Terrorism DA

advertisement
Terrorism Disadvantage
NAUDL 2015-16
Glossary
Terrorism Disadvantage
Glossary ..................................................................................................................................... 2
1NC Terrorism Disadvantage ................................................................................................... 3
Internal Links
Surveillance increasing now .................................................................................................... 6
Surveillance prevents terrorist plots ....................................................................................... 7
Surveillance is necessary for timely response..................................................................... 10
Surveillance allows meta-data intelligence .......................................................................... 11
Surveillance creates bulk intelligence .................................................................................. 12
Surveillance uncovers terrorist financing............................................................................. 13
Financing is key to terrorist efforts ....................................................................................... 16
Surveillance solves Al Qaeda sleeper cells .......................................................................... 17
Answer to: Surveillance fails at solving a terrorist attack ................................................... 18
Specific Links
Immigration Surveillance prevents terrorism ....................................................................... 21
NSA Reform makes finding terrorists harder ....................................................................... 24
Terrorism is the most important security threat .................................................................. 26
Terrorism kills ......................................................................................................................... 27
Preventing terrorism more important than privacy concerns ............................................. 28
Answer to: Terrorist attack is unlikely .................................................................................. 29
Answer to: Terrorists aren’t a threat ..................................................................................... 30
Answers to: ISIS is a Threat ................................................................................................... 31
Al Qaeda is a threat ................................................................................................................. 32
AQAP is a threat ...................................................................................................................... 33
Affirmative Answers
Surveillance does not solve terror plots ............................................................................... 34
Intelligence gathering does not matter ................................................................................. 39
Financial data tracking does not matter ............................................................................... 40
Terrorist attack isn’t a national security threat .................................................................... 41
Terrorist attack is unlikely ...................................................................................................... 42
ISIS is not a threat ................................................................................................................... 43
1
Terrorism Disadvantage
NAUDL 2015-16
Glossary
Glossary
NSA – The National Security Agency – this is a government agency that is responsible for
monitoring, collection, and processing of information for foreign intelligence. The NSA was one of
the agencies exposed by Edward Snowden in 2013 as an agency conducting surveillance on
domestic (and foreign) populations for counter-terror efforts
SIGINT – Signal intelligence – this is a type of intelligence that is largely collected by the NSA.
SIGINT is the process of collecting telecommunication data for counter-intelligence purposes
Bulk Surveillance – this is the collection of massive amounts of telecommunication information that
isn’t all individual monitored, but bits and pieces are collected and pieced together by computer
systems to monitor certain activity
AUMF – The Authorization for Use of Military Force – this is a piece of legislation signed by
congress after the attacks of 9/11 and authorizes the use of United States Armed Forces against
those responsible for the attacks on September 11, 2001. The authorization granted
the President the authority to use all "necessary and appropriate force" against those whom he
determined "planned, authorized, committed or aided" the September 11th attacks, or who harbored
said persons or groups.
Al Qaeda – Al Qaeda is one of the largest terrorist networks in the world that is a radical
fundamentalist group often held responsible for the 9/11 attacks. They have networks operating all
across the globe in various countries in Africa, Europe and Central Asia.
AQAP – Al Qaeda in the Arabian Peninsula – it is considered one of Al Qaeda’s most active
branches and operates primarily in Yemen and Saudi Arabia
ISIS – The Islamic State of Iraq – this is an extremist terrorist organization that occupies territory in
Syria and Iraq. While many folks that subscribe to Islam denounce the activities of ISIS, they are
held responsible for war crimes, genocide, and massive ethnic cleansing in the region and are one
of the most active terrorist groups attempting to retaliate against the United States
2
Terrorism Disadvantage
NAUDL 2015-16
1NC Frontline
1NC Terrorism Disadvantage
A. Domestic surveillance activities are expanding with no expectation to decline
Dahl, Assistant Professor at Nataval Postgraduate School, 2011
Erik. “Domestic Intelligence Today: More Security but Less Liberty?.” Homeland Security Affairs 7,
10 Years After: The 9/11 Essays (September 2011). https://www.hsaj.org/articles/67
Unless the threat situation changes dramatically, we are not likely to see a new American
domestic intelligence agency anytime soon. In the place of an “American MI-5,” however, a
huge and expensive domestic intelligence system has been constructed. This system has
thus far succeeded in keeping America safer than most experts would have predicted ten
years ago, but it has also reduced civil liberties in ways that many Americans fail to understand.
Precisely because it was unplanned and is decentralized, this domestic intelligence system has not
received the oversight it deserves. In the long run, American liberty as well as security will gain
from a fuller discussion of the benefits and risks of homeland security intelligence.
B. Curtailing domestic surveillance prevents intelligence agencies from stopping a terrorist
attack – this is empirically true
Inserra, Research Associate from the Heritage Foundation, 2015
("68th Terrorist Plot Calls for Major Counterterrorism Reforms,"
www.heritage.org/research/reports/2015/05/68th-terrorist-plot-calls-for-major-counterterrorismreforms
This 68th Islamist terrorist plot or attack is the 57th homegrown terrorist attack or plot and
the 10th targeting a mass gathering, the third most common target. The attack also comes as
part of a recent wave of attacks and plots, as this is the sixth Islamist terrorist plot or attack
in 2015. All of the plots and attacks this year have been perpetrated by individuals who claim
to support the Islamic State to varying degrees. The FBI has stated that Simpson wanted to
commit jihad with ISIS, and press reports indicate that he may have been in secret communications
with ISIS members.[6]
Regardless, with these attacks and the increasing numbers of individuals in the U.S. seeking
to support or join ISIS and al-Qaeda affiliates, the U.S. is currently facing what is arguably
the most concentrated period of terrorist activity in the homeland since 9/11. Director James
Comey of the FBI has recent warned that “hundreds, maybe thousands” of individuals across
the U.S. are being directly solicited by ISIS and urged to attack. Other senior officials, including
Secretary of Homeland Security Jeh Johnson, the Director of National Intelligence James Clapper,
and the director of the National Counterterrorism Center Nicholas Rasmussen have also noted the
increasing threat of terrorism here at home.[7]
Strengthening the Counterterrorism Enterprise
In light of these warnings, the U.S. cannot be passive. Heritage has recommended numerous
counterterrorism policies for Congress to address, including:
3
Terrorism Disadvantage
NAUDL 2015-16
1NC Frontline
[The Evidence Continues]
Streamlining U.S. fusion centers. Congress should limit fusion centers to the approximately 30
areas with the greatest level of risk as identified by the Urban Area Security Initiative (UASI). Some
exceptions might exist, such as certain fusion centers that are leading cybersecurity or other
important topical efforts. The remaining centers should then be fully funded and resourced by UASI.
Pushing the FBI toward being more effectively driven by intelligence. While the FBI has
made high-level changes to its mission and organizational structure, the bureau is still
working to integrate intelligence and law enforcement activities. This will require overcoming
cultural barriers and providing FBI intelligence personnel with resources, opportunities, and
the stature they need to become a more effective and integral part of the FBI.
Ensuring that the FBI shares information more readily and regularly with state and local law
enforcement and treats state and local partners as critical actors in the fight against terrorism. State,
local, and private-sector partners must send and receive timely information from the FBI. The
Department of Homeland Security (DHS) should play a role in supporting these partners’ efforts by
acting as a source or conduit for information to partners and coordinating information sharing
between the FBI and its partners.
Designating an office in DHS to coordinate countering violent extremism (CVE) efforts. CVE efforts
are spread across all levels of government and society. DHS is uniquely situated to lead the federal
government’s efforts to empower local partners. Currently, DHS’s CVE working group coordinates
efforts across DHS components, but a more substantial office will be necessary to manage this
broader task.
Supporting state, local, and civil society partners. Congress and the Administration should not lose
sight of the fact that all of the federal government’s efforts must be focused on empowering local
partners. The federal government is not the tip of the spear for CVE efforts; it exists to support local
partners who are in the best position to recognize and counter radicalization in their own
communities.
Maintaining essential counterterrorism tools. Support for important investigative tools is
essential to maintaining the security of the U.S. and combating terrorist threats. Legitimate
government surveillance programs are also a vital component of U.S. national security and
should be allowed to continue. The need for effective counterterrorism operations, however, does
not relieve the government of its obligation to follow the law and respect individual privacy and
liberty. In the American system, the government must do both equally well.
