetts' STEM Summit last fall, "Too many students and adults are training for jobs in which labor surpluses exist and demand is low, while high-demand jobs, particularly those in STEM fields, go unfilled." STEM-related skills are not just a source of jobs, they are a source of jobs that pay very well. A report last October from the Georgetown University Center on Education and the Workforce found that 65 percent of those with Bachelors' degrees in STEM fields earn more than Master's degrees in non-STEM occupations. In fact, 47 percent of Bachelor's degrees in STEM occupations earn more than PhDs in non-STEM occupations. But despite the lucrative potential, many young people are reluctant to enter into fields that require a background in science, technology, engineering, or mathematics. In a recent study by the Lemselson-MIT Invention Index, which gauges innovation aptitude among young adults, 60 percent of young adults (ages 16 to 25) named at least one factor that prevented them from pursuing further education or work in the STEM fields. Thirty-four percent said they don't know much about the fields, a third said they were too challenging, and 28 percent said they were not well-prepared at school to seek further education in these areas. This is a problem—for young people and for our country. We need STEM-related talent to compete globally, and we will need even more in the future. It is not a matter of choice: For the United States to remain the global innovation leader, we must make the most of all of the potential STEM talent this country has to offer. Government can play a critical part. President Barack Obama's goal of 100,000 additional science, technology, engineering, and math teachers is laudable. The president's STEM campaign leverages mostly private-sector funding. Called Educate to Innovate, it has spawned Change the Equation, whose study was cited above. A nongovernmental organization, Change the Equation was set up by more than 100 CEOs, with the cooperation of state governments and educational organizations and foundations to align corporate efforts in STEM education. The U.S. is not locked into a “winner-take-all” race for science and tech leadership. Increased innovation in China and India will increase production and consumption in the U.S. service sector. Bhidé ‘9 Amar Bhidé, Thomas Schmidheiny Professor in The Fletcher School of Law and Diplomacy @ Tufts, was Glaubinger Professor of Business at Columbia University. “The Venturesome Economy: How Innovation Sustains Prosperity in a More Connected World”. Winter 2009. Journal of Applied Corporate Finance • Volume 21 Number 1. http://bhide.net/venturesome_press/JACF_Venturesome_Economy_1_bhide.pdf My analysis of the multiplayer game and cross-border interactions suggests outcomes that differ sharply from the dire predictions of the techno-nationalists. According to my assessment, the United States is not locked into a “winner-take-all” race for scientific and technological leadership, and the growth of research capabilities in China and India—and thus their share of cutting-edge research—does not reduce U.S. prosperity. Indeed my analysis suggests that advances abroad will improve living standards in the U.S. Moreover, the benefits I identify are different from the conventional economist’s account whereby prosperity abroad increases opportunities for U.S. exporters. Instead, I show that cutting-edge research developed abroad benefits domestic production and consumption in the service sector. And contrary to the policy prescriptions of techno-nationalists, I suggest that the U.S. embrace the expansion of research capabilities abroad instead of devoting more resources to maintaining its lead in science and cutting-edge technology.20 Tech development is not zero-sum – it does not matter the origin of innovation – the U.S. will still capitalize on it. Bhidé ‘9 Amar Bhidé, Thomas Schmidheiny Professor in The Fletcher School of Law and Diplomacy @ Tufts, was Glaubinger Professor of Business at Columbia University. “The Venturesome Economy: How Innovation Sustains Prosperity in a More Connected World”. Winter 2009. Journal of Applied Corporate Finance • Volume 21 Number 1. http://bhide.net/venturesome_press/JACF_Venturesome_Economy_1_bhide.pdf Any catch-up, even if it takes place gradually and in the normal course of development, will to some degree reduce the U.S. “lead.” Furthermore, the global influence of techno-nationalism could accelerate this process. As alarmists in the U.S. continue to remind us, governments in “emerging” countries such as China and India—also in the thrall of techno-nationalist thinking—are making a determined effort to leap ahead in cutting-edge science and technology. But I am skeptical that these efforts are going to do any more good for China’s and India’s economy than similar efforts in Europe and Japan in the 1970s and 1980s.21 But putting aside the issue of whether investing in cutting-edge research represents a good use of Chinese and Indian resources, does whatever erosion of U.S. primacy in developing high-level know-how this might cause really threaten U.S. prosperity? Should the U.S. government respond in kind by putting even more money into research? Nobel laureate Paul Krugman has long decried what he refers to as the “dangerous obsession” with “national competitiveness.” As Krugman wrote in a 1994 article in Foreign Affairs, the widespread tendency to think that “the United States and Japan are competitors in the same sense that Coca-Cola competes with Pepsi” is “flatly, completely and demonstrably wrong.” Although “competitive problems could arise in principle, as a practical, empirical matter,” Krugman goes on to say, “the major nations of the world are not to any significant degree in economic competition with each other.”22 The techno-nationalist claim that U.S. prosperity requires that the country “maintain its scientific and technological lead” is particularly dubious: the argument fails to recognize that the development of scientific knowledge or cutting-edge technology is not a zero-sum competition. The results of scientific research are available at no charge to anyone anywhere in the world. Most arguments for the public funding of scientific research are in fact based on the unwillingness of private investors to undertake research that cannot yield a profit. Cutting-edge technology (as opposed to scientific research) has commercial value because it can be patented; but patent owners generally don’t charge higher fees to foreign licensors. The then tiny Japanese company Sony was one of the first licensors of Bell Labs’ transistor patent. Sony paid all of $50,000—and only after first obtaining special permission from the Japanese Ministry of Finance—for the license that started it on the road to becoming a household name in consumer electronics. Moreover, if patent holders choose not to grant licenses but to exploit their inventions on their own, this does not mean that the country of origin secures most of the benefit at the expense of other countries. Suppose IBM chooses to exploit internally, instead of licensing, a breakthrough from its China Research Laboratory (employing 150 research staff in Beijing). This does not help China and hurt everyone else. Rather, as I discuss at length later, the benefits go to IBM’s stockholders, to employees who make or market the product that embodies the invention, and—above all—to customers, who secure the lion’s share of the benefit from most innovations. These stockholders, employees, and customers, who number in the tens of millions, are located all over the world. In a world where breakthrough ideas easily cross national borders, the origin of ideas is inconsequential. Contrary to Thomas Friedman’s assertion, it does not matter that Google’s search algorithm was invented in California. After all, a Briton invented the protocols of the World Wide Web—in a lab in Switzerland. A Swede and a Dane in Tallinn, Estonia, started Skype, the leading provider of peer-to-peer Internet telephony. How did the foreign origins of these innovations harm the U.S. economy? 1nc tech high now Tech high now-structural features Calamur 13 (Krishnadev Calamur editor at NPR in DC, NPR, “U.S. Competitiveness Up, Ranking Fifth, Survey Says”, 9/4/2013, http://www.npr.org/blogs/parallels/2013/09/04/218902510/u-s-competitiveness-up-ranking-fifth-survey-says) U.S. competitiveness among global economies suffered after the 2008 global economic crisis. Four years after the crisis, the U.S. slipped in the World Economic Forum's annual competitiveness ranking. This year it's back up a bit: The U.S. rose to fifth position overall from seventh last year, in the forum's latest survey, which was released Wednesday.¶ Here's what the survey says about the U.S., the world's largest economy:¶ U.S. competitiveness among global economies suffered after the 2008 global economic crisis. Four years after the crisis, the U.S. slipped in the World Economic Forum's annual competitiveness ranking. This year it's back up a bit: The U.S. rose to fifth position overall from seventh last year, in the forum's latest survey, which was released Wednesday. Here's what the survey says about the U.S., the world's largest economy: "Overall, many structural features continue to make the US economy extremely productive. US companies are highly sophisticated and innovative, supported by an excellent university system that collaborates admirably with the business sector in R&D. Combined with flexible labor markets and the scale opportunities afforded by the sheer size of its domestic economy — the largest in the world by far — these qualities continue to make the United States very competitive. 2nc tech high now Tech industry growing Thomas J. Casey, 1-22-2015, "2015 Technology Industry Trends," Pwc Network, http://www.strategyand.pwc.com/perspectives/2015-technology-trends The tech industry is always in flux. Frequent new products and category innovation define and redefine the sector’s constantly shifting landscape. But lately we’ve seen even greater volatility than usual, and it has begun to affect the makeup of hardware and software companies themselves. Increasingly, technology firms are reexamining the structure of their businesses and taking bold steps to squeeze out better financial performance. They are doing this because their profit margins and market share are under siege from disruptive, often well-funded startups and other aggressive competitors. The competition, in turn, has made customers more demanding. They are seeking greater performance, better features, and more platform independence and flexibility at the lowest price point possible. This volatility is manifested in a flurry of attempted and consummated mergers, acquisitions, and divestitures. In the early fall of 2014, for example, multiple major business publications reported that Hewlett-Packard was in talks to purchase storage equipment maker EMC, primarily to improve scale and cut costs. Both sides refused to comment on any possible deal, and none occurred. Then, in November, HP announced that it was splitting in two, separating its computer and printer hardware business (HP Inc.) from its enterprise hardware, software, and services units (Hewlett-Packard Enterprise). HP’s goal for the split is to allow both units, which will each generate more than US$50 billion in revenue and be Fortune 50 companies, to become more nimble and focused on their respective markets and competitors. With this breakup, the two companies will have to find ways to improve the performance of slow-growth businesses struggling to maintain decent profit margins. 