Terrorism DA - Saint Louis Urban Debate League

advertisement
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Glossary
Terrorism Disadvantage (N, JV, & V Only)
Terrorism Disadvantage ....................................................................................................................................... 1
Glossary ............................................................................................................................................................... 2
Terrorism Disadvantage (1NC) (1/3) ................................................................................................................... 3
Uniqueness
Surveillance increasing now ............................................................................................................................ 6
Links/Internal Links
Surveillance prevents terrorist plots................................................................................................................. 7
Surveillance is necessary for timely response ............................................................................................... 10
Surveillance allows meta-data intelligence .................................................................................................... 11
Surveillance creates bulk intelligence ............................................................................................................ 12
Surveillance uncovers terrorist financing ...................................................................................................... 13
Financing is key to terrorist efforts ................................................................................................................ 16
Surveillance solves Al Qaeda sleeper cells .................................................................................................... 17
Answer to: Surveillance fails at solving a terrorist attack ............................................................................. 18
Extension: Surveillance is necessary for stopping a terrorist attack .............................................................. 20
Immigration Surveillance prevents terrorism ................................................................................................ 21
NSA Reform makes finding terrorists harder ................................................................................................ 24
Impacts
Impact Extensions - Terrorism....................................................................................................................... 26
Answer to: Terrorist attack is unlikely........................................................................................................... 28
Answer to: Terrorists aren’t a threat .............................................................................................................. 29
Answers to: ISIS is not a Threat .................................................................................................................... 30
Al Qaeda is a threat ........................................................................................................................................ 31
AQAP is a threat ............................................................................................................................................ 32
1
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Glossary
Glossary
NSA – The National Security Agency – this is a government agency that is responsible for monitoring,
collection, and processing of information for foreign intelligence. The NSA was one of the agencies exposed
by Edward Snowden in 2013 as an agency conducting surveillance on domestic (and foreign) populations for
counter-terror efforts
SIGINT – Signal intelligence – this is a type of intelligence that is largely collected by the NSA. SIGINT is
the process of collecting telecommunication data for counter-intelligence purposes
Bulk Surveillance – this is the collection of massive amounts of telecommunication information that isn’t all
individual monitored, but bits and pieces are collected and pieced together by computer systems to monitor
certain activity
AUMF – The Authorization for Use of Military Force – this is a piece of legislation signed by congress
after the attacks of 9/11 and authorizes the use of United States Armed Forces against those responsible for
the attacks on September 11, 2001. The authorization granted the President the authority to use all "necessary
and appropriate force" against those whom he determined "planned, authorized, committed or aided" the
September 11th attacks, or who harbored said persons or groups.
Al Qaeda – Al Qaeda is one of the largest terrorist networks in the world that is a radical fundamentalist
group often held responsible for the 9/11 attacks. They have networks operating all across the globe in various
countries in Africa, Europe and Central Asia.
AQAP – Al Qaeda in the Arabian Peninsula – it is considered one of Al Qaeda’s most active branches and
operates primarily in Yemen and Saudi Arabia
ISIS – The Islamic State of Iraq – this is an extremist terrorist organization that occupies territory in Syria
and Iraq. While many folks that subscribe to Islam denounce the activities of ISIS, they are held responsible
for war crimes, genocide, and massive ethnic cleansing in the region and are one of the most active terrorist
groups attempting to retaliate against the United States
2
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Uniqueness
Terrorism Disadvantage (1NC) (N/JV/V Only) (1/3)
1. Domestic surveillance activities are expanding with no expectation to decline
Dahl, Assistant Professor at Nataval Postgraduate School, 2011
(Erik. “Domestic Intelligence Today: More Security but Less Liberty?.” Homeland Security
Affairs 7, 10 Years After: The 9/11 Essays (September 2011). https://www.hsaj.org/articles/67
Unless the threat situation changes dramatically, we
are not likely to see a new American domestic intelligence agency
anytime soon. In the place of an “American MI-5,” however, a huge and expensive domestic intelligence
system has been constructed. This system has thus far succeeded in keeping America safer than most
experts would have predicted ten years ago, but it has also reduced civil liberties in ways that many Americans fail to understand. Precisely
because it was unplanned and is decentralized, this domestic intelligence system has not received the oversight it deserves. In the long run, American liberty as well
as
security will gain from a fuller discussion of the benefits and risks of homeland security intelligence.
3
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Uniqueness
Terrorism Disadvantage (1NC) (2/3)
2. Curtailing domestic surveillance prevents intelligence agencies from stopping a terrorist
attack – this is empirically true
Inserra, Research Associate from the Heritage Foundation, 2015
("68th Terrorist Plot Calls for Major Counterterrorism Reforms,"
www.heritage.org/research/reports/2015/05/68th-terrorist-plot-calls-for-major-counterterrorism-reforms
This 68th Islamist terrorist plot or attack is the 57th homegrown terrorist attack or plot and the 10th
targeting a mass gathering, the third most common target. The attack also comes as part of a recent wave of attacks
and plots, as this is the sixth Islamist terrorist plot or attack in 2015. All of the plots and attacks this
year have been perpetrated by individuals who claim to support the Islamic State to varying degrees. The FBI has stated that
Simpson wanted to commit jihad with ISIS, and press reports indicate that he may have been in secret communications with ISIS members.[6]
Regardless, with these attacks and the increasing numbers of individuals in the U.S. seeking to support
or join ISIS and al-Qaeda affiliates, the U.S. is currently facing what is arguably the most concentrated
period of terrorist activity in the homeland since 9/11. Director James Comey of the FBI has recent warned that
“hundreds, maybe thousands” of individuals across the U.S. are being directly solicited by ISIS and
urged to attack. Other senior officials, including Secretary of Homeland Security Jeh Johnson, the Director of National Intelligence James Clapper, and the
director of the National Counterterrorism Center Nicholas Rasmussen have also noted the increasing threat of terrorism here at home.[7]
Strengthening the Counterterrorism Enterprise
In light of these warnings, the U.S. cannot be passive. Heritage has recommended numerous counterterrorism policies for Congress to
address, including:
Streamlining U.S. fusion centers. Congress should limit fusion centers to the approximately 30 areas with the greatest level of risk as identified by the Urban Area
Security Initiative (UASI). Some exceptions might exist, such as certain fusion centers that are leading cybersecurity or other important topical efforts. The
remaining centers should then be fully funded and resourced by UASI.
Pushing the FBI toward being more effectively driven by intelligence. While the FBI has made highlevel changes to its mission and organizational structure, the bureau is still working to integrate
intelligence and law enforcement activities. This will require overcoming cultural barriers and
providing FBI intelligence personnel with resources, opportunities, and the stature they need to become
a more effective and integral part of the FBI.