4
Terrorism Disadvantage
NAUDL 2015-16
1NC Frontline
1NC Terrorism Disadvantage
C. An attack on US soil is imminent and this inflicts suffering and death against innocent
people
Kephart, Researcher at Center for Immigration Studies, 2005 [Janice Kephart, Moving Beyond
the 9/11 Staff Report on Terrorist Travel, http://cis.org/articles/2005/kephart.html]
Al Qaeda operatives discussed here were strategically positioned throughout the United
States -- often in places not previously associated with terrorist activity, such as Peoria and
Chicago, Illinois; Columbus, Ohio; Baltimore, Maryland, and its suburbs; Seattle, Washington;
Portland, Oregon; Minneapolis, Minnesota; and upstate New York. A couple of al Qaeda operatives
covered in this report are still at large and currently unindicted, including Adnan Shukrijumah and
Aafia Siddiqui, yet are included here because they are high on the FBI's list for questioning and
spent long periods of time in the United States. The lists found throughout this report (under
immigration benefit subject headings at the end of each section) begin with Mir Aimal Kansi, who
in January 1993 opened fire outside CIA headquarters in McLean, Virginia; the most recent
cases, from 2004, involve the surveillance cases in New York City; in Charlotte, North Carolina;
Nashville, Tennessee; Las Vegas, Nevada; and southern California. All told, 21 of these terrorists
committed five attacks against U.S. interests causing a total of 3,341 deaths and 8,463
injuries; 29 were involved in 12 unexecuted plots. Five hijackers from 9/11 had clear
immigration violations, while one (Marwan Al-Shehhi), had a possible violation; thus, 13
hijackers are not included in the chart below. I do not discuss the 9/11 plotters in this report or other
earlier terrorists in detail, as each is covered in 9/11 and Terrorist Travel. In 47 instances,
immigration benefits sought or acquired prior to 9/11 enabled the terrorists to stay in the
United States after 9/11 and continue their terrorist activities. This includes three terrorists
whose visas or entries into the United States were on 9/2/01, 9/6/01 and 9/10/01. In three instances,
terrorists sought immigration benefits after 9/11. One political asylee associated with the 9/11
hijackers was denied and deported after having previous immigration violations. The second
managed to maintain his student status in the United States through mid-2002. A third gained legal
permanent residency status in 2002. Although each of these 94 terrorists had committed an
immigration violation of some kind, criminal charges alone were brought in at least 37
instances and immigration charges in 18. Indictments in 50 cases included both immigration and
criminal charges. There have been a total of 15 deportations and 23 criminal convictions. In 16
instances, individuals were not convicted (e.g., the six 9/11 hijackers), are being held as an enemy
combatant (e.g., Khalid Sheikh Mohammed), or have fled the United States (e.g., Anwar Al-Aulaqi,
an imam associated with the 9/11 hijackers and believed to be now in Yemen.)
5
Terrorism Disadvantage
NAUDL 2015-16
Uniqueness
Surveillance increasing now
(__)
(__) FBI terrorism surveillance activities are increasing now and effective in the status quo
Dahl, Assistant Professor at Nataval Postgraduate School, 2011
Erik. “Domestic Intelligence Today: More Security but Less Liberty?.” Homeland Security Affairs 7,
10 Years After: The 9/11 Essays (September 2011). https://www.hsaj.org/articles/67
The FBI is expanding its domestic intelligence and surveillance operations in other ways, as
well. It is changing its own internal rules to give its agents more leeway to conduct
investigations and surveillance, such as by searching databases or sorting through a
person’s trash.35 And it appears to be making greater use of undercover informants in
intelligence investigations, leading in some cases to successful arrests and prosecutions,
but in others to controversy.36
(__) Newest government reports show surveillance is increasing by the government and is
effective
Gilens, ACLU Speech, Privacy and Technology Project, 2012
(Naomi, ACLU, "New Justice Department Documents Show Huge Increase in Warrantless
Electronic Surveillance," https://www.aclu.org/blog/new-justice-department-documents-show-hugeincrease-warrantless-electronic-surveillance
Justice Department documents released today by the ACLU reveal that federal law
enforcement agencies are increasingly monitoring Americans’ electronic communications,
and doing so without warrants, sufficient oversight, or meaningful accountability. The
documents, handed over by the government only after months of litigation, are the attorney
general’s 2010 and 2011 reports on the use of “pen register” and “trap and trace” surveillance
powers. The reports show a dramatic increase in the use of these surveillance tools, which
are used to gather information about telephone, email, and other Internet communications.
The revelations underscore the importance of regulating and overseeing the government’s
surveillance power. (Our original Freedom of Information Act request and our legal complaint are
online.)
(__) Data shows electronic surveillance is on the rise
Gilens, ACLU Speech, Privacy and Technology Project, 2012
(Naomi, ACLU, "New Justice Department Documents Show Huge Increase in Warrantless
Electronic Surveillance," https://www.aclu.org/blog/new-justice-department-documents-show-hugeincrease-warrantless-electronic-surveillance
Electronic Surveillance Is Sharply on the Rise The reports that we received document an
enormous increase in the Justice Department’s use of pen register and trap and trace
surveillance. As the chart below shows, between 2009 and 2011 the combined number of
original orders for pen registers and trap and trace devices used to spy on phones increased
by 60%, from 23,535 in 2009 to 37,616 in 2011.
6
Terrorism Disadvantage
NAUDL 2015-16
Links
Surveillance prevents terrorist plots
(__)
(__) Domestic surveillance solves terrorist plots – since 9/11, the NSA program has prevent
50 homeland threats
New York Times, 2013
(Charlie Savage, "N.S.A. Chief Says Surveillance Has Stopped Dozens of Plots,"
www.nytimes.com/2013/06/19/us/politics/nsa-chief-says-surveillance-has-stopped-dozens-ofplots.html?_r=0)
WASHINGTON — Top national security officials on Tuesday promoted two newly
declassified examples of what they portrayed as “potential terrorist events” disrupted by
government surveillance. The cases were made public as Congress and the Obama
administration stepped up a campaign to explain and defend programs unveiled by recent
leaks from a former intelligence contractor.
One case involved a group of men in San Diego convicted of sending money to an extremist
group in Somalia. The other was presented as a nascent plan to bomb the New York Stock
Exchange, although its participants were not charged with any such plot. Both were described by
Sean Joyce, deputy director of the Federal Bureau of Investigation, at a rare public oversight
hearing by the House Intelligence Committee.
At the same hearing, Gen. Keith B. Alexander, the head of the National Security Agency, said
that American surveillance had helped prevent “potential terrorist events over 50 times since
9/11,” including at least 10 “homeland-based threats.” But he said that a vast majority of the
others must remain secret.
7
Terrorism Disadvantage
NAUDL 2015-16
Links
Surveillance prevents terrorist plots
(__)
(__) Limiting surveillance prevents the government from accessing critical information to
prevent a terrorist attack on US soil
Bergen et al, Director of the National Security Program at the New America Foundation, 2014
(Peter, "DO NSA'S BULK SURVEILLANCE PROGRAMS STOP TERRORISTS?,"
https://static.newamerica.org/attachments/1311-do-nsas-bulk-surveillance-programs-stopterrorists/IS_NSA_surveillance.pdf
June 5, 2013, the Guardian broke the first story in what would become a flood of revelations
regarding the extent and nature of the NSA’s surveillance programs. Facing an uproar over the
threat such programs posed to privacy, the Obama administration scrambled to defend them as
legal and essential to U.S. national security and counterterrorism. Two weeks after the first
leaks by former NSA contractor Edward Snowden were published, President Obama defended the
NSA surveillance programs during a visit to Berlin, saying: “We know of at least 50 threats
that have been averted because of this information not just in the United States, but, in some
cases, threats here in Germany. So lives have been saved.” Gen. Keith Alexander, the
director of the NSA, testified before Congress that: “the information gathered from these
programs provided the U.S. government with critical leads to help prevent over 50 potential
terrorist events in more than 20 countries around the world.” Rep. Mike Rogers (R-Mich.),
chairman of the House Permanent Select Committee on Intelligence, said on the House floor
in July that “54 times [the NSA programs] stopped and thwarted terrorist attacks both here
and in Europe – saving real lives.”
8
Terrorism Disadvantage
NAUDL 2015-16
Links
Surveillance prevents terrorist plots
(__)
(__) Domestic surveillance data mining capabilities prevents a terrorist attack before it is too
late
Yoo, Professor at University of California- Berkeley Law School, 2007
(John, "THE TERRORIST SURVEILLANCE PROGRAM AND THE CONSTITUTION," SSRN)
It seems that critics are mostly interested in blindly limiting the powers of the government,
even as it fights a tough war. They presume the American government to be acting in bad
faith, and so all of its activities must be treated with the highest possible level of suspicion.
Meanwhile, data mining technology and databases are exploding in the private sector.121 It
would be ironic if al Qaeda and private individuals were permitted greater legal access to
new data technology than our own government, especially in wartime. Overreaction and plain
scare tactics killed TIA, a potentially valuable tool to counter al Qaeda’s offensive within the
United States.122 It made little sense to cut off TIA at the research and development stage
out of sheer anti-government paranoia. There was no chance to see what computer technology
could even do, no discussion of whether adequate safeguards for privacy could be installed, and no
opportunity to evaluate whether data mining would yield leads on terrorist activity that would
be worth any costs to privacy. No analysis could be done on the legal issues. Perhaps worst of
all, we could never explore the ways that computers could be used to protect privacy. Data mining
scans many perfectly innocent transactions and activities, but this in itself does not make
the search illegal; even searches of homes and businesses or wiretaps with warrants will
encounter many items or communications that are not linked to criminal activity.123 The
understandable concern is that much innocent activity will come under scrutiny by data (discussing
the need for an attenuated probable cause requirement in the national security context,
because “intelligence officers will often not have a good idea . . . what they are looking for”)..