1nc US econ not key U.S. not key to the global economy. Caryl 10 [Christian, Senior Fellow at the Center for International Studies at the Massachusetts Institute of Technology and a contributing editor to Foreign Policy. His column, "Reality Check," appears weekly on ForeignPolicy.com, Crisis? What Crisis? APRIL 5, 2010, http://www.foreignpolicy.com/articles/2010/04/05/crisis_what_crisis?page=full] Many emerging economies entered the 2008-2009 crisis with healthy balance sheets. In most cases governments reacted quickly and flexibly, rolling out stimulus programs or even expanding poverty-reduction programs. Increasingly, the same countries that have embraced globalization and markets are starting to build social safety nets. And there's another factor: Trade is becoming more evenly distributed throughout the world. China is now a bigger market for Asian exporters than the United States. Some economists are talking about "emerging market decoupling." Jonathan Anderson, an emerging-markets economist at the Swiss bank UBS, showed in one recent report how car sales in emerging markets have actually been rising during this latest bout of turmoil -- powerful evidence that emerging economies no longer have to sneeze when America catches a cold. Aphitchaya Nguanbanchong, a consultant for the British-based aid organization Oxfam, has studied the crisis's effects on Southeast Asian economies. "The research so far shows that the result of the crisis isn't as bad as we were expecting," she says. Indonesia is a case in point: "People in this region and at the policy level learned a lot from the past crisis." Healthy domestic demand cushioned the shock when the crisis hit export-oriented industries; the government weighed in immediately with hefty stimulus measures. Nguanbanchong says that she has been surprised by the extent to which families throughout the region have kept spending money on education even as incomes have declined for some. And that, she says, reinforces a major lesson that emerging-market governments can take away from the crisis: "Governments should focus more on social policy, on health, education, and services. They shouldn't be intervening so much directly in the economy itself." 2nc US econ not key Decoupling means US isn’t key to the global economy Bloomberg 10 [“Wall Street Sees World Economy Decoupling From U.S.”, October 4th, 2010, http://www.bloomberg.com/news/2010-10-03/world-economy-decoupling-from-u-s-in-slowdown-returnsas-wall-street-view.html, Chetan] The main reason for the divergence: “Direct transmission from a U.S. slowdown to other economies through exports is just not large enough to spread a U.S. demand problem globally,” Goldman Sachs economists Dominic Wilson and Stacy Carlson wrote in a Sept. 22 report entitled “If the U.S. sneezes...” Limited Exposure Take the so-called BRIC countries of Brazil, Russia, India and China. While exports account for almost 20 percent of their gross domestic product, sales to the U.S. compose less than 5 percent of GDP, according to their estimates. That means even if U.S. growth slowed 2 percent, the drag on these four countries would be about 0.1 percentage point, the economists reckon. Developed economies including the U.K., Germany and Japan also have limited exposure, they said. Economies outside the U.S. have room to grow that the U.S. doesn’t, partly because of its outsized slump in house prices, Wilson and Carlson said. The drop of almost 35 percent is more than twice as large as the worst declines in the rest of the Group of 10 industrial nations, they found. The risk to the decoupling wager is a repeat of 2008, when the U.S. property bubble burst and then morphed into a global credit and banking shock that ricocheted around the world. For now, Goldman Sachs’s index of U.S. financial conditions signals that bond and stock markets aren’t stressed by the U.S. outlook. Weaker Dollar The break with the U.S. will be reflected in a weaker dollar, with the Chinese yuan appreciating to 6.49 per dollar in a year from 6.685 on Oct. 1, according to Goldman Sachs forecasts. The bank is also betting that yields on U.S. 10-year debt will be lower by June than equivalent yields for Germany, the U.K., Canada, Australia and Norway. U.S. notes will rise to 2.8 percent from 2.52 percent, Germany’s will increase to 3 percent from 2.3 percent and Canada’s will grow to 3.8 percent from 2.76 percent on Oct. 1, Goldman Sachs projects. Goldman Sachs isn’t alone in making the case for decoupling. Harris at BofA Merrill Lynch said he didn’t buy the argument prior to the financial crisis. Now he believes global growth is strong enough to offer a “handkerchief” to the U.S. as it suffers a “growth recession” of weak expansion and rising unemployment, he said. Giving him confidence is his calculation that the U.S. share of global GDP has shrunk to about 24 percent from 31 percent in 2000. He also notes that, unlike the U.S., many countries avoided asset bubbles, kept their banking systems sound and improved their trade and budget positions. Economic Locomotives A book published last week by the World Bank backs him up. “The Day After Tomorrow” concludes that developing nations aren’t only decoupling, they also are undergoing a “switchover” that will make them such locomotives for the world economy, they can help rescue advanced nations. Among the reasons for the revolution are greater trade between emerging markets, the rise of the middle class and higher commodity prices, the book said. Investors are signaling they agree. The U.S. has fallen behind Brazil, China and India as the preferred place to invest, according to a quarterly survey conducted last month of 1,408 investors, analysts and traders who subscribe to Bloomberg. Emerging markets also attracted more money from share offerings than industrialized nations last quarter for the first time in at least a decade, Bloomberg data show. Room to Ease Indonesia, India, China and Poland are the developing economies least vulnerable to a U.S. slowdown, according to a Sept. 14 study based on trade ties by HSBC Holdings Plc economists. China, Russia and Brazil also are among nations with more room than industrial countries to ease policies if a U.S. slowdown does weigh on their growth, according to a policy- flexibility index designed by the economists, who include New York-based Pablo Goldberg. “Emerging economies kept their powder relatively dry, and are, for the most part, in a position where they could act countercyclically if needed,” the HSBC group said. Links to developing countries are helping insulate some companies against U.S. weakness. Swiss watch manufacturer Swatch Group AG and tire maker Nokian Renkaat of Finland are among the European businesses that should benefit from trade with nations such as Russia and China where consumer demand is growing, according to BlackRock Inc. portfolio manager Alister Hibbert. “There’s a lot of life in the global economy,” Hibbert, said at a Sept. 8 presentation to reporters in London. 1nc no econ war No causal relationship between the economy and war. Ferguson 6 [Niall, MA, D.Phil., is Laurence A. Tisch Professor of History at Harvard University and William Ziegler Professor of Business Administration at Harvard Business School. He is also a Senior Research Fellow at Jesus College, Oxford University, and a Senior Fellow at the Hoover Institution, Stanford University, Foreign Affairs, Sept/Oct, “The Next War of the World”] Nor can economic crises explain the bloodshed. What may be the most familiar causal chain in modern historiography links the Great Depression to the rise of fascism and the outbreak of World War II. But that simple story leaves too much out. Nazi Germany started the war in Europe only after its economy had recovered. Not all the countries affected by the Great Depression were taken over by fascist regimes, nor did all such regimes start wars of aggression. In fact, no general relationship between economics and conflict is discernible for the century as a whole. Some wars came after periods of growth, others were the causes rather than the consequences of economic catastrophe, and some severe economic crises were not followed by wars. No impact—statistics prove Drezner 12 – Daniel is a professor in the Fletcher School of Law and Diplomacy at Tufts. (“The Irony of Global Economic Governance: The System Worked”, October 2012, http://www.globaleconomicgovernance.org/wp-content/uploads/IR-Colloquium-MT12-Week-5_The-Ironyof-Global-Economic-Governance.pdf) The final outcome addresses a dog that hasn’t barked: the effect of the Great Recession on cross-border conflict and violence. During the initial stages of the crisis, multiple analysts asserted that the financial crisis would lead states to increase their use of force as a tool for staying in power.37 Whether through greater internal repression, diversionary wars, arms races, or a ratcheting up of great power conflict, there were genuine concerns that the global economic downturn would lead to an increase in conflict. Violence in the Middle East, border disputes in the South China Sea, and even the disruptions of the Occupy movement fuel impressions of surge in global public disorder. The aggregate data suggests otherwise, however. The Institute for Economics and Peace has constructed a “Global Peace Index” annually since 2007. A key conclusion they draw from the 2012 report is that “The average level of peacefulness in 2012 is approximately the same as it was in 2007.”38 Interstate violence in particular has declined since the start of the financial crisis – as have military expenditures in most sampled countries. Other studies confirm that the Great Recession has not triggered any increase in violent conflict; the secular decline in violence that started with the end of the Cold War has not been reversed.39 Rogers Brubaker concludes, “ the crisis has not to date generated the surge in protectionist nationalism or ethnic exclusion that might have been expected.”40 None of these data suggest that the global economy is operating swimmingly. Growth remains unbalanced and fragile, and has clearly slowed in 2012. Transnational capital flows remain depressed compared to pre-crisis levels, primarily due to a drying up of cross-border interbank lending in Europe. Currency volatility remains an ongoing concern. Compared to the aftermath of other postwar recessions, growth in output, investment, and employment in the developed world have all lagged behind. But the Great Recession is not like other postwar recessions in either scope or kind; expecting a standard “V”-shaped recovery was unreasonable. One financial analyst