Ensuring that the FBI shares information more readily and regularly with state and local law enforcement and treats state and local partners as critical actors in the
fight against terrorism. State, local, and private-sector partners must send and receive timely information from the FBI. The Department of Homeland Security (DHS)
should play a role in supporting these partners’ efforts by acting as a source or conduit for information to partners and coordinating information sharing between the
FBI and its partners.
Designating an office in DHS to coordinate countering violent extremism (CVE) efforts. CVE efforts are spread across all levels of government and society. DHS is
uniquely situated to lead the federal government’s efforts to empower local partners. Currently, DHS’s CVE working group coordinates efforts across DHS
components, but a more substantial office will be necessary to manage this broader task.
Supporting state, local, and civil society partners. Congress and the Administration should not lose sight of the fact that all of the federal government’s efforts must
be focused on empowering local partners. The federal government is not the tip of the spear for CVE efforts; it exists to support local partners who are in the best
position to recognize and counter radicalization in their own communities.
Maintaining essential counterterrorism tools. Support for important investigative tools is essential to
maintaining the security of the U.S. and combating terrorist threats. Legitimate government surveillance
programs are also a vital component of U.S. national security and should be allowed to continue. The need
for effective counterterrorism operations, however, does not relieve the government of its obligation to follow the law and respect individual privacy and liberty. In
the American system, the government must do both equally well.
4
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Uniqueness
Terrorism Disadvantage (1NC) (3/3)
3. Another terrorist attack could lead to a downward spiral of world destruction
LIFTON '05
(Robert Jay, visiting prof of psychiatry @ Harvard Med Schl, "In the Lord's Hands," Annual Editions: Violence & Terrorism 05/06, p. 151)
Woodward ends his book on Bush on a mystical note. He describes a scene in which twenty-five men from different Special Forces
and CIA tams gather at a desolate site in Afghanistan, where they have arranged a pile of rocks as a tombstone over a buried piece of the demolished World Trade
Center. One of the men leads a prayer as others kneel, consecrating the spot as a memorial to the dead of September 11, and then declares: "We
will export
death and violence to the four corners of the earth in defense of our great nation." Woodward presents
the scene as depicting the determination of an aggrieved nation to strike back. But it also suggests a
sequence leading from memorialization to self-defense to apocalyptic militarism.
Such fundamentalist and apocalyptic tendencies by no means determine all of American policy,
which can alternate with inclinations toward pragmatic restraint. But impulses toward regeneration
through apocalyptic violence are an ever-present danger.
an ongoing dynamic in
which the American apocalyptic interacts, almost to the point of collusion, with the Islamist apocalyptic, each
intensifying the other in an escalating process that has in it the potential seeds of world destruction.
The Bush administration should by no means be seen as a mirror image of bin Laden or Islamism. Rather it is part of
We are capable of extricating ourselves from this dynamic, of more measured approaches and more humane applications of our considerable power and influence
in the world.
5
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Uniqueness
Surveillance increasing now
(__)
(__) FBI terrorism surveillance activities are increasing now and effective in the status quo
Dahl, Assistant Professor at Nataval Postgraduate School, 2011
Erik. “Domestic Intelligence Today: More Security but Less Liberty?.” Homeland Security Affairs 7, 10
Years After: The 9/11 Essays (September 2011). https://www.hsaj.org/articles/67
The FBI is expanding its domestic intelligence and surveillance operations in other ways, as well. It is
changing its own internal rules to give its agents more leeway to conduct investigations and
surveillance, such as by searching databases or sorting through a person’s trash.35 And it appears to be
making greater use of undercover informants in intelligence investigations, leading in some cases to
successful arrests and prosecutions, but in others to controversy.36
(__) Newest government reports show surveillance is increasing by the government and is
effective
Gilens, ACLU Speech, Privacy and Technology Project, 2012
(Naomi, ACLU, "New Justice Department Documents Show Huge Increase in Warrantless Electronic
Surveillance," https://www.aclu.org/blog/new-justice-department-documents-show-huge-increasewarrantless-electronic-surveillance
Justice Department documents released today by the ACLU reveal that federal law enforcement
agencies are increasingly monitoring Americans’ electronic communications, and doing so without
warrants, sufficient oversight, or meaningful accountability. The documents, handed over by the
government only after months of litigation, are the attorney general’s 2010 and 2011 reports on the use of
“pen register” and “trap and trace” surveillance powers. The reports show a dramatic increase in the use of
these surveillance tools, which are used to gather information about telephone, email, and other
Internet communications. The revelations underscore the importance of regulating and overseeing the
government’s surveillance power. (Our original Freedom of Information Act request and our legal
complaint are online.)
(__) Data shows electronic surveillance is on the rise
Gilens, ACLU Speech, Privacy and Technology Project, 2012
(Naomi, ACLU, "New Justice Department Documents Show Huge Increase in Warrantless Electronic
Surveillance," https://www.aclu.org/blog/new-justice-department-documents-show-huge-increasewarrantless-electronic-surveillance
Electronic Surveillance Is Sharply on the Rise The reports that we received document an enormous
increase in the Justice Department’s use of pen register and trap and trace surveillance. As the chart
below shows, between 2009 and 2011 the combined number of original orders for pen registers and trap
and trace devices used to spy on phones increased by 60%, from 23,535 in 2009 to 37,616 in 2011.
6
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Surveillance prevents terrorist plots
(__)
(__) Domestic surveillance solves terrorist plots – since 9/11, the NSA program has prevent 50
homeland threats
New York Times, 2013
(Charlie Savage, "N.S.A. Chief Says Surveillance Has Stopped Dozens of Plots,"
www.nytimes.com/2013/06/19/us/politics/nsa-chief-says-surveillance-has-stopped-dozens-ofplots.html?_r=0)
WASHINGTON — Top national security officials on Tuesday promoted two newly declassified
examples of what they portrayed as “potential terrorist events” disrupted by government surveillance.
The cases were made public as Congress and the Obama administration stepped up a campaign to
explain and defend programs unveiled by recent leaks from a former intelligence contractor.
One case involved a group of men in San Diego convicted of sending money to an extremist group in
Somalia. The other was presented as a nascent plan to bomb the New York Stock Exchange, although its
participants were not charged with any such plot. Both were described by Sean Joyce, deputy director of the
Federal Bureau of Investigation, at a rare public oversight hearing by the House Intelligence Committee.