21 mining, unless controlled in some way by a warrant requirement.124 But if computers are
doing the primary scanning, privacy might not be implicated because no human eyes would
ever have seen the data.125 Only when the computer programs highlight individuals who fit
parameters that reasonably suggest further study for terrorist links—say a young man who
has traveled from Ohio to Pakistan several times, has taken flight lessons in the U.S., has
received large deposits of cash wired into his account from abroad, and has purchased
equipment that could be used for bomb-making—would a human intelligence officer view the
records
9
Terrorism Disadvantage
NAUDL 2015-16
Links
Surveillance is necessary for timely response
(__)
(__) The plan prevents a swift and timely response to a terrorist attack – domestic
surveillance is key to act upon attacks on the US before it is too late
Yoo, Professor at University of California- Berkeley Law School, 2007
(John, "THE TERRORIST SURVEILLANCE PROGRAM AND THE CONSTITUTION," SSRN)
Yet, when Congress delegates broad authority to the President to defend the nation from
attack, critics demand that Congress list every power it wishes to authorize.192 While the
threats to individual liberty may be greater in this setting, it makes little sense to place
Congress under a heavier burden to describe every conceivable future contingency that
might arise when we are fighting a war, perhaps the most unpredictable and certainly most
dangerous of human endeavors. Rather, we would expect and want Congress to delegate
power to that branch, Executive, which is best able to act with speed to combat threats to
our national security.193 War is too difficult to plan for with fixed, antecedent legislative
rules, and war also is better run by the executive, which is structurally designed to take
quick, decisive action. If the AUMF authorized the President to detain and kill the enemy,194
the ability to search for them is necessarily included.
10
Terrorism Disadvantage
NAUDL 2015-16
Links
Surveillance allows meta-data intelligence
(__)
(__) Domestic surveillance is necessary for the collection of meta-data. This data is critical to
stopping terrorist plots
Lewis, Fellow at the Center for Strategic and International Studies Fellow, 2014,
(James A. "Underestimating Risk in the Surveillance Debate,"
csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf)
NSA carried out two kinds of signals intelligence programs: bulk surveillance to support
counterterrorism and collection to support U.S. national security interests. The debate over
surveillance unhelpfully conflated the two programs. Domestic bulk collection for
counterterrorism is politically problematic, but assertions that a collection program is
useless because it has not by itself prevented an attack reflect unfamiliarity with intelligence.
Intelligence does not work as it is portrayed in films—solitary agents do not make startling
discoveries that lead to dramatic, last-minute success. Success is the product of the efforts of
teams of dedicated individuals from many agencies, using many tools and techniques,
working together to assemble fragments of data from many sources into a coherent picture.
In practice, analysts must simultaneously explore many possible scenarios. A collection
program contributes by not only what it reveals, but also what it lets us reject as false. The
Patriot Act Section 215 domestic bulk telephony metadata program provided information that
allowed analysts to rule out some scenarios and suspects. The consensus view from interviews
with current and former intelligence officials is that while metadata collection is useful, it is the least
useful of the collection programs available to the intelligence community. If there was one
surveillance program they had to give up, it would be 215, but this would not come without
an increase in risk. Restricting metadata collection will make it harder to identify attacks and
increase the time it takes to do this
11
Terrorism Disadvantage
NAUDL 2015-16
Links
Surveillance creates bulk intelligence
(__)
(__) NSA surveillance use bulk collection as key piece to the intelligence puzzle
stopping terrorist plots
Lewis, Fellow at the Center for Strategic and International Studies Fellow, 2014,
(James A. "Underestimating Risk in the Surveillance Debate,"
csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf)
NSA carried out two kinds of signals intelligence programs: bulk surveillance to support
counterterrorism and collection to support U.S. national security interests. The debate over
surveillance unhelpfully conflated the two programs. Domestic bulk collection for
counterterrorism is politically problematic, but assertions that a collection program is
useless because it has not by itself prevented an attack reflect unfamiliarity with intelligence.
Intelligence does not work as it is portrayed in films—solitary agents do not make startling
discoveries that lead to dramatic, last-minute success. Success is the product of the efforts of
teams of dedicated individuals from many agencies, using many tools and techniques,
working together to assemble fragments of data from many sources into a coherent picture.
In practice, analysts must simultaneously explore many possible scenarios. A collection
program contributes by not only what it reveals, but also what it lets us reject as false. The
Patriot Act Section 215 domestic bulk telephony metadata program provided information that
allowed analysts to rule out some scenarios and suspects. The consensus view from interviews
with current and former intelligence officials is that while metadata collection is useful, it is the least
useful of the collection programs available to the intelligence community. If there was one
surveillance program they had to give up, it would be 215, but this would not come without
an increase in risk. Restricting metadata collection will make it harder to identify attacks and
increase the time it takes to do this
12
Terrorism Disadvantage
NAUDL 2015-16
Links
Surveillance uncovers terrorist financing
(__)
(__) Domestic surveillance capabilities are key to find terrorist organizations and freeze their
assets
Lormel, Chief of Financial Crimes, FBI, 2002,
(Dennis, Testimony Before the House Committee on Financial Services, Subcommittee on
Oversight and Investigations, www.fbi.gov/news/testimony/financing-patterns-associated-with-alqaeda-and-global-terrorist-networks
As a participant on the National Security Council's Policy Coordinating Committee (PCC) on terrorist
financing, chaired by Treasury Department General Counsel David Aufhauser, the FRG continues
to function in a leadership role in the efforts to target Non-Governmental Organizations
(NGOs) believed to provide financial support to known Foreign Terrorist Organizations (FTO)
and other affiliated terrorist cells. The FRG is currently actively involved in the coordination of
twelve multi-jurisdictional NGO investigations. In order to disrupt the terrorist financing
channels, the FRG has coordinated these and other FBI terrorist investigations with the
terrorist designation and asset freezing efforts of the Department of Treasury's Office of Foreign
Assets Control (OFAC) and Operation Green Quest. These efforts have resulted in the freezing
of millions of dollars in foreign and U.S. bank accounts. Specifically, the joint efforts
targeting Al-Barakaat, the Holy Land Foundation for Relief and Development, the Global
Relief Foundation, and the Benevolence International Foundation have resulted in the
execution of numerous search warrants and the disruption of the fund-raising and money
remittance operations of these and other NGOs. Financial investigations of these entities
have revealed that approximately $200 million in contributions passed through these
organizations each year. The FRG will also coordinate with the Department of the Treasury in its
other initiatives in order to help ensure their success.
13
Terrorism Disadvantage
NAUDL 2015-16
Links
Surveillance uncovers terrorist financing - extension
(__)
(__) Finance and money are the lifeblood to terrorist efforts – the plan prevents the
governments ability to dismantle terrorist groups
Lormel, Chief of Financial Crimes, FBI, 2002,
(Dennis, Testimony Before the House Committee on Financial Services, Subcommittee on
Oversight and Investigations, www.fbi.gov/news/testimony/financing-patterns-associated-with-alqaeda-and-global-terrorist-networks
Identifying, tracking, and dismantling the financial structure supporting terrorist groups is
critical to successfully dismantling the organization and preventing future terrorist attacks.
As is the case in so many types of criminal investigations, identifying and "following the
money" plays a critical role in identifying those involved in the criminal activity, establishing
links among them, and developing evidence of their involvement in the activity. In the early
stages of the investigation into the events of September 11, it was financial evidence that
quickly established direct links among the hijackers of the four flights and helped identify
co-conspirators.