characterized the post-2008 global economy as in a state of “contained depression.”41 The key word is “contained,” however. Given the severity, reach and depth of the 2008 financial crisis, the proper comparison is with Great Depression. And by that standard, the outcome variables look impressive. As Carmen Reinhart and Kenneth Rogoff concluded in This Time is Different: “that its macroeconomic outcome has been only the most severe global recession since World War II – and not even worse – must be regarded as fortunate.”42 2nc no econ war No war from economic collapse Barnett ’09 (Thomas P.M. Barnett, Thomas P.M. Barnett is an American military geostrategist and Chief Analyst at Wikistrat, 24 Aug 2009, “ The New Rules: Security Remains Stable Amid Financial Crisis”, http://www.worldpoliticsreview.com/articles/4213/the-new-rules-security-remains-stable-amid-financialcrisis) When the global financial crisis struck roughly a year ago, the blogosphere was ablaze with all sorts of scary predictions of, and commentary regarding, ensuing conflict and wars -- a rerun of the Great Depression leading to world war, as it were. Now, as global economic news brightens and recovery -- surprisingly led by China and emerging markets -- is the talk of the day, it's interesting to look back over the past year and realize how globalization's first truly worldwide recession has had virtually no impact whatsoever on the international security landscape. None of the more than threedozen ongoing conflicts listed by GlobalSecurity.org can be clearly attributed to the global recession. Indeed, the last new entry (civil conflict between Hamas and Fatah in the Palestine) predates the economic crisis by a year, and three quarters of the chronic struggles began in the last century. Ditto for the 15 low-intensity conflicts listed by Wikipedia (where the latest entry is the Mexican "drug war" begun in 2006). Certainly, the Russia-Georgia conflict last August was specifically timed, but by most accounts the opening ceremony of the Beijing Olympics was the most important external trigger (followed by the U.S. presidential campaign) for that sudden spike in an almost two-decade long struggle between Georgia and its two breakaway regions. Looking over the various databases, then, we see a most familiar picture: the usual mix of civil conflicts, insurgencies, and liberation-themed terrorist movements. Besides the recent Russia-Georgia dust-up, the only two potential state-on-state wars (North v. South Korea, Israel v. Iran) are both tied to one side acquiring a nuclear weapon capacity -- a process wholly unrelated to global economic trends. And with the United States effectively tied down by its two ongoing major interventions (Iraq and Afghanistan-bleeding-into-Pakistan), our involvement elsewhere around the planet has been quite modest, both leading up to and following the onset of the economic crisis: e.g., the usual counter-drug efforts in Latin America, the usual military exercises with allies across Asia, mixing it up with pirates off Somalia's coast). Everywhere else we find serious instability we pretty much let it burn, occasionally pressing the Chinese -- unsuccessfully -- to do something. Our new Africa Command, for example, hasn't led us to anything beyond advising and training local forces. So, to sum up: *No significant uptick in mass violence or unrest (remember the smattering of urban riots last year in places like Greece, Moldova and Latvia?); *The usual frequency maintained in civil conflicts (in all the usual places); *Not a single state-on-state war directly caused (and no great-power-on-great-power crises even triggered); *No great improvement or disruption in great-power cooperation regarding the emergence of new nuclear powers (despite all that diplomacy); *A modest scaling back of international policing efforts by the system's acknowledged Leviathan power (inevitable given the strain); and *No serious efforts by any rising great power to challenge that Leviathan or supplant its role. (The worst things we can cite are Moscow's occasional deployments of strategic assets to the Western hemisphere and its weak efforts to outbid the United States on basing rights in Kyrgyzstan; but the best include China and India stepping up their aid and investments in Afghanistan and Iraq.) Sure, we've finally seen global defense spending surpass the previous world record set in the late 1980s, but even that's likely to wane given the stress on public budgets created by all this unprecedented "stimulus" spending. If anything, the friendly cooperation on such stimulus packaging was the most notable great-power dynamic caused by the crisis. Can we say that the world has suffered a distinct shift to political radicalism as a result of the economic crisis? Indeed, no. The world's major economies remain governed by center-left or center-right political factions that remain decidedly friendly to both markets and trade. In the short run, there were attempts across the board to insulate economies from immediate damage (in effect, as much protectionism as allowed under current trade rules), but there was no great slide into "trade wars." Instead, the World Trade Organization is functioning as it was designed to function, and regional efforts toward free-trade agreements have not slowed. Can we say Islamic radicalism was inflamed by the economic crisis? If it was, that shift was clearly overwhelmed by the Islamic world's growing disenchantment with the brutality displayed by violent extremist groups such as al-Qaida. And looking forward, austere economic times are just as likely to breed connecting evangelicalism as disconnecting fundamentalism. At the end of the day, the economic crisis did not prove to be sufficiently frightening to provoke major economies into establishing global regulatory schemes, even as it has sparked a spirited -and much needed, as I argued last week -- discussion of the continuing viability of the U.S. dollar as the world's primary reserve currency. Naturally, plenty of experts and pundits have attached great significance to this debate, seeing in it the beginning of "economic warfare" and the like between "fading" America and "rising" China. And yet, in a world of globally integrated production chains and interconnected financial markets, such "diverging interests" hardly constitute signposts for wars up ahead. Frankly, I don't welcome a world in which America's fiscal profligacy goes undisciplined, so bring it on -- please! Add it all up and it's fair to say that this global financial crisis has proven the great resilience of America's post-World War II international liberal trade order. Do I expect to read any analyses along those lines in the blogosphere any time soon? Absolutely not. I expect the fantastic fearmongering to proceed apace. That's what the Internet is for. Terrorism 1nc can’t stop mass surveillance A privacy advocate doesn’t solve mass surveillance Nojeim 13, (Gregory Nojeim is a Senior Counsel at the Center for Democracy & Technology Constitution Center, 11/1/13 “FISA court advocate helpful, but no replacement for ending mass surveillance,” http://blog.constitutioncenter.org/2013/11/fisa-courtadvocate-helpful-but-no-replacement-for-ending-mass-surveillance/) Whatever the truth, several factors erode trust in the FISA Court, the foremost being that it operates secretly and issues important decisions in a one-sided process in which only the government is represented. This inhibits the Court from giving adequate consideration to arguments against surveillance, and leaves the government free to make flawed or unsubstantiated assertions without fear of rebuttal.¶ One-sided FISA Court proceedings has led to the development of an unnatural collaborative relationship between clerks of the court and the Department of Justice lawyers who submit surveillance applications to the FISA Court.¶ In response to this problem, Senator Richard Blumenthal (D-CT) introduced legislation, S.1467, to create an independent Special Advocate within the Executive Branch who would “vigorously [advocate] before the FISA Court or the FISA Court of Review … in support of legal interpretations that minimize the scope of surveillance and the extent of data collection and retention.”¶ The Special Advocate would review every application to the FISA Court, and could ask to participate in any FISA Court proceeding, although the FISA Court has the authority to deny such requests. The Special Advocate could also request that outside parties be granted the ability to file amicus curiae briefs with the Court, or participate in oral arguments. The Special Advocate could also appeal FISA Court decisions – including requests to participate and substantive decisions regarding surveillance applications – to the FISA Court of Review and the Supreme Court. Finally, the Special Advocate could petition for public disclosure of decisions and other relevant documents held by the FISA Court.¶ Picking up on this idea, Senator Ron Wyden (DOR) included a “Constitutional Advocate” in his FISA reform bill, the Intelligence Oversight and Surveillance Reform Act (S. 1551) and Senator Patrick Leahy (D-VT) and Representative James Sensenbrenner (R-WI) included a similar provision in their USA Freedom Act, which was introduced on October 29.¶ Several improvements could strengthen the “ Special Advocate” legislation. First, advocating protection of privacy and civil liberties should be added to the duties of the Office of the Special Advocate. While the current charge to advocate for minimizing the scope of data collection is helpful, sometimes consideration of broader civil liberties interests is appropriate. In addition, the Privacy and Civil Liberties Oversight Board should choose the Special Advocate, rather than selecting a slate of candidates from which the Chief Judge of the FISA Court would choose, as is suggested in the Blumenthal bill. Finally, the Special Advocate, not the FISA Court, should decide in which cases the Special advocate would have a voice. Otherwise, he or she could be barred from participating in most proceedings.¶ Inserting a Special Advocate in FISA Court proceedings – particularly one charged with making those proceedings more transparent – would go some distance toward restoring trust in intelligence surveillance. But, it is no substitute for clearer, more restrictive rules about the information that can be collected for intelligence purposes, particularly when that information pertains to Americans. In other words, having a Special Advocate is no panacea; it is far more important that Congress act to end the bulk collection of metadata about communications. 1nc key to stop terrorism Surveillance works and NSA domestic programs are key Zuckerman, Bucci and Carafano 13 (Jessica, Policy Analyst, Western Hemisphere, Heritage Foundation, Steven P., Director of the Center for Foreign and National Security Policy at the Heritage Foundation, and James Jay, PhD, Vice President for the Institute for National SEcurity and Foreign Policy, "60 Terrorist Plots Since 9/11: Continued Lessons in Domestic Counterterrorism") Strengthening the Domestic Counterterrorism Enterprise¶ Three months after the attack at the Boston Marathon, the pendulum of awareness of the terrorist threat has already begun to swing back, just as it did after 9/11. Due to the resilience of the nation and its people, for most, life has returned to business as usual. The threat of terrorism against the United States, however, remains.