At the same hearing, Gen. Keith B. Alexander, the head of the National Security Agency, said that
American surveillance had helped prevent “potential terrorist events over 50 times since 9/11,”
including at least 10 “homeland-based threats.” But he said that a vast majority of the others must remain
secret.
7
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Surveillance prevents terrorist plots
(__)
(__) Limiting surveillance prevents the government from accessing critical information to
prevent a terrorist attack on US soil
Bergen et al, Director of the National Security Program at the New America Foundation, 2014
(Peter, "DO NSA'S BULK SURVEILLANCE PROGRAMS STOP TERRORISTS?,"
https://static.newamerica.org/attachments/1311-do-nsas-bulk-surveillance-programs-stopterrorists/IS_NSA_surveillance.pdf
June 5, 2013, the Guardian broke the first story in what would become a flood of revelations regarding
the extent and nature of the NSA’s surveillance programs. Facing an uproar over the threat such programs
posed to privacy, the Obama administration scrambled to defend them as legal and essential to U.S.
national security and counterterrorism. Two weeks after the first leaks by former NSA contractor Edward
Snowden were published, President Obama defended the NSA surveillance programs during a visit to
Berlin, saying: “We know of at least 50 threats that have been averted because of this information not
just in the United States, but, in some cases, threats here in Germany. So lives have been saved.” Gen.
Keith Alexander, the director of the NSA, testified before Congress that: “the information gathered from
these programs provided the U.S. government with critical leads to help prevent over 50 potential
terrorist events in more than 20 countries around the world.” Rep. Mike Rogers (R-Mich.), chairman of
the House Permanent Select Committee on Intelligence, said on the House floor in July that “54 times
[the NSA programs] stopped and thwarted terrorist attacks both here and in Europe – saving real
lives.”
8
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Surveillance prevents terrorist plots
(__)
(__) Domestic surveillance data mining capabilities prevents a terrorist attack before it is too
late
Yoo, Professor at University of California- Berkeley Law School, 2007
(John, "THE TERRORIST SURVEILLANCE PROGRAM AND THE CONSTITUTION," SSRN)
It seems that critics are mostly interested in blindly limiting the powers of the government, even as it
fights a tough war. They presume the American government to be acting in bad faith, and so all of its
activities must be treated with the highest possible level of suspicion. Meanwhile, data mining technology
and databases are exploding in the private sector.121 It would be ironic if al Qaeda and private
individuals were permitted greater legal access to new data technology than our own government,
especially in wartime. Overreaction and plain scare tactics killed TIA, a potentially valuable tool to
counter al Qaeda’s offensive within the United States.122 It made little sense to cut off TIA at the
research and development stage out of sheer anti-government paranoia. There was no chance to see what
computer technology could even do, no discussion of whether adequate safeguards for privacy could be
installed, and no opportunity to evaluate whether data mining would yield leads on terrorist activity that
would be worth any costs to privacy. No analysis could be done on the legal issues. Perhaps worst of all, we
could never explore the ways that computers could be used to protect privacy. Data mining scans many
perfectly innocent transactions and activities, but this in itself does not make the search illegal; even
searches of homes and businesses or wiretaps with warrants will encounter many items or
communications that are not linked to criminal activity.123 The understandable concern is that much
innocent activity will come under scrutiny by data (discussing the need for an attenuated probable cause
requirement in the national security context, because “intelligence officers will often not have a good
idea . . . what they are looking for”).. 21 mining, unless controlled in some way by a warrant
requirement.124 But if computers are doing the primary scanning, privacy might not be implicated
because no human eyes would ever have seen the data.125 Only when the computer programs highlight
individuals who fit parameters that reasonably suggest further study for terrorist links—say a young
man who has traveled from Ohio to Pakistan several times, has taken flight lessons in the U.S., has
received large deposits of cash wired into his account from abroad, and has purchased equipment that
could be used for bomb-making—would a human intelligence officer view the records
9
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Surveillance is necessary for timely response
(__)
(__) The plan prevents a swift and timely response to a terrorist attack – domestic surveillance
is key to act upon attacks on the US before it is too late
Yoo, Professor at University of California- Berkeley Law School, 2007
(John, "THE TERRORIST SURVEILLANCE PROGRAM AND THE CONSTITUTION," SSRN)
Yet, when Congress delegates broad authority to the President to defend the nation from attack, critics
demand that Congress list every power it wishes to authorize.192 While the threats to individual liberty
may be greater in this setting, it makes little sense to place Congress under a heavier burden to describe
every conceivable future contingency that might arise when we are fighting a war, perhaps the most
unpredictable and certainly most dangerous of human endeavors. Rather, we would expect and want
Congress to delegate power to that branch, Executive, which is best able to act with speed to combat
threats to our national security.193 War is too difficult to plan for with fixed, antecedent legislative
rules, and war also is better run by the executive, which is structurally designed to take quick, decisive
action. If the AUMF authorized the President to detain and kill the enemy,194 the ability to search for
them is necessarily included.