14
Terrorism Disadvantage
NAUDL 2015-16
Links
Surveillance uncovers terrorist financing- extension
(__)
(__) Domestic surveillance is critical to terrorism financing
Yoo, Professor at University of California- Berkeley Law School, 2007
(John, "THE TERRORIST SURVEILLANCE PROGRAM AND THE CONSTITUTION," SSRN)
Data mining is the best hope for an innovative counter-terrorism strategy to detect and
prevent future al Qaeda attacks. Rather than hope an agent will one day penetrate al Qaeda’s
inner circles—a dubious possibility—or that we will successfully seal our vast borders from
terrorists, data mining would allow us to see patterns of activity that reveal the al Qaeda
network’s activity before it can attack.92 Computerized pattern analysis could quickly reveal
whether anyone linked to al Qaeda made large purchases of chemicals or equipment that
could be used for explosives or chemical weapons. We could learn whether they traveled
regularly to certain cities, and we could discover where they stayed and who they called in
those cities. As civil libertarians complain, almost all transactions of this nature—calling,
emailing, spending money, traveling—are innocent.93 We engage in them every day. That is
exactly why al Qaeda has trained its operatives to use them as tools to conceal their plots.94
Al Qaeda’s leaders understand the difficulty in analyzing billions of transactions and
interactions every day to detect their cells, and they realize that western societies impose
legal obstacles on government access to such information.95 Civil libertarian critics don’t seem
to have noticed that our government already employs modest forms of data mining to track down
criminals and terrorists. In response to drug cartels and organized crime, our government has
used simple data mining to track and analyze money flows for years.96 Banks and financial
institutions provide records of financial transactions to the Department of the Treasury, which
searches the patterns for money laundering activity.97 While the great majority of the
transactions are legal, the information can piece together proof of criminal links after a
conspiracy has been stopped, or it can help indicate suspicious activity that demands
further investigation.98 Analyzing money flows has also proven to be an important tool in
detecting and breaking up terrorist networks.99 If civil libertarians are right, consumers
would also have an absolute right to privacy over their banking transactions and our
government would lose this valuable, commonsense tool to combat crime, as well as
terrorism. Two examples illustrate this point: (1) the NSA’s use of phone records and (2) the
Total Information Awareness program.
15
Terrorism Disadvantage
NAUDL 2015-16
Links
Financing is key to terrorist efforts
(__)
(__) Financing is the key to terrorist efforts to launch an attack on US soil
Lormel, Chief of Financial Crimes, FBI, 2002,
(Dennis, Testimony Before the House Committee on Financial Services, Subcommittee on
Oversight and Investigations, www.fbi.gov/news/testimony/financing-patterns-associated-with-alqaeda-and-global-terrorist-networks
Cutting off the financial lifeblood of individuals and organizations responsible for acts of
terrorism is a vital step in dismantling the organization and preventing future terrorist acts.
The FBI is leading law enforcement efforts to accomplish this mission. The USA PATRIOT
Act has provided law enforcement with powerful new tools to assist in accomplishing this
mission. The FBI welcomes the opportunity to work with this Subcommittee and others to
ensure that law enforcement efforts can be the most effective. I would welcome any questions
you may have at this time. Thank you.
16
Terrorism Disadvantage
NAUDL 2015-16
Links
Surveillance solves Al Qaeda sleeper cells
(__)
(__) Domestic Surveillance is key to combat necessary to track and thwart Al Qaeda sleeper
cells
Yoo, Professor at University of California- Berkeley Law School, 2007
(John, "THE TERRORIST SURVEILLANCE PROGRAM AND THE CONSTITUTION," SSRN)
These privacy concerns are exaggerated. The Supreme Court has found that such
information does not receive Fourth Amendment protection because the consumer has
already voluntarily turned over the information to a third party.108 It is not covered by FISA
because no electronic interception or surveillance of the calls has occurred.109 Meanwhile, the
data is potentially of enormous use in frustrating al Qaeda plots. If our agents are pointed to
members of an al Qaeda sleeper cell by a U.S. phone number found in a captured al Qaeda
leader’s cell phone, call pattern analysis would allow the NSA to determine the extent of the
network and its activities.110 It could track the sleeper cell as it periodically changed phone
numbers.111 This could give a quick, initial database-generated glimpse of the possible size
and activity level of the cell in an environment where time is of the essence
17
Terrorism Disadvantage
NAUDL 2015-16
Links
Answer to: Surveillance fails at solving a terrorist attack
(__)
(__) Surveillance capabilities are an integral part to preventing a terrorist attack – it’s the
foundation of all other counter-terror capabilities
The Guardian, May 10, 2015
("Intelligence leaders cite Texas attack before deadline on NSA surveillance,"
www.theguardian.com/us-news/2015/may/10/nsa-surveillance-domestic-texas-isis
“This threat is like finding a needle in a haystack and it’s going to get worse, not better,”
McCaul added. “I think the threat environment today is one of the highest I have ever seen.”
Controversial NSA powers to monitor suspicious communication by collecting all American
phone records are due to expire at the end of the month, a circumstance that was
dramatically complicated by a US appeal court judgment on Thursday ruling the practice first
revealed by Edward Snowden to be unlawful. A number of lawmakers warned on Sunday the
Garland attack showed why it was essential Congress face down opposition to the so-called
“bulk collection” programme and reauthorise the original Patriot Act provision, despite
Thursday’s legal challenge. “I hope that the reality of the situation, the reality of the threats we
face, will actually play a great part in terms of exactly how Congress responds,” Senate
homeland security chairman Ron Johnson told CNN. “Our first line of defence is an effective
intelligence-gathering capability,” the Wisconsin Republican added. “I think the demagoguery
and the revelations of Edward Snowden have done a great deal of harm to our ability to
gather that information.” Richard Burr, Republican chair of the Senate intelligence committee,
also insisted the Patriot Act provision should be reauthorised rather than amended when it expires
on 1 June. “It’s very effective at keeping America safe,” he told ABC, claiming the alternative
USA Freedom Act, which would rely on phone companies to keep records rather than the
NSA, “turns us back to pre-9/11” days.
18
Terrorism Disadvantage
NAUDL 2015-16
Links
Answer to: Surveillance fails at solving a terrorist attack
(__)
(__) The utility of domestic surveillance in combatting terrorism is empirically proven – there
have been over 50 plots thwarted since 9/11
New York Times, 2013
(Charlie Savage, "N.S.A. Chief Says Surveillance Has Stopped Dozens of Plots,"
www.nytimes.com/2013/06/19/us/politics/nsa-chief-says-surveillance-has-stopped-dozens-of-plots.html?_r=0)
WASHINGTON — Top national security officials on Tuesday promoted two newly
declassified examples of what they portrayed as “potential terrorist events” disrupted by
government surveillance. The cases were made public as Congress and the Obama
administration stepped up a campaign to explain and defend programs unveiled by recent
leaks from a former intelligence contractor.
One case involved a group of men in San Diego convicted of sending money to an extremist
group in Somalia. The other was presented as a nascent plan to bomb the New York Stock
Exchange, although its participants were not charged with any such plot. Both were described by
Sean Joyce, deputy director of the Federal Bureau of Investigation, at a rare public oversight
hearing by the House Intelligence Committee.
At the same hearing, Gen. Keith B. Alexander, the head of the National Security Agency, said
that American surveillance had helped prevent “potential terrorist events over 50 times since
9/11,” including at least 10 “homeland-based threats.” But he said that a vast majority of the
others must remain secret.
19
Terrorism Disadvantage
NAUDL 2015-16
Links
Extension: Surveillance is necessary for stopping a terrorist attack
(__)
(__) NSA surveillance is critical for information to stop a terrorist attack – this has
empirically been proven
Bergen et al, Director of the National Security Program at the New America Foundation, 2014
(Peter, "DO NSA'S BULK SURVEILLANCE PROGRAMS STOP TERRORISTS?,"
https://static.newamerica.org/attachments/1311-do-nsas-bulk-surveillance-programs-stopterrorists/IS_NSA_surveillance.pdf
June 5, 2013, the Guardian broke the first story in what would become a flood of revelations
regarding the extent and nature of the NSA’s surveillance programs. Facing an uproar over the
threat such programs posed to privacy, the Obama administration scrambled to defend them as
legal and essential to U.S. national security and counterterrorism. Two weeks after the first
leaks by former NSA contractor Edward Snowden were published, President Obama defended the
NSA surveillance programs during a visit to Berlin, saying: “We know of at least 50 threats
that have been averted because of this information not just in the United States, but, in some
cases, threats here in Germany. So lives have been saved.” Gen. Keith Alexander, the
director of the NSA, testified before Congress that: “the information gathered from these
programs provided the U.S. government with critical leads to help prevent over 50 potential
terrorist events in more than 20 countries around the world.” Rep. Mike Rogers (R-Mich.),
chairman of the House Permanent Select Committee on Intelligence, said on the House floor
in July that “54 times [the NSA programs] stopped and thwarted terrorist attacks both here
and in Europe – saving real lives.”
20
Terrorism Disadvantage
NAUDL 2015-16
Links- Specific Affirmatives
Immigration Surveillance prevents terrorism
(__)
(__) Terrorist will use exploit a lax immigration system in order to get in the U.S
Kephart, Researcher at Center for Immigration Studies, 2005
[Janice, “Moving Beyond the 9/11 Staff Report on Terrorist Travel”,
http://cis.org/articles/2005/kephart.html]
The report highlights the danger of our lax immigration system, not just in terms of who is
allowed in, but also how terrorists, once in the country, used weaknesses in the system to
remain here. The report makes clear that strict enforcement of immigration law -- at American
consulates overseas, at ports of entry, and within the United States -- must be an integral part of
our efforts to prevent future attacks on U.S. soil. Among the findings: Of the 94 foreign-born
terrorists who operated in the United States, the study found that about two-thirds (59)
committed immigration fraud prior to or in conjunction with taking part in terrorist activity.