¶ Expecting to stop each and every threat that reaches a country’s borders is unreasonable, particularly in a free society committed to individual liberty. Nevertheless, there are important steps that America’s leaders can take to strengthen the U.S. domestic counterterrorism enterprise and continue to make the U.S. a harder target. Congress and the Administration should:¶ Ensure a proactive approach to preventing terrorist attacks. Despite the persistent threat of terrorism, the Obama Administration continues to focus on reactive policies and prosecuting terrorists rather than on proactive efforts to enhance intelligence tools and thwart terrorist attempts. This strategy fails to recognize the pervasive nature of the threat posed by terrorist groups such as al-Qaeda and homegrown extremism. The Administration, and the nation as a whole, should continue to keep in place a robust, enduring, and proactive counterterrorism framework in order to identify and thwart terrorist threats long before the public is in danger.¶ Maintain essential counterterrorism tools. Support for important investigative tools such as the PATRIOT Act is essential to maintaining the security of the U.S. and combating terrorist threats. Key provisions within the act, such as the roving surveillance authority and business records provision, have proved essential for thwarting terror plots, yet they require frequent reauthorization. In order to ensure that law enforcement and intelligence authorities have the essential counterterrorism tools they need, Congress should seek permanent authorization of the three sun setting provisions within the PATRIOT Act.[208] Furthermore, legitimate government surveillance programs are also a vital component of U.S. national security, and should be allowed to continue. Indeed, in testimony before the house, General Keith Alexander, the director of the National Security Agency (NSA), revealed that more than 50 incidents of potential terrorism at home and abroad were stopped by the set of NSA surveillance programs that have recently come under scrutiny. That said, the need for effective counterterrorism operations does not relieve the government of its obligation to follow the law and respect individual privacy and liberty. In the American system, the government must do both equally well.¶ Break down the silos of information. Washington should emphasize continued cooperation and information sharing among federal, state, and local law enforcement agencies to prevent terrorists from slipping through the cracks between the various jurisdictions. In particular, the FBI should make a more concerted effort to share information more broadly with state and local law enforcement. State and local law enforcement agencies are the front lines of the U.S. national security strategy. As a result, local authorities are able to recognize potential danger and identify patterns that the federal authorities may miss. They also take the lead in community outreach, which is crucial to identifying and stopping “lone wolf” actors and other homegrown extremists. Federal law enforcement, on the other hand, is not designed to fight against this kind of threat; it is built to battle cells, groups, and organizations, not individuals.¶ Streamline the domestic counterterrorism system. The domestic counterterrorism enterprise should base future improvements on the reality that governments at all levels are fiscally in crisis. Rather than add additional components to the system, law enforcement officials should streamline the domestic counterterrorism enterprise by improving current capabilities, leveraging state and local law enforcement resources and authorities, and, in some cases, reducing components where the terrorist threat is not high and the financial support is too thin or could be allocated more effectively. For example, the Department of Homeland Security should dramatically reduce the number of fusion centers, many of which exist in lowrisk areas or areas where similar capabilities exist. An easy way to reduce the number of fusion centers is to eliminate funding to those that are located outside the 31 urban areas designated as the highest risk.¶ Fully implement a strategy to counter violent extremism. Countering violent extremism is an important complementary effort to an effective counterterrorism strategy. In August 2011, the U.S. government released a strategic plan called “Empowering Local Partners to Prevent Violent Extremism in the United States.”[209] The plan focuses on outlining how federal agencies can assist local officials, groups, and private organizations in preventing violent extremism. It includes strengthening law enforcement cooperation and helping communities understand how to counter extremist propaganda (particularly online). Sadly, this plan is not a true strategy. It fails to assign responsibilities and does not direct action or resource investments. More direction and leadership must be applied to transform a laundry list of good ideas into an effective program to support communities in protecting and strengthening civil society.¶ Vigilance Is Not Optional¶ In a political environment of sequestration on the one hand and privacy concerns on the other, there are those on both sides of the aisle who argue that counterterrorism spending should be cut and U.S. intelligence agencies reigned in. As the above list indicates however, the long war on terrorism is far from over . Most disturbingly, an increasing number of Islamistinspired terrorist attacks are originating within America’s borders. The rise of homegrown extremism is the next front in the fight against terrorism and should be taken seriously by the Administration.¶ While there has not been another successful attack on the homeland on the scale of 9/11, the bombings in Boston reminded the country that the threat of terrorism is real and that continued vigilance is critical to keeping America safe. Congress and the Administration must continue to upgrade and improve the counterterrorism capabilities of law enforcement and intelligence agencies as well exercise proper oversight of these capabilities. The American people are resilient, but the lesson of Boston is that the government can and should do more to prevent future terror attacks. 2nc key to stop terrorism NSA mass surveillance is critical –to combating terror Wittes 14 (Benjamin, Senior Fellow @ the Brookings Institute, April 8th 2014, "Is Al Qaeda Winning: Grading the Administration's Counter terrorism Policy, Brookings Institute) As I said at the outset of this statement, the question of intelligence collection under Section 702 of the FAA may seem connected to the AUMF’s future in only the most distant fashion. In fact, the connection between intelligence collection authorities and the underlying regime authorizing the conflict itself is a critical one. Good intelligence is key to any armed conflict and good technical intelligence is a huge U.S. strength in the fight against Al Qaeda. Yet ironically, the more one attempts to narrow the conflict, the more important technical intelligence becomes. The fewer boots on the ground we have in Afghanistan, for example, the greater our reliance will become on technical collection. The more we rely on drone strikes, rather than large troop movements, in areas where we lack large human networks, the more we rely on technical intelligence. Particularly if one imagines staying on offense against a metastasizing Al Qaeda in the context of a withdrawal from Afghanistan and a narrowing—or a formal end—of the AUMF conflict, the burden on technical intelligence collection to keep us in the game will be huge even ignoring the many other foreign intelligence and national security interests Section 702 surveillance supports.¶ Section 702 is a complicated statute, and it is only one part of a far more complicated, larger statutory arrangement. But broadly speaking, it permits the NSA to acquire without an individualized warrant the communications of non-US persons reasonably believed to be overseas when those communications are transiting the United States or stored in the United States. Under these circumstances, the NSA can order production of such communications from telecommunications carriers and internet companies under broad programmatic orders issued by the Foreign Intelligence Surveillance Court (FISC), which reviews both targeting and minimization procedures under which the collection then takes place. Oversight is thick, both within the executive branch, and in reporting requirements to the congressional intelligence committees.¶ Make no mistake: Section 702 is a very big deal in America’s counterterrorism arsenal. It is far more important than the much debated bulk metadata program, which involves a few hundred queries a year. Section 702 collection, by contrast, is vast, a hugely significant component not only of contemporary counterterrorism but of foreign intelligence collection more generally. In 2012, the Senate Select Committee on Intelligence wrote that “[T]he authorities provided [under section 702] have greatly increased the government’s ability to collect information and act quickly against important foreign intelligence targets. . . . [ The] failure to reauthorize [section 702] would ‘result in a loss of significant intelligence and impede the ability of the Intelligence Community to respond quickly to new threats and intelligence opportunities.’”[8] The President’s Review Group on Intelligence and Communications Technologies, after quoting this language, wrote that “Our own review is not inconsistent with this assessment. . . . [ W]e are persuaded that section 702 does in fact play an important role in the nation’s effort to prevent terrorist attacks across the globe.”[9] The Washington Post has reported that 702 was in 2012 the single most prolific contributor to the President’s Daily Brief.