10
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Surveillance allows meta-data intelligence
(__)
(__) Domestic surveillance is necessary for the collection of meta-data. This data is critical to
stopping terrorist plots
Lewis, Fellow at the Center for Strategic and International Studies Fellow, 2014,
(James A. "Underestimating Risk in the Surveillance Debate,"
csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf)
NSA carried out two kinds of signals intelligence programs: bulk surveillance to support
counterterrorism and collection to support U.S. national security interests. The debate over surveillance
unhelpfully conflated the two programs. Domestic bulk collection for counterterrorism is politically
problematic, but assertions that a collection program is useless because it has not by itself prevented an
attack reflect unfamiliarity with intelligence. Intelligence does not work as it is portrayed in films—solitary
agents do not make startling discoveries that lead to dramatic, last-minute success. Success is the product of
the efforts of teams of dedicated individuals from many agencies, using many tools and techniques,
working together to assemble fragments of data from many sources into a coherent picture. In practice,
analysts must simultaneously explore many possible scenarios. A collection program contributes by not
only what it reveals, but also what it lets us reject as false. The Patriot Act Section 215 domestic bulk
telephony metadata program provided information that allowed analysts to rule out some scenarios and
suspects. The consensus view from interviews with current and former intelligence officials is that while
metadata collection is useful, it is the least useful of the collection programs available to the intelligence
community. If there was one surveillance program they had to give up, it would be 215, but this would
not come without an increase in risk. Restricting metadata collection will make it harder to identify
attacks and increase the time it takes to do this
11
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Surveillance creates bulk intelligence
(__)
(__) NSA surveillance use bulk collection as key piece to the intelligence puzzle
stopping terrorist plots
Lewis, Fellow at the Center for Strategic and International Studies Fellow, 2014,
(James A. "Underestimating Risk in the Surveillance Debate,"
csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf)
NSA carried out two kinds of signals intelligence programs: bulk surveillance to support
counterterrorism and collection to support U.S. national security interests. The debate over surveillance
unhelpfully conflated the two programs. Domestic bulk collection for counterterrorism is politically
problematic, but assertions that a collection program is useless because it has not by itself prevented an
attack reflect unfamiliarity with intelligence. Intelligence does not work as it is portrayed in films—solitary
agents do not make startling discoveries that lead to dramatic, last-minute success. Success is the product of
the efforts of teams of dedicated individuals from many agencies, using many tools and techniques,
working together to assemble fragments of data from many sources into a coherent picture. In practice,
analysts must simultaneously explore many possible scenarios. A collection program contributes by not
only what it reveals, but also what it lets us reject as false. The Patriot Act Section 215 domestic bulk
telephony metadata program provided information that allowed analysts to rule out some scenarios and
suspects. The consensus view from interviews with current and former intelligence officials is that while
metadata collection is useful, it is the least useful of the collection programs available to the intelligence
community. If there was one surveillance program they had to give up, it would be 215, but this would
not come without an increase in risk. Restricting metadata collection will make it harder to identify
attacks and increase the time it takes to do this
12
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Surveillance uncovers terrorist financing
(__)
(__) Domestic surveillance capabilities are key to find terrorist organizations and freeze their
assets
Lormel, Chief of Financial Crimes, FBI, 2002,
(Dennis, Testimony Before the House Committee on Financial Services, Subcommittee on Oversight and
Investigations, www.fbi.gov/news/testimony/financing-patterns-associated-with-al-qaeda-and-global-terroristnetworks
As a participant on the National Security Council's Policy Coordinating Committee (PCC) on terrorist
financing, chaired by Treasury Department General Counsel David Aufhauser, the FRG continues to
function in a leadership role in the efforts to target Non-Governmental Organizations (NGOs) believed
to provide financial support to known Foreign Terrorist Organizations (FTO) and other affiliated
terrorist cells. The FRG is currently actively involved in the coordination of twelve multi-jurisdictional NGO
investigations. In order to disrupt the terrorist financing channels, the FRG has coordinated these and
other FBI terrorist investigations with the terrorist designation and asset freezing efforts of the
Department of Treasury's Office of Foreign Assets Control (OFAC) and Operation Green Quest. These
efforts have resulted in the freezing of millions of dollars in foreign and U.S. bank accounts.
Specifically, the joint efforts targeting Al-Barakaat, the Holy Land Foundation for Relief and
Development, the Global Relief Foundation, and the Benevolence International Foundation have
resulted in the execution of numerous search warrants and the disruption of the fund-raising and
money remittance operations of these and other NGOs. Financial investigations of these entities have
revealed that approximately $200 million in contributions passed through these organizations each
year. The FRG will also coordinate with the Department of the Treasury in its other initiatives in order to help
ensure their success.
13
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Surveillance uncovers terrorist financing - extension
(__)
(__) Finance and money are the lifeblood to terrorist efforts – the plan prevents the
governments ability to dismantle terrorist groups
Lormel, Chief of Financial Crimes, FBI, 2002,
(Dennis, Testimony Before the House Committee on Financial Services, Subcommittee on Oversight and
Investigations, www.fbi.gov/news/testimony/financing-patterns-associated-with-al-qaeda-and-global-terroristnetworks
Identifying, tracking, and dismantling the financial structure supporting terrorist groups is critical to
successfully dismantling the organization and preventing future terrorist attacks. As is the case in so
many types of criminal investigations, identifying and "following the money" plays a critical role in
identifying those involved in the criminal activity, establishing links among them, and developing
evidence of their involvement in the activity. In the early stages of the investigation into the events of
September 11, it was financial evidence that quickly established direct links among the hijackers of the
four flights and helped identify co-conspirators.
14
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Surveillance uncovers terrorist financing- extension
(__)
(__) Domestic surveillance is critical to terrorism financing
Yoo, Professor at University of California- Berkeley Law School, 2007
(John, "THE TERRORIST SURVEILLANCE PROGRAM AND THE CONSTITUTION," SSRN)
Data mining is the best hope for an innovative counter-terrorism strategy to detect and prevent future
al Qaeda attacks. Rather than hope an agent will one day penetrate al Qaeda’s inner circles—a dubious
possibility—or that we will successfully seal our vast borders from terrorists, data mining would allow
us to see patterns of activity that reveal the al Qaeda network’s activity before it can attack.92
Computerized pattern analysis could quickly reveal whether anyone linked to al Qaeda made large
purchases of chemicals or equipment that could be used for explosives or chemical weapons. We could
learn whether they traveled regularly to certain cities, and we could discover where they stayed and
who they called in those cities. As civil libertarians complain, almost all transactions of this nature—
calling, emailing, spending money, traveling—are innocent.93 We engage in them every day. That is
exactly why al Qaeda has trained its operatives to use them as tools to conceal their plots.94 Al Qaeda’s
leaders understand the difficulty in analyzing billions of transactions and interactions every day to
detect their cells, and they realize that western societies impose legal obstacles on government access to
such information.95 Civil libertarian critics don’t seem to have noticed that our government already employs
modest forms of data mining to track down criminals and terrorists. In response to drug cartels and organized
crime, our government has used simple data mining to track and analyze money flows for years.96
Banks and financial institutions provide records of financial transactions to the Department of the Treasury,
which searches the patterns for money laundering activity.97 While the great majority of the transactions
are legal, the information can piece together proof of criminal links after a conspiracy has been
stopped, or it can help indicate suspicious activity that demands further investigation.98 Analyzing
money flows has also proven to be an important tool in detecting and breaking up terrorist networks.99
If civil libertarians are right, consumers would also have an absolute right to privacy over their
banking transactions and our government would lose this valuable, commonsense tool to combat crime,
as well as terrorism. Two examples illustrate this point: (1) the NSA’s use of phone records and (2) the
Total Information Awareness program.
15
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Financing is key to terrorist efforts
(__)
(__) Financing is the key to terrorist efforts to launch an attack on US soil
Lormel, Chief of Financial Crimes, FBI, 2002,
(Dennis, Testimony Before the House Committee on Financial Services, Subcommittee on Oversight and
Investigations, www.fbi.gov/news/testimony/financing-patterns-associated-with-al-qaeda-and-global-terroristnetworks
Cutting off the financial lifeblood of individuals and organizations responsible for acts of terrorism is a
vital step in dismantling the organization and preventing future terrorist acts. The FBI is leading law
enforcement efforts to accomplish this mission. The USA PATRIOT Act has provided law enforcement
with powerful new tools to assist in accomplishing this mission. The FBI welcomes the opportunity to
work with this Subcommittee and others to ensure that law enforcement efforts can be the most
effective. I would welcome any questions you may have at this time. Thank you.