Of the 59 terrorists who violated the law, many committed multiple immigration violations -79 instances in all. In 47 instances, immigration benefits sought or acquired prior to 9/11
enabled the terrorists to stay in the United States after 9/11 and continue their terrorist
activities. In at least two instances, terrorists were still able to acquire immigration benefits
after 9/11. Temporary visas were a common means of entering; 18 terrorists had student visas and
another four had applications approved to study in the United States. At least 17 terrorists used a
visitor visa -- either tourist (B2) or business (B1). There were 11 instances of passport fraud and 10
instances of visa fraud; in total 34 individuals were charged with making false statements to
an immigration official. In at least 13 instances, terrorists overstayed their temporary visas. In 17
instances, terrorists claimed to lack proper travel documents and applied for asylum, often at a port
of entry. Fraud was used not only to gain entry into the United States, but also to remain, or
"embed," in the country. Seven terrorists were indicted for acquiring or using various forms of
fake identification, including driver's licenses, birth certificates, Social Security cards, and
immigration arrival records. Once in the United States, 16 of 23 terrorists became legal
permanent residents, often by marrying an American. There were at least nine sham marriages. In
total, 20 of 21 foreign terrorists became naturalized U.S. citizens.
21
Terrorism Disadvantage
NAUDL 2015-16
Links- Specific Affirmatives
Immigration Surveillance prevents terrorism
(___)
(___) Effective immigration surveillance could have prevented 9/11
Kobach, Professor of Law, University of Missouri (Kansas City), 2005
[THE QUINTESSENTIAL FORCE MULTIPLIER: THE INHERENT AUTHORITY OF LOCAL
POLICE TO MAKE IMMIGRATION ARRESTS. Albany Law Review, 69(1), 179-235.
Of critical importance is the fact that all four of the hijackers who were stopped by local
police prior to 9/11 had violated federal immigration laws and could have been detained by
the state or local police officers. Indeed, there were only five hijackers who were clearly in
violation of immigration laws while in the United States— and four of the five were
encountered by state or local police officers.'' These were four missed opportunities of tragic
dimension. Had information about their immigration violations been disseminated to state
and local police through the NCIC system, the four terrorist aliens could have been detained
for their violations. Adding even greater poignancy to these missed opportunities is the fact
that they involved three of the four terrorist pilots of 9/11. Had the police officers involved
been able to detain Atta, Hanjour, and Jarrah, these three pilots would have been out of the
picture. It is difficult to imagine the hijackings proceeding without three of the four pilots.*
22
Terrorism Disadvantage
NAUDL 2015-16
Links- Specific Affirmatives
Immigration Surveillance prevents terrorism
(__) Surveillance of undocumented immigrants is key to preventing another terrorist attack
such as the one that occurred on 9/11/
Kobach, Professor of Law, University of Missouri (Kansas City), 2005
[THE QUINTESSENTIAL FORCE MULTIPLIER: THE INHERENT AUTHORITY OF LOCAL
POLICE TO MAKE IMMIGRATION ARRESTS. Albany Law Review, 69(1), 179-235.
The fact that the 9/11 terrorists had been able to exploit weaknesses in the enforcement of
immigration laws was not surprising to those engaged in the execution of federal immigration law.
Enforcing the immigration laws is one of the most daunting challenges faced by the federal
government. With an estimated 7 to 10 million illegal aliens already present in the United States"
and fewer than 2000 interior enforcement agents at its disposal, the U.S. Bureau of Immigration and
Customs Enforcement (ICE) has a Herculean task on its hands—one that it cannot easily
accomplish alone.^ After 9/11, it became clear that an effective domestic war against terrorism
would require improvements in the enforcement of immigration laws. On June 6, 2002,
Attorney General John Ashcroft announced the National Security Entry-Exit Registration System
(NSEERS), a program that would require high-risk alien visitors to provide fingerprints and
extensive biographical information. It would also require such aliens to re-register with U.S.
immigration officials periodically a n d would, for t h e first time, impose real-time departure
controls on such high-risk visitors.* Violators of the NSEERS requirements would be listed in
the National Crime Information Center (NCIC) database, accessible in the squad cars of most
local police departments, allowing local law enforcement officers to make arrests of such
high-risk immigration law . Had local police officers had access to the names of the five 9/11
hijackers who violated civil provisions of the Immigration and Nationality Act (INA) prior to
the attack, they might have been able to arrest and detain one or more of the hijackers. The
assistance of state and local law enforcement agencies can also mean the difference
between success and failure in enforcing the nation's immigration laws generally. The nearly
800,000 police officers nationwide represent a massive force multiplier.' This assistance need
only be occasional, passive, voluntary, and pursued during the course of normal law enforcement
activity. The net that is cast daily by local law enforcement during routine encounters with
members of the public is so immense that it is inevitable illegal aliens will be identified.
When a local police officer establishes probable cause to believe that an alien is in violation
ofU.S. immigration law, he may contact the ICE Law Enforcement Support Center in Williston,
Vermont, to confirm that ICE wishes to take custody of the alien."*
23
Terrorism Disadvantage
NAUDL 2015-16
Links- Specific Affirmatives
NSA Reform makes finding terrorists harder
(__)
(__) Reforming the NSA still prevents critical data gathering to thwart a terrorist attack and
hampers the ability for the government to effectively respond in a timely manner
Schneier, computer security and intelligence specialist, 2013
("The NSA-Reform Paradox: Stop Domestic Spying, Get More Security,"
www.theatlantic.com/politics/archive/2013/09/the-nsa-reform-paradox-stop-domestic-spying-getmore-security/279537/)
Any solution we devise will make the NSA less efficient at its eavesdropping job. That's a
trade-off we should be willing to make, just as we accept reduced police efficiency caused
by requiring warrants for searches and warning suspects that they have the right to an
attorney before answering police questions. We do this because we realize that a too-powerful
police force is itself a danger, and we need to balance our need for public safety with our aversion
of a police state.
The same reasoning needs to apply to the NSA. We want it to eavesdrop on our enemies, but
it needs to do so in a way that doesn’t trample on the constitutional rights of Americans, or
fundamentally jeopardize their privacy or security. This means that sometimes the NSA won’t
get to eavesdrop, just as the protections we put in place to restrain police sometimes result in a
criminal getting away. This is a trade-off we need to make willingly and openly, because
overall we are safer that way.
24
Terrorism Disadvantage
NAUDL 2015-16
Links- Specific Affirmatives
NSA Reform makes finding terrorists harder
(__)
(__) NSA needs to maintain its secrecy to not compromise classified data – the plan
collapses that by forcing agencies to disclose classified info about counter-terror efforts that
allows organizations like Al Qaeda to continue
Yoo, Professor at University of California- Berkeley Law School, 2007
(John, "THE TERRORIST SURVEILLANCE PROGRAM AND THE CONSTITUTION," SSRN)
If ever there were an emergency that Congress could not prepare for, it was the war brought upon
the United States on 9/11. FISA was a law written with Soviet spies working out of their embassy in
Washington, D.C. in mind.221 No one then anticipated war with an international terrorist
organization wielding the destructive power of a nation. The Presidency was the institution
of government best able to respond quickly to the 9/11 attacks and to take measures to
defeat al Qaeda’s further efforts. While the certainty and openness of a congressional act
would certainly be desirable, the success of the NSA surveillance program depends on
secrecy and agility, two characteristics Congress as an institution lacks.
25
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Terrorism is the most important security threat
(__)
(__) An attack on US soil would devastate populations and poses the greatest threat to
security
Wolfendale, 7 Jessica, Special Research Center, "Terrorism, Security, and the Threat of
Counterterrorism,"
archives.cerium.ca/IMG/pdf/WOLFENDALE_2007_Terrorism_Security_and_the_Threat_of_Counter
terrorism-2.pdf
According to current counterterrorism rhetoric, non-state terrorism threatens many things:
security, lives, values, freedom, democracy, and the existence of civilization itself, and
poses a greater threat than the threats posed by war, invasion, accident, natural disasters,
and criminal activity. Several government ministers have claimed that the magnitude of the
terrorist threat is so great that it imposes a positive moral duty on governments to protect
the individual’s right to security even at the expense of many basic civil liberties. The
German Interior Minister Otto Schily, for example, argued that the government had an obligation to
“protect the “basic right to security” of all German Citizens.”7 Similarly the Australian AttorneyGeneral Phillip Ruddock said that “I believe that some protagonists fail to recognise a national
government’s obligation under Article 3 of the human rights convention—that is, that governments
have an obligation to protect human life.”8 The need to counter the threat of terrorism is
claimed to both justify and require radical infringements of civil liberties such as the right to
privacy, the right to due process, and the right not to be detained without just cause. Yet despite
these strong claims there has been little clear explanation of how and why terrorism
threatens lives, values, and freedom. Perhaps it is meant to be obvious, but the author does not
find it so. How does terrorism threaten security? What kind of security does it threaten?