[10] 1nc no cyber terror No impact to cyber terror –countries don’t react Libicki, 13 – Senior Management Scientist at the RAND Corporation and a Visiting Professor at the U.S. Naval Academy (Martin, “Cyberwar Fears Pose Dangers of Unnecessary Escalation,” Rand Corporation, 7/15/13, http://www.rand.org/pubs/periodicals/rand-review/issues/2013/summer/cyberwar-fears-pose-dangers-of-unnecessaryescalation.html)//schnall cyberwar may not be seen as it actually is, and states may react out of fear rather than reflection. An action that one side perceives as innocuous may be seen as nefarious by the other. For all these reasons, Fortunately, mistakes in cyberspace do not have the potential for catastrophe that mistakes in the nuclear arena do. Unfortunately, that fact may prevent leaders from exercising although the systemic features of cyber crises lend themselves to resolution (there is little pressure to respond quickly, and there are grounds for giving the other side some benefit of the doubt), the fretful perceptions of cyberoperations as they opaquely unfold may drive participants toward conflict. Cautionary Guidelines To manage crises and forestall their escalation in cyberspace, the their normal caution in crisis circumstances. Paradoxically, following seven points may be usefully kept in mind. The first is to understand that the answer to the question — Is this cyberattack an act of war? — is a decision, not a Even if cyberwar can be used to disrupt life on a mass scale, it cannot be used to occupy another nation's capital. It cannot force regime change. No one has yet died from it. A cyberattack, in and of itself, does not demand an immediate response to safeguard national security. The victim of a cyberattack could declare that it was an act of war and then go forth and fight — or the victim could look at policies that reduce the pain without so much risk, such as by fixing or forgoing software or network connections whose vulnerabilities permitted the cyberattack in the first place. Second is to take the time to think conclusion. things through. Unlike with nuclear war, a nation's cyberwar capabilities cannot be disarmed by a first strike. There is not the same need to get the jump on the other guy — or to match his offense with your offense when it is your defense that dictates how much damage you are likely to receive. Third is to understand what is at stake — which is to say, With cyberattack, what you are trying to prevent is not the initial attack but the next attack, the effects of which might be larger than the initial attack but might also be smaller. (The latter what you hope to gain. is particularly true if the initial attack teaches the victims that, say, making industrial controls accessible to the Internet may not have been the smartest idea.) Fourth is not to take It is common, these to emphasize the cost and consequences of a cyberattack as a national calamity possession of the crisis unnecessarily. That is, do not back yourself into a corner where you always have to respond, whether doing so is wise or not. days, . Having created a demand among the public to do something, the government is then committed to doing something even when doing little or nothing is called for. Emphasizing the pain from a cyberattack fostering the impression that a great country can bear the pain of cyberattacks, keep calm, and carry on reduces the temptation. Fifth is to craft a narrative that can take the crisis also fuels the temptation of others to induce such pain. Conversely, where you want it to go. Narratives are morality plays in which events take their designated place in the logical and moral scheme of things: "We are good, you are bad"; "we are strong and competent, unless we have stumbled temporarily because of your evil." Narratives also have to find a role for the attacker, and the development of such a role may, in the odds that an attack in cyberspace arises from miscalculation, inadvertence, unintended consequences, or rogue actors are nontrivial. Perhaps more than any other form of combat, cyberwar is storytelling — appropriately for a form of conflict that means some cases, encourage the attacker's graceful and face-saving retreat from belligerence. After all, to alter information. Sixth is to figure out what norms of conduct in cyberspace, if any, work best. In March 2013, the United States and China agreed to carry out high-level talks useful norms are those that can be monitored before any war starts. These include norms that pledge nations to cooperate in investigating cybercrimes, that sever bonds between a state and its hackers or commercially oriented cybercriminals, and that frown deeply on espionage on networks that support critical public services (such as electrical power). Working toward useful norms may well help reduce the likelihood of a crisis, but it would be unrealistic to believe on cyber norms. Particularly that they can eliminate the possibility. No cyberterrorism- technological complexity and lack of publicity Covert 15 (Edwin, 1/13/15, InfoSec Institute, “Cyber Terrorism: Complexities and Consequences,” Edwin is a cybersecurity professional and works for Booz Allen Hamilton, http://resources.infosecinstitute.com/cyber-terrorism-complexities-consequences/) While a terrorist using the Internet to bring down the critical infrastructures the United States relies on makes an outstanding Hollywood plot, there are flaws in the execution of this storyline as an actual terrorist strategy. Conway (2011) calls out three limitations on using cyber-related activities for terrorists: Technological complexity, image, and accident (Against Cyberterrorism, 2011, p. 27).∂ Each is important to consider. While critical infrastructures may make a tempting target and threat actor capabilities are certainly increasing (Nyugan, 2013), it is a complicated process to attack something of that magnitude. It is precisely the interconnectedness of these two disparate parts that make them a target, however.∂ Nyugan (2013) calls them cyber-physical systems (CPS): “A physical system monitored or controlled by computers. Such systems include, for example, electrical grids, antilock brake systems, or a network of nuclear centrifuges” (p. 1084).∂ In Verton’s (2003) imaginary narrative, the target of the Russian hackers, the SCADA system, is a CPS. However, Lewis (2002) argues the relationship between vulnerabilities in critical infrastructures (such as MAE-East) and computer network attacks is not a clear cut as first thought (p. 1). It is not simply a matter of having a computer attached to a SCADA system and thus the system is can now be turned off and society goes in a free fall of panic and explosions and mass chaos.∂ The first idea Conway (2011) posits reduces to the notion that information technology is difficult in most cases. There are reasons it takes veritable armies of engineers and analysts to make these complex systems interact and function as intended. However, there are a limited number of terrorists with the necessary computer skills to conduct a successful attack (pp. 2728).∂ Immediately the argument turns to hiring external assistance from actual computer hackers (as most journalists and Hollywood scriptwriters do). Conway (2011) dismisses that idea, correctly, as a significant compromise of operational security (p. 28).∂ The US Department of Defense as defines operational security, or OPSEC:∂ A process of identifying critical information and analyzing friendly actions attendant to military operations and other activities to: identify those actions that can be observed by adversary intelligence systems; determine indicators and vulnerabilities that adversary intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries, and determine which of these represent an unacceptable risk; then select and execute countermeasures that eliminate the risk to friendly actions and operations or reduce it to an acceptable level (US Department of Defense, 2012). ∂ In the context of this paper, letting outside profit-motivated technicians into the planning and execution phase of a terrorist plot would be risky for conservative-minded individuals such a religious terrorists (Hoffman, 2006). As the number of people who are aware of a plot increases, the potential number of people who can leak operational details of the plot increases exponentially.∂ It is for this reason Verton’s (2003) scenario is most improbable.∂ The second concern Conway (2011) notes is one of audience. Recalling the definition of terrorist put forth by Hoffman (2006), terrorists need to generate publicity to achieve their goals: they need to create a climate of fear through violence or the threat of violence. Simply attacking something and having no one notice it is not an operational success for a terrorist. Terrorists need to have their grievances known (Nacos, 2000, p. 176).∂ The terrorist act needs to be witnessed, such as the planes crashing into the World Trade Center or the hostage taking in Munich. in order to generate the necessary level of discourse to affect the goals the terrorist has in mind. Unfortunately, injecting code into a DNS server or shutting down Amazon.com does not generate the required intensity of chaos modern terrorists require (Conway, Against Cyberterrorism, 2011, p. 28).∂ This leads to Conway’s (2011) third point: the accident. The United States relies heavily on computer and information systems. However, if a system goes offline in today’s world, users are just as likely to suspect a system failure or accident as anything else is (p. 28). Even if they attack, easy to stop Cluley 14 (Graham, 10/20/14, The State of Security, “GCHQ Spokesperson Says Cyber Terrorism Is ‘Not a Concern’,” former employee of Sophos, McAfee, Dr. Solomon’s, inducted into the InfoSecurity Europe Hall of Fame, http://www.tripwire.com/state-ofsecurity/security-data-protection/gchq-spokesperson-says-cyber-terrorism-is-not-a-concern/, 7/17/15, SM) Yes, a terrorist could launch a denial-of-service attack, or write a piece of malware, or hack into a sensitive system, just as easily as the next (non-terrorist), but there is no reason to believe that an attack launched by a terrorist living in his secret HQ in the mountain caves of Afghanistan would be any harder to stop than the hundreds of thousands of other attacks launched each day. ∂ That’s not to say that launching an Internet attack wouldn’t have attractive aspects for those behind a terror campaign. Put bluntly, it’s a heck lot easier (and less physically dangerous) to write a Trojan horse to infect a computer on the other side of the world, than to drive a lorry loaded up with Semtex outside a government building’s front door.∂ Furthermore, terrorists are often interested in making headlines, to focus the world’s attention on what they believe to be their plight. If innocent people die during a terrorist action that certainly does help you make the newspapers, but it’s very bad for public relations, and is going to make it a lot harder to convince others to sympathise with your campaign.∂ The good news about pretty much all Internet attacks, of course, is that they don’t involve the loss of life. Any damage done is unlikely to leave individuals maimed or bleeding, but can still bloody the nose of a government that should have been better protected or potentially disrupt economies.∂ But still, such terrorist-initiated Internet attacks should be no harder to protect against than the financially-motivated and hacktivist attacks that organisations defend themselves against every day.∂ So, when a journalist asks me if I think cyber terrorism is a big concern, I tend to shrug and say “Not that much” and ask them to consider why Al Qaeda, for instance, never bothered to launch a serious Internet attack in the 13 years since September 11.∂ After all, if it is something for us all to fear – why wouldn’t they have done it already?∂ So, I was pleased to have my views supported last week – from a perhaps surprising source.