16
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Surveillance solves Al Qaeda sleeper cells
(__)
(__) Domestic Surveillance is key to combat necessary to track and thwart Al Qaeda sleeper
cells
Yoo, Professor at University of California- Berkeley Law School, 2007
(John, "THE TERRORIST SURVEILLANCE PROGRAM AND THE CONSTITUTION," SSRN)
These privacy concerns are exaggerated. The Supreme Court has found that such information does not
receive Fourth Amendment protection because the consumer has already voluntarily turned over the
information to a third party.108 It is not covered by FISA because no electronic interception or
surveillance of the calls has occurred.109 Meanwhile, the data is potentially of enormous use in
frustrating al Qaeda plots. If our agents are pointed to members of an al Qaeda sleeper cell by a U.S.
phone number found in a captured al Qaeda leader’s cell phone, call pattern analysis would allow the
NSA to determine the extent of the network and its activities.110 It could track the sleeper cell as it
periodically changed phone numbers.111 This could give a quick, initial database-generated glimpse of
the possible size and activity level of the cell in an environment where time is of the essence
17
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Answer to: Surveillance fails at solving a terrorist attack
(__)
(__) Surveillance capabilities are an integral part to preventing a terrorist attack – it’s the
foundation of all other counter-terror capabilities
The Guardian, May 10, 2015
("Intelligence leaders cite Texas attack before deadline on NSA surveillance," www.theguardian.com/usnews/2015/may/10/nsa-surveillance-domestic-texas-isis
“This threat is like finding a needle in a haystack and it’s going to get worse, not better,” McCaul
added. “I think the threat environment today is one of the highest I have ever seen.” Controversial NSA
powers to monitor suspicious communication by collecting all American phone records are due to
expire at the end of the month, a circumstance that was dramatically complicated by a US appeal court
judgment on Thursday ruling the practice first revealed by Edward Snowden to be unlawful. A number of
lawmakers warned on Sunday the Garland attack showed why it was essential Congress face down
opposition to the so-called “bulk collection” programme and reauthorise the original Patriot Act
provision, despite Thursday’s legal challenge. “I hope that the reality of the situation, the reality of the
threats we face, will actually play a great part in terms of exactly how Congress responds,” Senate
homeland security chairman Ron Johnson told CNN. “Our first line of defence is an effective intelligencegathering capability,” the Wisconsin Republican added. “I think the demagoguery and the revelations of
Edward Snowden have done a great deal of harm to our ability to gather that information.” Richard
Burr, Republican chair of the Senate intelligence committee, also insisted the Patriot Act provision should be
reauthorised rather than amended when it expires on 1 June. “It’s very effective at keeping America safe,”
he told ABC, claiming the alternative USA Freedom Act, which would rely on phone companies to keep
records rather than the NSA, “turns us back to pre-9/11” days.
18
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Answer to: Surveillance fails at solving a terrorist attack
(__)
(__) The utility of domestic surveillance in combatting terrorism is empirically proven – there
have been over 50 plots thwarted since 9/11
New York Times, 2013
(Charlie Savage, "N.S.A. Chief Says Surveillance Has Stopped Dozens of Plots," www.nytimes.com/2013/06/19/us/politics/nsachief-says-surveillance-has-stopped-dozens-of-plots.html?_r=0)
WASHINGTON — Top national security officials on Tuesday promoted two newly declassified
examples of what they portrayed as “potential terrorist events” disrupted by government surveillance.
The cases were made public as Congress and the Obama administration stepped up a campaign to
explain and defend programs unveiled by recent leaks from a former intelligence contractor.
One case involved a group of men in San Diego convicted of sending money to an extremist group in
Somalia. The other was presented as a nascent plan to bomb the New York Stock Exchange, although its
participants were not charged with any such plot. Both were described by Sean Joyce, deputy director of the
Federal Bureau of Investigation, at a rare public oversight hearing by the House Intelligence Committee.
At the same hearing, Gen. Keith B. Alexander, the head of the National Security Agency, said that
American surveillance had helped prevent “potential terrorist events over 50 times since 9/11,”
including at least 10 “homeland-based threats.” But he said that a vast majority of the others must remain
secret.
19
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Links
Extension: Surveillance is necessary for stopping a
terrorist attack
(__)
(__) NSA surveillance is critical for information to stop a terrorist attack – this has empirically
been proven
Bergen et al, Director of the National Security Program at the New America Foundation, 2014
(Peter, "DO NSA'S BULK SURVEILLANCE PROGRAMS STOP TERRORISTS?,"
https://static.newamerica.org/attachments/1311-do-nsas-bulk-surveillance-programs-stopterrorists/IS_NSA_surveillance.pdf
June 5, 2013, the Guardian broke the first story in what would become a flood of revelations regarding
the extent and nature of the NSA’s surveillance programs. Facing an uproar over the threat such programs
posed to privacy, the Obama administration scrambled to defend them as legal and essential to U.S.
national security and counterterrorism. Two weeks after the first leaks by former NSA contractor Edward
Snowden were published, President Obama defended the NSA surveillance programs during a visit to
Berlin, saying: “We know of at least 50 threats that have been averted because of this information not
just in the United States, but, in some cases, threats here in Germany. So lives have been saved.” Gen.
Keith Alexander, the director of the NSA, testified before Congress that: “the information gathered from
these programs provided the U.S. government with critical leads to help prevent over 50 potential
terrorist events in more than 20 countries around the world.” Rep. Mike Rogers (R-Mich.), chairman of
the House Permanent Select Committee on Intelligence, said on the House floor in July that “54 times
[the NSA programs] stopped and thwarted terrorist attacks both here and in Europe – saving real
lives.”
20
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Immigration Surveillance prevents terrorism
(__)
(__) Terrorist will use exploit a lax immigration system in order to get in the U.S
Kephart, Researcher at Center for Immigration Studies, 2005
[Janice, “Moving Beyond the 9/11 Staff Report on Terrorist Travel”, http://cis.org/articles/2005/kephart.html]
The report highlights the danger of our lax immigration system, not just in terms of who is allowed in, but
also how terrorists, once in the country, used weaknesses in the system to remain here. The report makes
clear that strict enforcement of immigration law -- at American consulates overseas, at ports of entry, and
within the United States -- must be an integral part of our efforts to prevent future attacks on U.S. soil.