26
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Terrorism kills
(__)
(__) Terrorism causes countless deaths for innocent civilians
Moon, 9 Ban-Ki, Secretary General of the UN, "United Nations Efforts to Address Terrorism Threat
‘Crucial to Global Security’, Says Secretary-General, in Message to Vienna Meeting,"
www.un.org/press/en/2009/sgsm12544.doc.htm
Terrorism is a major security threat in today’s world. Countless innocent civilians and the
United Nations itself have suffered heinous terrorist acts. Our efforts to address this
problem comprehensively are crucial to global security. I attach great importance to your work.
As you know, I have appointed Jean-Paul Laborde to lead the Counter-Terrorism
Implementation Task Force [CTIFTF], and have established a CTITF Office in the Department
of Political Affairs. These measures should allow you to build on your already considerable
accomplishments. I congratulate Task Force members for bringing together more than two dozen
entities. Some are focused directly on terrorism, while others bring expertise on non-proliferation,
disarmament, education, cultural and inter-religious dialogue, human rights, peacekeeping, health
and other issues. This range of experience allows the United Nations to address terrorism as part of
our broader mission to promote development, human rights and peace. It also promotes synergies
and information-sharing, and allows each entity to maximize its comparative advantage
27
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Preventing terrorism more important than privacy concerns
(__)
(__) Even in the face of privacy concerns, terrorism is still a comparatively larger threat to
combat
Wolfendale, 7 Jessica, Special Research Center, "Terrorism, Security, and the Threat of
Counterterrorism,"
archives.cerium.ca/IMG/pdf/WOLFENDALE_2007_Terrorism_Security_and_the_Threat_of_Counter
terrorism-2.pdf
According to current counterterrorism rhetoric, non-state terrorism threatens many things:
security, lives, values, freedom, democracy, and the existence of civilization itself, and
poses a greater threat than the threats posed by war, invasion, accident, natural disasters,
and criminal activity. Several government ministers have claimed that the magnitude of the
terrorist threat is so great that it imposes a positive moral duty on governments to protect
the individual’s right to security even at the expense of many basic civil liberties. The
German Interior Minister Otto Schily, for example, argued that the government had an obligation to
“protect the “basic right to security” of all German Citizens.”7 Similarly the Australian AttorneyGeneral Phillip Ruddock said that “I believe that some protagonists fail to recognise a national
government’s obligation under Article 3 of the human rights convention—that is, that governments
have an obligation to protect human life.”8 The need to counter the threat of terrorism is
claimed to both justify and require radical infringements of civil liberties such as the right to
privacy, the right to due process, and the right not to be detained without just cause. Yet despite
these strong claims there has been little clear explanation of how and why terrorism
threatens lives, values, and freedom. Perhaps it is meant to be obvious, but the author does not
find it so. How does terrorism threaten security? What kind of security does it threaten?
28
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Answer to: Terrorist attack is unlikely
(__)
(__) Even if it the risk of the attack is unlikely, the magnitude of the impact means it’s a
relevant concern to act upon
Wolfendale, 7 Jessica, Special Research Center, "Terrorism, Security, and the Threat of
Counterterrorism,"
archives.cerium.ca/IMG/pdf/WOLFENDALE_2007_Terrorism_Security_and_the_Threat_of_Counter
terrorism-2.pdf
Despite the relatively low statistical threat to life posed by non-state terrorism, government
officials have portrayed the threat as both immediate and of great magnitude. So there are
statements from Phillip Ruddock and the Australian Prime Minister John Howard claiming that
“there is “high probability” of a terrorist attack occurring sooner rather than later.”18 Similarly, in
the United States officials have claimed that “Terrorism is a clear and present danger to
Americans today” and “The threat of international terrorism knows no boundaries.”19 This
view is shared by the general population. Opinion polls in the United States and in Australia
show that the majority of the population believe that the threat of terrorism is both an imminent and
far greater threat than other threats.20 But perhaps the discrepancy between the actual
statistical threat of terrorism and the claims of politicians is not based just on what terrorists
might do now, but also on what they might do in the future. A supporter of radical
counterterrorism measures might accept that the statistical threat of being killed in a
terrorist attack is, at present, less than many other threats but point out that the future threat
of what might be called super-terrorism is significant enough to justify the suspension of
civil liberties and the massive spending on defense and other counterterrorism
organizations. Because it is possible that a single act of terrorism could wipe out hundreds
of thousands of people instantly, the mere existence of that possibility is sufficient to make
the threat of terrorism far more significant than the threat posed by crime, disease and
poverty
29
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Answer to: Terrorists aren’t a threat
(__)
(__) There is a growing threat of a terrorist attack on US soil due to resentment generated by
US presence abroad
Lewis, Fellow at the Center for Strategic and International Studies Fellow, 2014,
(James A. "Underestimating Risk in the Surveillance Debate,"
csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf)
The echoes of September 11 have faded and the fear of attack has diminished. We are
reluctant to accept terrorism as a facet of our daily lives, but major attacks—roughly one a
year in the last five years—are regularly planned against U.S. targets, particularly passenger
aircraft and cities. America’s failures in the Middle East have spawned new, aggressive
terrorist groups. These groups include radicalized recruits from the West—one estimate puts
the number at over 3,000—who will return home embittered and hardened by combat.
Particularly in Europe, the next few years will see an influx of jihadis joining the existing
population of homegrown radicals, but the United States itself remains a target. America’s
size and population make it is easy to disappear into the seams of this sprawling society.
Government surveillance is, with one exception and contrary to cinematic fantasy, limited
and disconnected. That exception is communications surveillance, which provides the best and
perhaps the only national-level solution to find and prevent attacks against Americans and
their allies. Some of the suggestions for alternative approaches to surveillance, such as the
recommendation that NSA only track “known or suspected terrorists,” reflect both deep
ignorance and wishful thinking. It is the unknown terrorist who will inflict the greatest harm
30
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Answers to: ISIS is a Threat
ISIS is growing in power – all tools are necessary to mitigate their strength
Rojas June 19, 2015 (Nicole; US State Department: Isis knocks off al-Qaeda as leading terrorist
oganisation; www.ibtimes.co.uk/us-state-department-isis-knocks-off-al-qaeda-leading-terroristoganisation-1507091; kdf)
The Country Reports on Terrorism by the US State Department, released on 19 June, reveals Isis
has beaten al-Qaeda as the world's leading terrorist organisation. The new report found that
the Islamic State in the Middle East, as well as its partner Boko Haram in Africa, has led to the
decline of al-Qaeda's power. It reported that al-Qaeda leadership "appeared to lose momentum as
the self-styled leader of a global movement in the face of Isil's [Isis] rapid expansion." However, the
report noted that al-Qaeda continued to have an impact on terrorism. "Though AQ central
leadership was weakened, the organisation continued to serve as a focal point of 'inspiration'
for a worldwide network of affiliated groups, including al-Qa'ida in the Arabian Peninsula—a
long-standing threat to Yemen, the region, and the United States; al-Qa'ida in the Islamic Maghreb;
a;-Nusrah Front; and al-Shabaab," the report said. The report also found that nearly 33,000 people
were killed and another 34,700 were injured in about 13,500 terrorist attacks around the
world last year. According to NBC News, that equates to a 35% increase in terrorist attacks and an
81% rise in fatalities since 2013. CNN reported that 24 Americans died last year in terrorist attacks,
specifically in Afghanistan, Jerusalem and Somalia. The attacks, which were dominate in Iraq,
Pakistan, Afghanistan, India, Nigeria and Syria, happened in 95 countries total. More aggressive
and ruthless attacks Terrorist groups were conducting more aggressive attacks, which
included "ruthless methods of violence such as beheadings and crucifixions intended to
terrify opponents". Isis and Boko Haram also employed tactics such as "stoning, indiscriminate
mass casualty attacks, and kidnapping children for enslavement".
31
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Al Qaeda is a threat
(___) Al Qaeda’s actions, statements, and internal documents prove they want nuclear
weapons and mass casualty attacks---if the US relents, it guarantees nuclear attacks
Arbuckle, Master’s student in defense analysis Naval Postgraduate School, 2008,
(Larry J., Naval Postgraduate School, "The Deterrence of Nuclear Terrorism through an Attribution
Capability", Thesis for master of science in defense analysis, approved by Professor Robert
O'Connell, and Gordon McCormick, Chairman, Department of Defense Analysis, Naval
Postgraduate School, June
However, there is evidence that a small number of terrorist organizations in recent history, and
at least one presently, have nuclear ambitions. These groups include Al Qaeda, Aum
Shinrikyo, and Chechen separatists (Bunn, Wier, and Friedman; 2005). Of these, Al Qaeda
appears to have made the most serious attempts to obtain or otherwise develop a nuclear weapon.