∂ GCHQ, the UK intelligence agency which has become no stranger to controversy following the revelations of NSA whistleblower Edward Snowden, appears to agree that cyber terrorism is not a concern. Or at least that’s what they’re saying behind closed doors, according to SC Magazine.∂ Part of SC Magazine story on cyber terrorism∂ The report quoted an unnamed GCHQ spokesperson at a CSARN (City Security And Resilience Networks) forum held last week in London, debunking the threat posed by cyber terrorists:∂ “Quite frankly we don’t see cyber terrorism. It hasn’t occurred…but we have to guard against it. For those of you thinking about strategic threats, terrorism is not [a concern] at this point in time,” although he added that the agency was ‘very concerned’ on a possible attack at the time of the 2012 London Olympics. ∂ ∂ He said that while it is clear that terrorism groups – such as ISIS and Al-Qaeda – are technically-adept, there’s been no sign of them venturing to cyber beyond promotional purposes.∂ ∂ “For some reason, there doesn’t seem intent to use destructive cyber capability. It’s clearly a theoretical threat. We’ve not seen – and we were very worried around London Olympics – but we’ve never seen it. We’ll continue to keep an eye on it.” ∂ In a time when the potential threat posed by terrorism is often used as an excuse for covert surveillance by intelligence agencies, such as GCHQ, and the UK government raising the “threat level” to “Severe” at the end of August due to conflict in Iraq and Syria, one has to wonder if the spokesperson quoted was speaking entirely “on-message.” 2nc no cyberterror No cyberterrorism— too expsensive Chen 14 (Thomas, June 2014, Strategic Studies Institute and US Army War College, “Cyberterrorism After Stuxnet,” professor of cybersecurity @ the School of Engineering and Mathematical Sciences at City University London, http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB1211.pdf) WHY NOT A MAJOR CYBERATTACK∂ Having established motive, means, and opportunity∂ for terrorists, the natural question is why a major∂ cyberattack has not happened yet. It seems that al-Qaeda∂ and other terrorist groups still prefer bombs and∂ physical attacks, even after Stuxnet.35 In the absence of∂ an attack, a case could be argued that cyberterrorism∂ is more of a hypothetical threat than a real one.36 However,∂ there is debate about whether an actual cyberattack∂ by terrorists has happened.37 No major attacks∂ have occurred, according to the public record, some∂ observers have speculated that attacks have happened∂ but have been kept confidential so as not to disclose∂ weaknesses in the national infrastructure. ∂ 21∂ In 2007, Denning postulated three indicators that∂ could precede a successful cyberterrorism attack:38 ∂ 1. Failed cyberattacks against critical infrastructures,∂ such as ICS. Unlike the case with the professionally∂ developed Stuxnet, Denning expected that∂ the first cyberterrorist attack would likely be unsuccessful, ∂ considering that even terrorist kinetic attacks∂ frequently fail.∂ 2. Research and training labs, where terrorists∂ simulate their cyberattacks against targets, test attack∂ tools, and train people. Israel reportedly had centrifuges∂ at its Dimona complex to test Stuxnet on.∂ 3. Extensive discussions and planning relating∂ to attacks against critical infrastructures, not just∂ websites.∂ So far, none of these indicators has been observed,∂ which would imply that terrorists are not trying hard∂ to prepare for cyberattacks.∂ Conway has argued against the likelihood of cyberterrorism∂ in the near future.39 Her argument consists∂ of these reasons:∂ • Violent jihadis’ IT knowledge is not superior.∂ • Real-world attacks are difficult enough.∂ • Hiring hackers would compromise operational∂ security.∂ • For a true terrorist event, spectacular moving∂ images are crucial.∂ • Terrorists will not favor a cyberattack with the∂ potential to be hidden, portrayed as an accident,∂ or otherwise remaining unknown.∂ Perhaps the most straightforward explanation of∂ the lack of observed cyberattacks is the cost-benefit∂ argument put forth by Giacomello.40 He compared the ∂ 22∂ costs of traditional physical terrorist attacks with cyberattacks∂ of the “break things and kill people” type.∂ Specifically, Giacomello estimated the costs of three∂ cyberterrorism scenarios aimed at the power grid; a∂ hydroelectric dam; and an air traffic control system. If∂ the power grid was viewed as an unlikely target, fatalities∂ will be indirect or accidental. For a hydroelectric∂ dam, the cost is based on a historical incident of an∂ insider sabotaging the controls at the dam. Somewhat∂ arbitrarily, the estimate assumed two proficient hackers∂ with supporting personnel, totaling up to $1.3 million.∂ For an air traffic control system, a higher number∂ of skilled hackers are needed to compromise the∂ system, prevent the air controllers from detecting and∂ responding to the intrusion, and defeat built-in safety∂ mechanisms. Again, it is not explicitly stated, but a∂ year of work seems to be assumed, since the total is∂ based on a year’s salary. The resulting estimated cost∂ was up to $3 million.∂ For comparison, Giacomello pointed out that the∂ World Trade Center bomb cost only $400 to build,∂ yet, it injured 1,000 people and caused $550 million of∂ physical damages. The March 2004 attacks in Madrid,∂ exploding 10 simultaneous bombs on four commuter∂ trains using mining explosives and cellphones, cost∂ about $10,000 to carry out. The 9/11 Commission Report∂ stated that the 9/11 attacks cost between $400,000 ∂ and $500,000 to plan and execute.41∂ An examination of these comparative costs makes∂ it clear that bombs are a much cheaper approach than∂ cyberattacks by orders of magnitude. Stuxnet, estimated∂ to have cost millions of dollars, does not change∂ the cost-benefit comparison. At the present time and∂ in the near future, cyberattacks of the “break things∂ and kill people” type require an enormous amount of ∂ 23∂ effort by highly skilled experts. In contrast, bombs can∂ be made cheaply and deployed without skilled effort.∂ In addition, physical attacks are appealing because of∂ the higher certainty of success. 1nc no nuclear terror Uniqueness is for cyber attack coming while the impact card is about a nuclear bomb blowing up in New York. Not real sure how they get to that impact No risk of nuclear terrorism---too many obstacles John J. Mearsheimer 14, R. Wendell Harrison Distinguished Service Professor of Political Science at the University of Chicago, “America Unhinged”, January 2, nationalinterest.org/article/america-unhinged-9639?page=show Am I overlooking the obvious threat that strikes fear into the hearts of so many Americans, which is terrorism? Not at all. Sure, the United States has a terrorism problem . But it is a minor threat . There is no question we fell victim to a spectacular attack on September 11, but it did not cripple the United States in any meaningful way and another attack of that magnitude is highly unlikely in the foreseeable future. Indeed, there has not been a single instance over the past twelve years of a terrorist organization exploding a primitive bomb on American soil, much less striking a major blow. Terrorism—most of it arising from domestic groups—was a much bigger problem in the United States during the 1970s than it has been since the Twin Towers were toppled.¶ What about the possibility that a terrorist group might obtain a nuclear weapon? Such an occurrence would be a game changer, but the chances of that happening are virtually nil . No nuclear-armed state is going to supply terrorists with a nuclear weapon because it would have no control over how the recipients might use that weapon. Political turmoil in a nuclear-armed state could in theory allow terrorists to grab a loose nuclear weapon, but the United States already has detailed plans to deal with that highly unlikely contingency.¶ Terrorists might also try to acquire fissile material and build their own bomb. But that scenario is extremely unlikely as well : there are significant obstacles to getting enough material and even bigger obstacles to building a bomb and delivering it. country has a profound interest in making sure no terrorist group acquires a nuclear weapon, because they cannot be sure they will not be the target of a nuclear attack, either by the terrorists or another country the terrorists strike. then More generally, virtually every Nuclear terrorism, in short, is not a serious threat . And to the extent that we should worry about it, the main remedy is to encourage and help other states to place nuclear materials in highly secure custody. Terrorism doesn’t pose an existential risk Fettweis, Professor of Political Science, ‘10 Chris, Professor of Political Science @ Tulane,Threat and Anxiety in US Foreign Policy, Survival, 52:2 Even terrorists equipped with nuclear, biological or chemical weapons would be incapable of causing damage so cataclysmic that it would prove fatal to modern states. Though the prospect of terrorists obtaining and using such weapons is one of the most consistently terrifying scenarios of the new era, it is also highly unlikely and not nearly as dangerous as sometimes portrayed. As the well-funded, well-staffed Aum Shinrikyo cult found out in the 1990s, workable forms of weapons of mass destruction are hard to purchase, harder still to synthesise without state help, and challenging to use effectively. The Japanese group managed to kill a dozen people on the Tokyo subway system at rush hour. While tragic, the attack was hardly the stuff of apocalyptic nightmares. Superweapons are simply not easy for even the most sophisticated non-state actors to use.31 If terror- ists were able to overcome the substantial obstacles and use the most destructive weapons in a densely populated area, the outcome would of course be terrible for those unfortunate enough to be nearby. But we should not operate under the illusion that doomsday would arrive. Modern industrialised countries can cope with disasters, both natural and man-made. As unpleasant as such events would be, they do not represent existential threats. 2nc nuclear terror No risk of nuclear terrorism---too many obstacles John J. Mearsheimer 14, R. Wendell Harrison Distinguished Service Professor of Political Science at the University of Chicago, “America Unhinged”, January 2, nationalinterest.org/article/america-unhinged-9639?page=show Am I overlooking the obvious threat that strikes fear into the hearts of so many Americans, which is terrorism? Not at all. Sure, the United States has a terrorism problem . But it is a minor threat . There is no question we fell victim to a spectacular attack on September 11, but it did not cripple the United States in any meaningful way and another attack of that magnitude is highly unlikely in the foreseeable future. Indeed, there has not been a single instance over the past twelve years of a terrorist organization exploding a primitive bomb on American soil, much less striking a major blow. Terrorism—most of it arising from domestic groups—was a much bigger problem in the United States during the 1970s than it has been since the Twin Towers were toppled.