Among the findings: Of the 94 foreign-born terrorists who operated in the United States, the study found
that about two-thirds (59) committed immigration fraud prior to or in conjunction with taking part in
terrorist activity. Of the 59 terrorists who violated the law, many committed multiple immigration
violations -- 79 instances in all. In 47 instances, immigration benefits sought or acquired prior to 9/11
enabled the terrorists to stay in the United States after 9/11 and continue their terrorist activities. In at
least two instances, terrorists were still able to acquire immigration benefits after 9/11. Temporary visas
were a common means of entering; 18 terrorists had student visas and another four had applications approved
to study in the United States. At least 17 terrorists used a visitor visa -- either tourist (B2) or business (B1).
There were 11 instances of passport fraud and 10 instances of visa fraud; in total 34 individuals were
charged with making false statements to an immigration official. In at least 13 instances, terrorists
overstayed their temporary visas. In 17 instances, terrorists claimed to lack proper travel documents and
applied for asylum, often at a port of entry. Fraud was used not only to gain entry into the United States, but
also to remain, or "embed," in the country. Seven terrorists were indicted for acquiring or using various
forms of fake identification, including driver's licenses, birth certificates, Social Security cards, and
immigration arrival records. Once in the United States, 16 of 23 terrorists became legal permanent
residents, often by marrying an American. There were at least nine sham marriages. In total, 20 of 21 foreign
terrorists became naturalized U.S. citizens.
21
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Immigration Surveillance prevents terrorism
(___)
(___) Effective immigration surveillance could have prevented 9/11
Kobach, Professor of Law, University of Missouri (Kansas City), 2005
[THE QUINTESSENTIAL FORCE MULTIPLIER: THE INHERENT AUTHORITY OF LOCAL POLICE
TO MAKE IMMIGRATION ARRESTS. Albany Law Review, 69(1), 179-235.
Of critical importance is the fact that all four of the hijackers who were stopped by local police prior to
9/11 had violated federal immigration laws and could have been detained by the state or local police
officers. Indeed, there were only five hijackers who were clearly in violation of immigration laws while
in the United States— and four of the five were encountered by state or local police officers.'' These were
four missed opportunities of tragic dimension. Had information about their immigration violations been
disseminated to state and local police through the NCIC system, the four terrorist aliens could have
been detained for their violations. Adding even greater poignancy to these missed opportunities is the
fact that they involved three of the four terrorist pilots of 9/11. Had the police officers involved been
able to detain Atta, Hanjour, and Jarrah, these three pilots would have been out of the picture. It is
difficult to imagine the hijackings proceeding without three of the four pilots.*
22
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Immigration Surveillance prevents terrorism
(__) Surveillance of undocumented immigrants is key to preventing another terrorist attack
such as the one that occurred on 9/11/
Kobach, Professor of Law, University of Missouri (Kansas City), 2005
[THE QUINTESSENTIAL FORCE MULTIPLIER: THE INHERENT AUTHORITY OF LOCAL POLICE
TO MAKE IMMIGRATION ARRESTS. Albany Law Review, 69(1), 179-235.
The fact that the 9/11 terrorists had been able to exploit weaknesses in the enforcement of immigration
laws was not surprising to those engaged in the execution of federal immigration law. Enforcing the
immigration laws is one of the most daunting challenges faced by the federal government. With an estimated
7 to 10 million illegal aliens already present in the United States" and fewer than 2000 interior enforcement
agents at its disposal, the U.S. Bureau of Immigration and Customs Enforcement (ICE) has a Herculean task
on its hands—one that it cannot easily accomplish alone.^ After 9/11, it became clear that an effective
domestic war against terrorism would require improvements in the enforcement of immigration laws.
On June 6, 2002, Attorney General John Ashcroft announced the National Security Entry-Exit Registration
System (NSEERS), a program that would require high-risk alien visitors to provide fingerprints and extensive
biographical information. It would also require such aliens to re-register with U.S. immigration officials
periodically a n d would, for t h e first time, impose real-time departure controls on such high-risk visitors.*
Violators of the NSEERS requirements would be listed in the National Crime Information Center (NCIC)
database, accessible in the squad cars of most local police departments, allowing local law enforcement
officers to make arrests of such high-risk immigration law . Had local police officers had access to the
names of the five 9/11 hijackers who violated civil provisions of the Immigration and Nationality Act
(INA) prior to the attack, they might have been able to arrest and detain one or more of the hijackers.
The assistance of state and local law enforcement agencies can also mean the difference between success
and failure in enforcing the nation's immigration laws generally. The nearly 800,000 police officers
nationwide represent a massive force multiplier.' This assistance need only be occasional, passive,
voluntary, and pursued during the course of normal law enforcement activity. The net that is cast daily by
local law enforcement during routine encounters with members of the public is so immense that it is
inevitable illegal aliens will be identified. When a local police officer establishes probable cause to
believe that an alien is in violation ofU.S. immigration law, he may contact the ICE Law Enforcement
Support Center in Williston, Vermont, to confirm that ICE wishes to take custody of the alien."*
23
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
NSA Reform makes finding terrorists harder
(__)
(__) Reforming the NSA still prevents critical data gathering to thwart a terrorist attack and
hampers the ability for the government to effectively respond in a timely manner
Schneier, computer security and intelligence specialist, 2013
("The NSA-Reform Paradox: Stop Domestic Spying, Get More Security,"
www.theatlantic.com/politics/archive/2013/09/the-nsa-reform-paradox-stop-domestic-spying-get-moresecurity/279537/)
Any solution we devise will make the NSA less efficient at its eavesdropping job. That's a trade-off we
should be willing to make, just as we accept reduced police efficiency caused by requiring warrants for
searches and warning suspects that they have the right to an attorney before answering police
questions. We do this because we realize that a too-powerful police force is itself a danger, and we need to
balance our need for public safety with our aversion of a police state.
The same reasoning needs to apply to the NSA. We want it to eavesdrop on our enemies, but it needs to
do so in a way that doesn’t trample on the constitutional rights of Americans, or fundamentally
jeopardize their privacy or security. This means that sometimes the NSA won’t get to eavesdrop, just as the
protections we put in place to restrain police sometimes result in a criminal getting away. This is a trade-off
we need to make willingly and openly, because overall we are safer that way.