Demonstrating these intentions, in 2001 Osama Bin Laden, Ayman al Zawahiri, and two other al
Qaeda operatives met with two Pakistani scientists to discuss weapons of mass destruction
development (Kokoshin, 2006). Additionally, Al Qaeda has made significant efforts to justify
the use of mass violence to its supporters. Sulaiman Abu Ghaith, an al Qaeda spokesman
has stated that al Qaeda, “has the right to kill 4 million Americans – 2 million of them
children,” in retaliation for deaths that al Qaeda links to the U.S. and its support of Israel (as
cited in Bunn, Wier, and Friedman; 2005). Indeed Bin Laden received a fatwa in May 2003
from an extreme Saudi cleric authorizing the use of weapons of mass destruction against
U.S. civilians (Bunn, Wier, and Friedman; 2005). Further evidence of intent is the following
figure taken from al Qaeda documents seized in Afghanistan. It depicts a workable design
for a nuclear weapon. Additionally, the text accompanying the design sketch includes some
fairly advanced weapons design parameters (Boettcher & Arnesen, 2002). Clearly maximizing
the loss of life is key among al Qaeda’s goals. Thus their use of conventional means of
attack presently appears to be a result of their current capabilities and not a function of their
pure preference (Western Europe, 2005).
32
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
AQAP is a threat
AQAP has the intent and capability to strike the US homeland
Zimmerman 2012 (Katherine Zimmerman, senior analyst and the al Qaeda and Associated
Movements Team Lead for the American Enterprise Institute’s Critical Threats Project, October 19,
2012, “Al Qaeda in Yemen: Countering the Threat from the Arabian Peninsula,” AEI Critical Threats,
http://www.criticalthreats.org/yemen/zimmerman-qaeda-yemen-countering-threat-arabianpeninsula-october-19-2012)
The evolution of AQAP into an insurgent group aiming at controlling and governing territory
in Yemen could seem to indicate that the threat the group poses to the U.S. directly is
declining. The devotion of resources to AQAP’s internal operations, it could be argued, subtracts
resources from its efforts to attack Americans outside of Yemen. One might even suggest that
American interests could be served by encouraging AQAP, in a sense, to focus on its insurgent
activities. Events do not support such a conclusion, however. AQAP has demonstrated that it
retains both the will and the capability to attempt attacks on the U.S. homeland even as it
seeks to expand territorial control within Yemen.¶ AQAP operatives mailed bombs disguised as
printer cartridges to a Chicago synagogue in October 2010 while the campaign against
Yemeni military and security targets was picking up speed.[13] The bombs were discovered after
they were already en route to the U.S. AQAP attempted another attack in May 2012, improving on
the bomb design used in the December 25, 2009 attack by Umar Farouk Abdulmutallab (which
AQAP had also planned, resourced, and directed).[14] The attempt shows that AQAP still seeks
to conduct international attacks, even though the details of the attack were purported to be
known to American and other intelligence agencies before it became fully operational.[15]
Should AQAP succeed in holding a significant territorial safe haven in Yemen, of course, its
ability to plan and conduct attacks abroad could increase considerably.
33
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Surveillance does not solve terror plots
(__)
(__) No link – domestic surveillance doesn’t solve terrorist plots – empirically the NSA fails
at combatting threats
Bergen et al, Director of the National Security Program at the New America Foundation, 2014
(Peter, "DO NSA'S BULK SURVEILLANCE PROGRAMS STOP TERRORISTS?,"
https://static.newamerica.org/attachments/1311-do-nsas-bulk-surveillance-programs-stopterrorists/IS_NSA_surveillance.pdf
However, our review of the government’s claims about the role that NSA “bulk” surveillance
of phone and email communications records has had in keeping the United States safe from
terrorism shows that these claims are overblown and even misleading. An in-depth analysis
of 225 individuals recruited by al-Qaeda or a like-minded group or inspired by al-Qaeda’s
ideology, and charged in the United States with an act of terrorism since 9/11, demonstrates
that traditional investigative methods, such as the use of informants, tips from local
communities, and targeted intelligence operations, provided the initial impetus for investigations
in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these
cases was minimal. Indeed, the controversial bulk collection of American telephone
metadata, which includes the telephone numbers that originate and receive calls, as well as
the time and date of those calls but not their content, under Section 215 of the USA PATRIOT
Act, appears to have played an identifiable role in initiating, at most, 1.8 percent of these
cases. NSA programs involving the surveillance of non-U.S. persons outside of the United
States under Section 702 of the FISA Amendments Act played a role in 4.4 percent of the
terrorism cases we examined, and NSA surveillance under an unidentified authority played a
role in 1.3 percent of the cases we examined.
34
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Surveillance does not solve terror plots - extensions
(__)
(__) Reject evidence about the effectiveness of surveillance – its biased and comes from
government sources rather than backed up data
Bergen et al, Director of the National Security Program at the New America Foundation, 2014
(Peter, "DO NSA'S BULK SURVEILLANCE PROGRAMS STOP TERRORISTS?,"
https://static.newamerica.org/attachments/1311-do-nsas-bulk-surveillance-programs-stopterrorists/IS_NSA_surveillance.pdf
Additionally, a careful review of three of the key terrorism cases the government has cited to
defend NSA bulk surveillance programs reveals that government officials have exaggerated
the role of the NSA in the cases against David Coleman Headley and Najibullah Zazi, and the
significance of the threat posed by a notional plot to bomb the New York Stock Exchange.
In 28 percent of the cases we reviewed, court records and public reporting do not identify
which specific methods initiated the investigation. These cases, involving 62 individuals,
may have been initiated by an undercover informant, an undercover officer, a family member
tip, other traditional law enforcement methods, CIA- or FBI-generated intelligence, NSA
surveillance of some kind, or any number of other methods. In 23 of these 62 cases (37
percent), an informant was used. However, we were unable to determine whether the informant
initiated the investigation or was used after the investigation was initiated as a result of the
use of some other investigative means. Some of these cases may also be too recent to have
developed a public record large enough to identify which investigative tools were used.
35
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Surveillance does not solve terror plots - extensions
(___)
(___)Leading experts agree that surveillance doesn’t prevent terrorist attacks.
Baker and Sanger 2015 (Peter and David E; Why the NSA Isn't Howling over restrictions; May 1;
www.nytimes.com/2015/05/02/us/politics/giving-in-a-little-on-national-security-agency-datacollection.html; kdf)
The foundation’s analysis said the bill “should end” the bulk collection of “everybody’s phone
records.” But it pointed out that the N.S.A. could still search for records beyond telephone data with
fewer restrictions. And it noted that the bill would not address warrantless collection of Americans’
international calls and e-mails under Section 702 of the Foreign Intelligence Surveillance Act
amendments of 2008. The future of the bulk collection program may have been sealed in
December 2013, when a panel of experts appointed by Mr. Obama found that the program
had been of minimal intelligence value and ran considerable risks of invading privacy.
“N.S.A. believes that on at least a few occasions, information derived” had “contributed to its efforts
to prevent possible terrorist attacks, either in the United States or somewhere else in the world,” the
report said. But the panel concluded that its review showed that the information collected under
the program “was not essential to preventing attacks and could readily have been obtained
in a timely manner using conventional” court orders. The panel recommended legislation that
“terminates the storage of bulk telephony metadata by the government” and that it be held
instead by telecommunications companies or some other third party, ensuring that the
government gained access only when the Foreign Intelligence Surveillance Court issued an order.
Although the government said nothing at the time, General Alexander, then in his last months as the
head of the N.S.A., told Mr. Obama that it would be preferable if legislation were passed that moved
the program to private hands.
36
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Surveillance does not solve terror plots - extensions
(__) You should prefer all of our evidence – newest studies prove the NSA is ineffective at
combatting a terrorist attack
Neal, 14 Meghan, January 13, Deputy Editor of Gizmodo citing New American Foundation report,
"You'll Never Guess How Many Terrorist Plots the NSA's Domestic Spy Program Has
Foiled,"motherboard.vice.com/blog/youll-never-guess-how-many-terrorist-plots-the-nsas-domesticspy-program-has-foiled
A new analysis of terrorism charges in the US found that the NSA's dragnet domestic
surveillance "had no discernible impact" on preventing terrorist acts. Instead, the majority of
threats over the last decade were detected by regular old intelligence and law enforcement
methods—tips, informants, CIA and FBI ops, routine law enforcement. The nonprofit think
tank New America Foundation published a report today after investigating the 227 Al Qaedaaffiliated people or groups that have been charged for committing an act of terrorism in the
US since 9/11. It found just 17 of the cases were credited to NSA surveillance, and just one
conviction came out of the government's extra-controversial practice of spying on its own
citizens. And that charge, against San Diego cab driver Basaaly -Moalin, was for sending
money to a terrorist group in Somalia. There was no threat of an actual attack. This is hardly
the first time experts have searched for a link between bulk metadata collection and foiled
terrorist plots and come up empty-handed. So far, the only real value in collecting and
monitoring billions of US phone records has been to provide extra support in investigations
already underway by the FBI or another agency, or to verify that a rumored threat isn't real (the
"peace of mind" metric), the report found.