¶ What about the possibility that a terrorist group might obtain a nuclear weapon? Such an occurrence would be a game changer, but the chances of that happening are virtually nil . No nuclear-armed state is going to supply terrorists with a nuclear weapon because it would have no control over how the recipients might use that weapon. Political turmoil in a nuclear-armed state could in theory allow terrorists to grab a loose nuclear weapon, but the United States already has detailed plans to deal with that highly unlikely contingency.¶ Terrorists might also try to acquire fissile material and build their own bomb. But that scenario is extremely unlikely as well : there are significant obstacles to getting enough material and even bigger obstacles to building a bomb and delivering it. country has a profound interest in making sure no terrorist group acquires a nuclear weapon, because they cannot be sure they will not be the target of a nuclear attack, either by the terrorists or another country the terrorists strike. then More generally, virtually every Nuclear terrorism, in short, is not a serious threat . And to the extent that we should worry about it, the main remedy is to encourage and help other states to place nuclear materials in highly secure custody. 1nc no retaliation No retaliation or escalation Mueller 5 (John, Professor of Political Science – Ohio State University, Reactions and Overreactions to Terrorism, http://polisci.osu.edu/faculty/jmueller/NB.PDF) However, history clearly demonstrates that overreaction is not necessarily inevitable. Sometimes, in fact, leaders have been able to restrain their instinct to overreact. Even more important, restrained reaction--or even capitulation to terrorist acts--has often proved to be entirely acceptable politically. That is, there are many instances where leaders did nothing after a terrorist attack (or at least refrained from overreacting) and did not suffer politically or otherwise. Similarly, after an unacceptable loss of American lives in Somalia in 1993, Bill Clinton responded by withdrawing the troops without noticeable negative impact on his 1996 re-election bid. Although Clinton responded with (apparently counterproductive) military retaliations after the two U.S. embassies were bombed in Africa in 1998 as discussed earlier, his administration did not have a notable response to terrorist attacks on American targets in Saudi Arabia (Khobar Towers) in 1996 or to the bombing of the U.S.S. Cole in 2000, and these non-responses never caused it political pain. George W. Bush's response to the anthrax attacks of 2001 did include, as noted above, a costly and wasteful stocking-up of anthrax vaccine and enormous extra spending by the U.S. Post Office. However, beyond that, it was the same as Clinton's had been to the terrorist attacks against the World Trade Center in 1993 and in Oklahoma City in 1995 and the same as the one applied in Spain when terrorist bombed trains there in 2004 or in Britain after attacks in 2005: the dedicated application of police work to try to apprehend the perpetrators. This approach was politically acceptable even though the culprit in the anthrax case (unlike the other ones) has yet to be found. The demands for retaliation may be somewhat more problematic in the case of suicide terrorists since the direct perpetrators of the terrorist act are already dead, thus sometimes impelling a vengeful need to seek out other targets. Nonetheless, the attacks in Thus, despite short-term demands that some sort of action must be taken, experience suggests politicians can often successfully ride out this demand after the obligatory (and inexpensive) expressions of outrage are prominently issued. Lebanon, Saudi Arabia, Great Britain, and against the Cole were all suicidal, yet no direct retaliatory action was taken. Solvency 1nc ineffective Even if advocate is constitutional-the question undermines effectiveness Doyle and Kumar 14 (MICHAEL DOYLE AND ANITA KUMAR 1/20/14 MCCLATCHY WASHINGTON BUREAU “No one is sure how public advocate at spy”¶ ://www.mcclatchydc.com/news/nation-world/national/nationalsecurity/article24761953.html) Serious questions shadow President Barack Obama’s proposal to add a public advocate to the secret court that oversees surveillance programs. The public advocate, Obama says, would provide an “independent voice in significant cases” before the Foreign Intelligence Surveillance Court. The details, though, remain sketchy even as some of the administration’s own lawyers wonder about the wisdom of it all.¶ The questions include: How will the advocates be appointed? What surveillance cases will merit their participation? How much power will they have? And, not least: Does the Constitution allow them?¶ Obama's proposal echoed ideas that legal scholars and others have raised in recent years.¶ “There are both practical and legal concerns with a special advocate,” Robert Litt, the general counsel of the Office of the Director of National Intelligence, told the Privacy and Civil Liberties Oversight Board, a government panel, in November.¶ Obama offered the public advocate proposal, along with others designed to address surveillance and spying controversies, on Friday. A number of the proposals, such as the one for a public advocate, left up to Congress or the Justice Department the job of filling in the blanks. Skeptics abound.¶ “The advocate proposal is simply a cosmetic attempt to make up an appearance, without substance, of an adversarial proceeding,” said Carl Messineo, the legal director of the Partnership for Civil Justice, a liberal advocacy group.¶ The nonpartisan Congressional Research Service said in a report last October that the “novel” public advocate proposal raises “several difficult questions of constitutional law” that ultimately might undermine the advocate’s authority. The former chief of the surveillance court, Judge John D. Bates, cautioned lawmakers in a letter last week that a public advocate is “unnecessary and could prove counterproductive in the vast majority” of surveillance court matters.¶ 2nc ineffective Privacy advocate doesn’t fix surveillance problems Woodhouse 13 (Leighton Woodhouse 8/10/13 partner and co-founder of Dog Park Media, a creative agency that focuses on video production and graphic design, journalist and independent producer “NSA Surveillance Needs More than Window Dressing Reform” http://www.huffingtonpost.com/leighton-woodhouse/nsa-surveillance-needs-mo_b_3735707.html) Yesterday, President Obama repeated what has become a familiar routine: after two months of bad press on a controversial issue, he made a grand gesture of conceding that his critics may have a point, even while largely holding to his increasingly untenable position, and announced a series of "reforms" that amount, at the end of the day, to window dressing. It was an even less persuasive version of his performance than his pretense of holding Wall Street accountable for the crimes that led to the economic meltdown.¶ Obama's declared reforms of the massive and opaque government surveillance programs that have dramatically expanded on his watch are as follows:¶ Set up a toothless committee to make non-binding recommendations months in the future, once it's safe to ignore them.¶ Hire a privacy officer in the NSA whom few in the agency will take seriously, possibly including the privacy officer him/herself.¶ Appoint a privacy advocate to the FISA Court, and pretend that he/she is a reasonable stand-in for a truly adversarial court system.¶ None of these measures will come close to dealing with the serious Constitutional issues at stake in the continued existence of the government's surveillance regime. Short of scrapping the NSA and the FISA Court (FISC) altogether, nothing less than an about-face on the administration's position on the public's right to challenge the legal basis of the surveillance programs will even begin to bring government spying into line with the Constitution. 1nc circumvention Reforms fail – the NSA will circumvent Greenwald 14 (Glenn, lawyer, journalist and author – he founded the Intercept and has contributed to Salon and the Guardian, named by Foreign Policy as one of the Top 100 Global Thinkers of 2013, “CONGRESS IS IRRELEVANT ON MASS SURVEILLANCE. HERE’S WHAT MATTERS INSTEAD”, https://firstlook.org/theintercept/2014/11/19/irrelevance-u-s-congressstopping-nsas-mass-surveillance/) All of that illustrates what is, to me, the most important point from all of this: the last place one should look to impose limits on the powers of the U.S. government is . . . the U.S. government . Governments don’t walk around trying to figure out how to limit their own power, and that’s particularly true of empires . The entire system in D.C. is designed at its core to prevent real reform. This Congress is not going to enact anything resembling fundamental limits on the NSA’s powers of mass surveillance. Even if it somehow did, this White House would never sign it. Even if all that miraculously happened, the fact that the U.S. intelligence community and National Security State operates with no limits and no oversight means they’d easily co-opt the entire reform process . That’s what happened after the eavesdropping scandals of the mid-1970s led to the establishment of congressional intelligence committees and a special FISA “oversight” court—the committees were instantly captured by putting in charge supreme servants of the intelligence community like Senators Dianne Feinstein and Chambliss, and Congressmen Mike Rogers and “Dutch” Ruppersberger, while the court quickly became a rubber stamp with subservient judges who operate in total secrecy. Ever since the Snowden reporting began and public opinion (in both the U.S. and globally) began radically changing, the White House’s strategy has been obvious. It’s vintage Obama: Enact something that is called “reform”—so that he can give a pretty speech telling the world that he heard and responded to their concerns—but that in actuality changes almost nothing, thus strengthening the very system he can pretend he “changed.” That’s the same tactic as Silicon Valley, which also supported this bill: Be able to point to something called “reform” so they can trick hundreds of millions of current and future users around the world into believing that their communications are now safe if they use Facebook, Google, Skype and the rest. In pretty much every interview I’ve done over the last year, I’ve been asked why there haven’t been significant changes from all the disclosures. I vehemently disagree with the premise of the question, which equates “U.S. legislative changes” with “meaningful changes.” But it has been clear from the start that U.S. legislation is not going to impose meaningful limitations on the NSA’s powers of mass surveillance, at least not fundamentally. T-Curtail 1nc shell Curtail means reduce or limit Merriam-Webster 15 © 2015 Merriam-Webster, Incorporated http://www.merriam-webster.com/dictionary/curtail Curtail verb cur·tail \(ˌ)kər-ˈtāl\ : to reduce or limit (something) Full Definition of CURTAIL transitive verb : to make less by or as if by cutting off or away some part <curtail the power of the executive branch> <curtail inflation> Violation: voting aff doesn’t mandate a surveillance reduction Advocate doesn’t have to stop surveillance Carr 13 (James G. Carr a federal district judge for the United States District Court for the Northern District of Ohio. 7/22/13 “A Better Secret Court”http://www.nytimes.com/2013/07/23/opinion/a-better-secret-court.html?