24
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
NSA Reform makes finding terrorists harder
(__)
(__) NSA needs to maintain its secrecy to not compromise classified data – the plan collapses
that by forcing agencies to disclose classified info about counter-terror efforts that allows
organizations like Al Qaeda to continue
Yoo, Professor at University of California- Berkeley Law School, 2007
(John, "THE TERRORIST SURVEILLANCE PROGRAM AND THE CONSTITUTION," SSRN)
If ever there were an emergency that Congress could not prepare for, it was the war brought upon the United
States on 9/11. FISA was a law written with Soviet spies working out of their embassy in Washington, D.C. in
mind.221 No one then anticipated war with an international terrorist organization wielding the
destructive power of a nation. The Presidency was the institution of government best able to respond
quickly to the 9/11 attacks and to take measures to defeat al Qaeda’s further efforts. While the
certainty and openness of a congressional act would certainly be desirable, the success of the NSA
surveillance program depends on secrecy and agility, two characteristics Congress as an institution
lacks.
25
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Impact Extensions - Terrorism
(
) Unchecked terrorism ends in extinction
GORDON ’02
(Harvey, Visiting Lecturer, Forensic Psychiatry, Tel Aviv Univ, Psychiatric Bulletin, v. 26, p. 285-287, online:
http://pb.rcpsych.org/cgi/content/full/26/8/285.)
terrorism throughout human history has been tragic, until relatively recently it has been more of an irritant than
any major hazard. However, the existence of weapons of mass destruction now renders terrorism a
potential threat to the very existence of human life (Hoge & Rose, 2001). Such potential global destruction, or
globicide as one might call it, supersedes even that of genocide in its lethality. Although religious factors are not the only
determinant of ‘suicide’ bombers, the revival of religious fundamentalism towards the end of the 20th century
renders the phenomenon a major global threat. Even though religion can be a force for good, it can equally be abused as a force for evil.
Although
Ultimately, the parallel traits in human nature of good and evil may perhaps be the most durable of all the characteristics of the human species. There is no need to
apply a psychiatric analysis to the ‘suicide’ bomber because the phenomenon can be explained in political terms. Most participants in terrorism are not usually
mentally disordered and their behaviour can be construed more in terms of group dynamics (Colvard, 2002). On the other hand, perhaps psychiatric
terminology is as yet deficient in not having the depth to encompass the emotions and behaviour of
groups of people whose levels of hate, low self-esteem, humiliation and alienation are such that it is felt
that they can be remedied by the mass destruction of life, including their own.
(
)An attack on US soil inflicts suffering and death against innocent people
Kephart, Researcher at Center for Immigration Studies, 2005 [Janice Kephart, Moving Beyond the 9/11 Staff Report on Terrorist Travel,
http://cis.org/articles/2005/kephart.html]
Al Qaeda operatives discussed here were strategically positioned throughout the United States -- often in places not
previously associated with terrorist activity, such as Peoria and Chicago, Illinois; Columbus, Ohio; Baltimore, Maryland, and its suburbs; Seattle, Washington;
Portland, Oregon; Minneapolis, Minnesota; and upstate New York. A couple of al Qaeda operatives covered in this report are still at large and currently unindicted,
including Adnan Shukrijumah and Aafia Siddiqui, yet are included here because they are high on the FBI's list for questioning and spent long periods of time in the
United States. The lists found throughout this report (under immigration benefit subject headings at the end of each section) begin with
Mir Aimal
Kansi, who in January 1993 opened fire outside CIA headquarters in McLean, Virginia; the most recent cases, from
2004, involve the surveillance cases in New York City; in Charlotte, North Carolina; Nashville, Tennessee; Las Vegas, Nevada; and southern California. All told,
21 of these terrorists committed five attacks against U.S. interests causing a total of 3,341 deaths and
8,463 injuries; 29 were involved in 12 unexecuted plots. Five hijackers from 9/11 had clear immigration
violations, while one (Marwan Al-Shehhi), had a possible violation; thus, 13 hijackers are not included in the chart below. I do not discuss
the 9/11 plotters in this report or other earlier terrorists in detail, as each is covered in 9/11 and Terrorist Travel. In 47 instances, immigration
benefits sought or acquired prior to 9/11 enabled the terrorists to stay in the United States after 9/11 and
continue their terrorist activities. This includes three terrorists whose visas or entries into the United States were on 9/2/01, 9/6/01 and 9/10/01. In
three instances, terrorists sought immigration benefits after 9/11. One political asylee associated with the 9/11 hijackers was denied and deported after having
previous immigration violations. The second managed to maintain his student status in the United States through mid-2002. A third gained legal permanent residency
status in 2002. Although
each of these 94 terrorists had committed an immigration violation of some kind,
criminal charges alone were brought in at least 37 instances and immigration charges in 18. Indictments in 50
cases included both immigration and criminal charges. There have been a total of 15 deportations and 23 criminal
convictions. In 16 instances, individuals were not convicted (e.g., the six 9/11 hijackers), are being held as an enemy combatant (e.g., Khalid Sheikh
Mohammed), or have fled the United States (e.g., Anwar Al-Aulaqi, an imam associated with the 9/11 hijackers and believed to be now in Yemen.)