37
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Surveillance does not solve terror plots - extensions
(__)
(__) Domestic surveillance isn’t NEARLY enough to solve terrorism – other programs are
necessary
Bergen et al, Director of the National Security Program at the New America Foundation, 2014
(Peter, "DO NSA'S BULK SURVEILLANCE PROGRAMS STOP TERRORISTS?,"
https://static.newamerica.org/attachments/1311-do-nsas-bulk-surveillance-programs-stopterrorists/IS_NSA_surveillance.pdf
Surveillance of American phone metadata has had no discernible impact on preventing acts
of terrorism and only the most marginal of impacts on preventing terrorist-related activity,
such as fundraising for a terrorist group. Furthermore, our examination of the role of the
database of U.S. citizens’ telephone metadata in the single plot the government uses to
justify the importance of the program – that of Basaaly Moalin, a San Diego cabdriver who in
2007 and 2008 provided $8,500 to al-Shabaab, al-Qaeda’s affiliate in Somalia – calls into
question the necessity of the Section 215 bulk collection program. According to the
government, the database of American phone metadata allows intelligence authorities to
quickly circumvent the traditional burden of proof associated with criminal warrants, thus
allowing them to “connect the dots” faster and prevent future 9/11-scale attacks. Yet in the
Moalin case, after using the NSA’s phone database to link a number in Somalia to Moalin, the
FBI waited two months to begin an investigation and wiretap his phone. Although it’s
unclear why there was a delay between the NSA tip and the FBI wiretapping, court
documents show there was a two-month period in which the FBI was not monitoring
Moalin’s calls, despite official statements that the bureau had Moalin’s phone number and
had identified him. , This undercuts the government’s theory that the database of Americans’
telephone metadata is necessary to expedite the investigative process, since it clearly didn’t
expedite the process in the single case the government uses to extol its virtues.
38
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Intelligence gathering does not matter
(__)
(__) No link – the intelligence that domestic surveillance captures doesn’t matter because
government officials cannot interpret it correctly to act upon it and prevent an attack
Bergen et al, Director of the National Security Program at the New America Foundation, 2014
(Peter, "DO NSA'S BULK SURVEILLANCE PROGRAMS STOP TERRORISTS?,"
https://static.newamerica.org/attachments/1311-do-nsas-bulk-surveillance-programs-stopterrorists/IS_NSA_surveillance.pdf
Finally, the overall problem for U.S. counterterrorism officials is not that they need vaster
amounts of information from the bulk surveillance programs, but that they don’t sufficiently
understand or widely share the information they already possess that was derived from
conventional law enforcement and intelligence techniques. This was true for two of the 9/11
hijackers who were known to be in the United States before the attacks on New York and
Washington, as well as with the case of Chicago resident David Coleman Headley, who
helped plan the 2008 terrorist attacks in Mumbai, and it is the unfortunate pattern we have
also seen in several other significant terrorism cases.
39
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Financial data tracking does not matter
(__)
(__) No link – Surveillance cannot track finances accurately and financing is a small and
insignificant part to resolving terrorism
Bergen et al, Director of the National Security Program at the New America Foundation, 2014
(Peter, "DO NSA'S BULK SURVEILLANCE PROGRAMS STOP TERRORISTS?,"
https://static.newamerica.org/attachments/1311-do-nsas-bulk-surveillance-programs-stopterrorists/IS_NSA_surveillance.pdf
Surveillance of American phone metadata has had no discernible impact on preventing acts
of terrorism and only the most marginal of impacts on preventing terrorist-related activity,
such as fundraising for a terrorist group. Furthermore, our examination of the role of the
database of U.S. citizens’ telephone metadata in the single plot the government uses to
justify the importance of the program – that of Basaaly Moalin, a San Diego cabdriver who in
2007 and 2008 provided $8,500 to al-Shabaab, al-Qaeda’s affiliate in Somalia – calls into
question the necessity of the Section 215 bulk collection program. According to the
government, the database of American phone metadata allows intelligence authorities to
quickly circumvent the traditional burden of proof associated with criminal warrants, thus
allowing them to “connect the dots” faster and prevent future 9/11-scale attacks. Yet in the
Moalin case, after using the NSA’s phone database to link a number in Somalia to Moalin, the
FBI waited two months to begin an investigation and wiretap his phone. Although it’s
unclear why there was a delay between the NSA tip and the FBI wiretapping, court
documents show there was a two-month period in which the FBI was not monitoring
Moalin’s calls, despite official statements that the bureau had Moalin’s phone number and
had identified him. , This undercuts the government’s theory that the database of Americans’
telephone metadata is necessary to expedite the investigative process, since it clearly didn’t
expedite the process in the single case the government uses to extol its virtues.
40
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Terrorist attack isn’t a national security threat
(__)
(__) No impact – Terrorism and terrorist attacks aren’t major threats to countries
Wolfendale, 2007 Jessica, Special Research Center, "Terrorism, Security, and the Threat of
Counterterrorism,"
archives.cerium.ca/IMG/pdf/WOLFENDALE_2007_Terrorism_Security_and_the_Threat_of_Counter
terrorism-2.pdf
If the claim that terrorism threatens individual lives to such an extent that it justifies radical
counterterrorism measures is based on misleading claims about the extent of the terrorist
threat, the claim about the threat posed to national security is just as misleading. Historically,
non-state terrorist activity has not significantly undermined nor damaged the national
cohesiveness or integrity of liberal democracies. Israel, Germany, Italy, the United Kingdom,
and many other countries have lived with terrorist activity for many years without such
activity seriously threatening their very existence, or even their “way of life.” As noted earlier,
greater threats to the existence and survival of states come from other human activities and
natural disasters.
41
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
Terrorist attack is unlikely
(__)
(__)A catastrophic terrorist attack on US soil is unlikely
Wolfendale, 2007 Jessica, Special Research Center, "Terrorism, Security, and the Threat of
Counterterrorism,"
archives.cerium.ca/IMG/pdf/WOLFENDALE_2007_Terrorism_Security_and_the_Threat_of_Counter
terrorism-2.pdf
This is not to deny that terrorism poses a threat to the lives of individuals. Terrorism
currently does threaten lives and it is indeed possible that terrorists might be planning even
more destructive attacks then have hitherto occurred. But to realistically assess the threat to
security posed by terrorism is not enough to show that a threat exists and may continue to
exist. Justifying radical counterterrorism measures and massive counterterrorism budgets
requires more than postulating possibilities; it requires a clear assessment of the likelihood
of the possibility occurring, particularly compared to the likelihood of other future threats.
Merely claiming that terrorist could perform an act of super-terrorism because the means for
such an act (e.g., weapons and biological pathogens) are available is a truism, not a threat
assessment. In fact it is states, not non-state terrorists, that have the easiest access to weapons of
mass destruction and deadly biological agents. In the United States, for example, the Center for
Disease Control has estimated that there are “about 800 labs nationwide who work with so-called
select agents, the 49 toxins, on the government’s bioterrorism list” and Federal officials have
admitted that “policing these labs won’t be easy.”27 History has demonstrated that states cannot be
relied on not to use such weapons against their perceived enemies (as occurred in World War II
with the bombing of Hiroshima) and the deaths caused by state violence far outnumber those
caused by non-state terrorism.28 It is untenable to conclude that the possibility of non-state
terrorists using weapons of mass destruction or biological agents means that they are in fact going
to use such weapons. It is equally possible that a state will use such weapons, or that scientists
working in the 800 labs mentioned earlier will cause mass casualties through careless handling of
biological agents. Given that there have already been cases of what is known as “vial in
pocket” syndrome—where scientists carry vials of deadly viruses in their jacket pockets
while travelling on international and domestic flights—the possibility of a catastrophic
accident should not be ignored
42
Terrorism Disadvantage
NAUDL 2015-16
Affirmative Answers
ISIS is not a threat
(___)
(___) ISIS is structurally incapable of being a threat
Matthews and Preble 2015 (Dylan and Christopher [Cato's vice president for defense and foreign
policy studies]; Ignore the headlines. The world is getting safer all the time.; Jan 15;
www.vox.com/2015/1/14/7546165/world-getting-safer; kdf)
DM: Did ISIS change your thinking on this at all? ISIS fighter An ISIS fighter in Syria. (AFP/Getty
Images) CP: Not really, for a couple reasons. ISIS may be a terrorist organization, and may be
an insurgency, and may be a quasi-nation-state or attempting to become a quasi-nation-state,
but it's hard to be all of those things simultaneously. Austin Long writes about this in his
chapter, about the differences between insurgents and terrorists. Most terrorists operate in the
shadows. The hard part is not killing them, it's finding them. That's why traditional counterterrorism
is an intelligence and information-gathering process. It's a lot like police work. By declaring itself a
state and raising a flag over territory it seizes and holds, ISIS is trading away one of its key
advantages, and opening itself up to more traditional military attacks. It's a virulent,
reprehensible state, but it's not clear to me that it's a greater terrorist threat than other
organizations that are continuing to operate in the shadows.
43
Download