_r=0) James Robertson, a retired federal judge who served with me on the FISA court, recently called for greater transparency of the court’s proceedings. He has proposed the naming of an advocate, with high-level security clearance, to argue against the government’s filings. He suggested that the Privacy and Civil Liberties Oversight Board, which oversees surveillance activities, could also provide a check. I would go even further.¶ In an ordinary criminal case, the adversarial process assures legal representation of the defendant. Clearly, in top-secret cases involving potential surveillance targets, a lawyer cannot, in the conventional sense, represent the target.¶ Congress could, however, authorize the FISA judges to appoint, from time to time, independent lawyers with security clearances to serve “pro bono publico” — for the public’s good — to challenge the government when an application for a FISA order raises new legal issues.¶ During my six years on the court, there were several occasions when I and other judges faced issues none of us had encountered before. A staff of experienced lawyers assists the court, but their help was not always enough given the complexity of the issues.¶ The low FISA standard of probable cause — not spinelessness or excessive deference to the government — explains why the court has so often granted the Justice Department’s requests. But rapid advances in technology have outpaced the amendments to FISA, even the most recent ones, in 2008.¶ Having lawyers challenge novel legal assertions in these secret proceedings would result in better judicial outcomes. Even if the government got its way all or most of the time, the court would have more fully developed its reasons for letting it do so. Of equal importance, the appointed lawyer could appeal a decision in the government’s favor to the Foreign Intelligence Surveillance Court of Review — and then to the Supreme Court. Reasons to prefer: Limits- the aff could do a small legal change which explodes the topic Ground- core negative ground for the topic are predicated off of the affirmative reducing surveillance not a small legal change Topicality is a voting issue for education and fairness At best makes the Fx T-the plan may not reduce surveillance Independent voter for fairness and competitive equity- if we win that the plan doesn’t guarantee ruling against the government then voting aff doesn’t mandate topical action. Interp Cards Curtail is to reduce or limit Cambridge 15 (Definition of curtail from the Cambridge Academic Content Dictionary © Cambridge University Press) http://dictionary.cambridge.org/us/dictionary/american-english/curtail) Curtail verb [T] us /kərˈteɪl/ › to reduce or limit something, or to stop something before it is finished: He had to curtail his speech when time ran out. Curtail means reduce or limit something Macmillan 15 Macmillan Dictionary 2015 http://www.macmillandictionary.com/us/dictionary/american/curtail curtail - definition and synonyms Using the thesaurus verb [transitive] formal curtail pronunciation in American English /kɜrˈteɪl/Word Forms Contribute to our Open Dictionary to reduce or limit something, especially something good a government attempt to curtail debate Synonyms and related words To limit or control something or someone:draw a line in the sand, limit, control... Explore Thesaurus Synonyms and related words To reduce something:salami-slice, top-slice, cut back... Explore Thesaurus Politics 1nc link FISA reforms are unpopular with republican and cost PC Gross 6/5/15 (Grant Gross covers technology and telecom policy in the U.S. government for the IDG News Service 6/5/15 “Don't expect major changes to NSA surveillance from Congress” http://www.pcworld.com/article/2932337/dont-expect-majorchanges-to-nsa-surveillance-from-congress.html) The USA Freedom Act also does nothing to limit the NSA’s surveillance of overseas Internet traffic, including the content of emails and IP voice calls. Significantly limiting that NSA program, called Prism in 2013 Snowden leaks, will be a difficult task in Congress, with many lawmakers unconcerned about the privacy rights of people who don’t vote in U.S. elections.¶ Still, the section of the Foreign Intelligence Surveillance Act that authorizes those NSA foreign surveillance programs sunsets in 2017, and that deadline will force Congress to look at FISA, although lawmakers may wait until the last minute, as they did with the expiring sections of the Patriot Act covered in the USA Freedom Act.¶ The House Judiciary Committee will continue its oversight of U.S. surveillance programs, and the committee will address FISA before its provisions expire, an aide to the committee said. ¶ Republican leaders opposed to more changes¶ Supporters of new reforms will have to bypass congressional leadership, however. Senate Republican leaders attempted to derail even the USA Freedom Act and refused to allow amendments that would require further changes at the NSA.¶ In the House, Republican leaders threatened to kill the USA Freedom Act if the Judiciary Committee amended the bill to address other surveillance programs. Still, many House members, both Republicans and Democrats, have pushed for new surveillance limits, with lawmakers adding an amendment to end so-called backdoor government searches of domestic communications to a large appropriations bill this week.¶ Obama’s administration has threatened to veto the appropriations bill for several unrelated reasons, but several House members have pledged to push hard to prohibit the FBI and CIA from searching the content of reportedly tens of thousands of U.S. communications swept up in an NSA surveillance program targeting overseas terrorism suspects.¶ Closing that surveillance backdoor is a top priority for civil liberties groups, said Neema Singh Guliani, a legislative counsel with the American Civil Liberties Union’s Washington, D.C., legislative office. “We’ve had this statute that masquerades as affecting only people abroad, but the reality is that it sweeps up large numbers of U.S. persons,” she said.¶ Other changes possible¶ Advocates and lawmakers will also push for a handful of other surveillance reforms in the coming months. The changes most likely to pass make limited changes to surveillance programs, however. ¶ While not tied to NSA surveillance, lawmakers will press for changes to the 29-year-old Electronic Communications Privacy Act (ECPA), a wiretap law that gives law enforcement agencies warrantless access to emails and other communications stored in the cloud for more than six months. A House version of ECPA reform counts more than half the body as co-sponsors.¶ Still, tech companies and civil liberties groups have been pushing since 2010 to have those communications protected by warrants, but law enforcement agencies and some Republican lawmakers have successfully opposed the changes .¶ Another bill that may gain traction in coming months is the Judicial Redress Act, a bill that would allow citizens of some countries to file lawsuits under the U.S. Privacy Act if government agencies misuse their records. ¶ “The Privacy Act offers limited protections, even to Americans, but passage of this bill would be an important first step to addressing especially European concerns that US privacy reforms won’t help them,” said Berin Szoka, president of free market think tank TechFreedom. ¶ Public pressure, along with potentially new leaks, will be the key to driving any more surveillance changes, advocates said. ¶ “The public will for mass surveillance laws was made very clear recently, and that’s partly why we saw much of Congress flock to whatever could be called surveillance reform,” said Tiffiniy Cheng, a founder of digital rights group Fight for the Future. “No one is fooled by USA Freedom— it’s a weak piece of legislation that uses exceptions in legislative language to codify the NSA’s practice of surveilling most people.”¶ Congress has much work left to do, Cheng said by email. “After the recent showdown and public outcry, USA Freedom is at best, seen as a beginning of surveillance reform, not the end,” she said. Block link Obama will fight to maintain NSA surveillance through FISA Ackerman 6/9 (Spencer Ackerman: National security editor for Guardian, “Obama lawyers asked secret court to ignore public court's decision on spying”, The Guardian, 6/9/2015, http://www.theguardian.com/world/2015/jun/09/obama-fisa-courtsurveillance-phone-records) The Obama administration has asked a secret surveillance court to ignore a federal court that found bulk surveillance illegal and to once again grant the National Security Agency the power to collect the phone records of millions of Americans for six months.¶ The legal request, filed nearly four hours after Barack Obama vowed to sign a new law banning precisely the bulk collection he asks the secret court to approve, also suggests that the administration may not necessarily comply with any potential court order demanding that the collection stop.¶ US officials confirmed last week that they would ask the Foreign Intelligence Surveillance court – better known as the Fisa court, a panel that meets in secret as a step in the surveillance process and thus far has only ever had the government argue before it – to turn the domestic bulk collection spigot back on. McConnell will inevitably make any NSA collection reform bill a huge fightPATRIOT Act proves Kim 5/17 (Seung Min Kim: An assistant editor who covers Congress for POLITICO. Previously, she edited the Arena and served as a Web producer, “Time crunch pushes Senate to edge of surveillance cliff,” 5/17/15, http://www.politico.com/story/2015/05/senate-cliff-nsa-patriot-transportation-trade-recess-118040.html, Accessed: 7/16/15, RRR) The overwhelming 338-88 House vote last week ending the NSA’s bulk collection programs — though phone companies would still keep the data that could later be tapped in smaller amounts for terrorism investigations — puts considerable pressure on Senate Majority Leader Mitch McConnell (R-Ky.), who is demanding a straight reauthorization of the current bulk collection methods until 2020.¶ “I think it is an important tool if we’re going to have the maximum opportunity to defend our people here at home, and I don’t think the House bill does that,” McConnell said of the NSA program Sunday on ABC’s “This Week.” “I think it basically leads us to the end of the program.”¶ But McConnell, Senate Intelligence Committee Chairman Richard Burr (R-N.C.) and other GOP proponents of retaining the NSA bulk collection program are running into resistance from Democrats and libertarian-leaning Republicans, as well as a bipartisan vow to filibuster even a short-term reauthorization of the PATRIOT Act powers.