26
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Terrorism kills
(__)
(__) Terrorism causes countless deaths for innocent civilians
Moon, 9 Ban-Ki, Secretary General of the UN, "United Nations Efforts to Address Terrorism Threat ‘Crucial
to Global Security’, Says Secretary-General, in Message to Vienna Meeting,"
www.un.org/press/en/2009/sgsm12544.doc.htm
Terrorism is a major security threat in today’s world. Countless innocent civilians and the United
Nations itself have suffered heinous terrorist acts. Our efforts to address this problem comprehensively
are crucial to global security. I attach great importance to your work. As you know, I have appointed JeanPaul Laborde to lead the Counter-Terrorism Implementation Task Force [CTIFTF], and have
established a CTITF Office in the Department of Political Affairs. These measures should allow you to
build on your already considerable accomplishments. I congratulate Task Force members for bringing
together more than two dozen entities. Some are focused directly on terrorism, while others bring expertise on
non-proliferation, disarmament, education, cultural and inter-religious dialogue, human rights, peacekeeping,
health and other issues. This range of experience allows the United Nations to address terrorism as part of our
broader mission to promote development, human rights and peace. It also promotes synergies and
information-sharing, and allows each entity to maximize its comparative advantage
27
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Answer to: Terrorist attack is unlikely
(__)
(__) Even if it the risk of the attack is unlikely, the magnitude of the impact means it’s a
relevant concern to act upon
Wolfendale, 7 Jessica, Special Research Center, "Terrorism, Security, and the Threat of Counterterrorism,"
archives.cerium.ca/IMG/pdf/WOLFENDALE_2007_Terrorism_Security_and_the_Threat_of_Counterterroris
m-2.pdf
Despite the relatively low statistical threat to life posed by non-state terrorism, government officials have
portrayed the threat as both immediate and of great magnitude. So there are statements from Phillip
Ruddock and the Australian Prime Minister John Howard claiming that “there is “high probability” of a
terrorist attack occurring sooner rather than later.”18 Similarly, in the United States officials have claimed
that “Terrorism is a clear and present danger to Americans today” and “The threat of international
terrorism knows no boundaries.”19 This view is shared by the general population. Opinion polls in the
United States and in Australia show that the majority of the population believe that the threat of terrorism is
both an imminent and far greater threat than other threats.20 But perhaps the discrepancy between the
actual statistical threat of terrorism and the claims of politicians is not based just on what terrorists
might do now, but also on what they might do in the future. A supporter of radical counterterrorism
measures might accept that the statistical threat of being killed in a terrorist attack is, at present, less
than many other threats but point out that the future threat of what might be called super-terrorism is
significant enough to justify the suspension of civil liberties and the massive spending on defense and
other counterterrorism organizations. Because it is possible that a single act of terrorism could wipe out
hundreds of thousands of people instantly, the mere existence of that possibility is sufficient to make the
threat of terrorism far more significant than the threat posed by crime, disease and poverty
28
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Answer to: Terrorists aren’t a threat
(__)
(__) There is a growing threat of a terrorist attack on US soil due to resentment generated by
US presence abroad
Lewis, Fellow at the Center for Strategic and International Studies Fellow, 2014,
(James A. "Underestimating Risk in the Surveillance Debate,"
csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf)
The echoes of September 11 have faded and the fear of attack has diminished. We are reluctant to
accept terrorism as a facet of our daily lives, but major attacks—roughly one a year in the last five
years—are regularly planned against U.S. targets, particularly passenger aircraft and cities. America’s
failures in the Middle East have spawned new, aggressive terrorist groups. These groups include
radicalized recruits from the West—one estimate puts the number at over 3,000—who will return home
embittered and hardened by combat. Particularly in Europe, the next few years will see an influx of
jihadis joining the existing population of homegrown radicals, but the United States itself remains a
target. America’s size and population make it is easy to disappear into the seams of this sprawling
society. Government surveillance is, with one exception and contrary to cinematic fantasy, limited and
disconnected. That exception is communications surveillance, which provides the best and perhaps the
only national-level solution to find and prevent attacks against Americans and their allies. Some of the
suggestions for alternative approaches to surveillance, such as the recommendation that NSA only
track “known or suspected terrorists,” reflect both deep ignorance and wishful thinking. It is the
unknown terrorist who will inflict the greatest harm
29
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Answers to: ISIS is not a Threat
ISIS is growing in power – all tools are necessary to mitigate their strength
Rojas June 19, 2015 (Nicole; US State Department: Isis knocks off al-Qaeda as leading terrorist oganisation;
www.ibtimes.co.uk/us-state-department-isis-knocks-off-al-qaeda-leading-terrorist-oganisation-1507091; kdf)
The Country Reports on Terrorism by the US State Department, released on 19 June, reveals Isis has beaten
al-Qaeda as the world's leading terrorist organisation. The new report found that the Islamic State in the
Middle East, as well as its partner Boko Haram in Africa, has led to the decline of al-Qaeda's power. It
reported that al-Qaeda leadership "appeared to lose momentum as the self-styled leader of a global movement
in the face of Isil's [Isis] rapid expansion." However, the report noted that al-Qaeda continued to have an
impact on terrorism. "Though AQ central leadership was weakened, the organisation continued to serve
as a focal point of 'inspiration' for a worldwide network of affiliated groups, including al-Qa'ida in the
Arabian Peninsula—a long-standing threat to Yemen, the region, and the United States; al-Qa'ida in the
Islamic Maghreb; a;-Nusrah Front; and al-Shabaab," the report said. The report also found that nearly 33,000
people were killed and another 34,700 were injured in about 13,500 terrorist attacks around the world
last year. According to NBC News, that equates to a 35% increase in terrorist attacks and an 81% rise in
fatalities since 2013. CNN reported that 24 Americans died last year in terrorist attacks, specifically in
Afghanistan, Jerusalem and Somalia. The attacks, which were dominate in Iraq, Pakistan, Afghanistan, India,
Nigeria and Syria, happened in 95 countries total. More aggressive and ruthless attacks Terrorist groups
were conducting more aggressive attacks, which included "ruthless methods of violence such as
beheadings and crucifixions intended to terrify opponents". Isis and Boko Haram also employed tactics
such as "stoning, indiscriminate mass casualty attacks, and kidnapping children for enslavement".
30
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
Al Qaeda is a threat
(___) Al Qaeda’s actions, statements, and internal documents prove they want nuclear
weapons and mass casualty attacks---if the US relents, it guarantees nuclear attacks
Arbuckle, Master’s student in defense analysis Naval Postgraduate School, 2008,
(Larry J., Naval Postgraduate School, "The Deterrence of Nuclear Terrorism through an Attribution
Capability", Thesis for master of science in defense analysis, approved by Professor Robert O'Connell, and
Gordon McCormick, Chairman, Department of Defense Analysis, Naval Postgraduate School, June
However, there is evidence that a small number of terrorist organizations in recent history, and at least one
presently, have nuclear ambitions. These groups include Al Qaeda, Aum Shinrikyo, and Chechen
separatists (Bunn, Wier, and Friedman; 2005). Of these, Al Qaeda appears to have made the most serious
attempts to obtain or otherwise develop a nuclear weapon. Demonstrating these intentions, in 2001 Osama
Bin Laden, Ayman al Zawahiri, and two other al Qaeda operatives met with two Pakistani scientists to
discuss weapons of mass destruction development (Kokoshin, 2006). Additionally, Al Qaeda has made
significant efforts to justify the use of mass violence to its supporters. Sulaiman Abu Ghaith, an al
Qaeda spokesman has stated that al Qaeda, “has the right to kill 4 million Americans – 2 million of
them children,” in retaliation for deaths that al Qaeda links to the U.S. and its support of Israel (as
cited in Bunn, Wier, and Friedman; 2005). Indeed Bin Laden received a fatwa in May 2003 from an
extreme Saudi cleric authorizing the use of weapons of mass destruction against U.S. civilians (Bunn,
Wier, and Friedman; 2005). Further evidence of intent is the following figure taken from al Qaeda
documents seized in Afghanistan. It depicts a workable design for a nuclear weapon. Additionally, the
text accompanying the design sketch includes some fairly advanced weapons design parameters
(Boettcher & Arnesen, 2002). Clearly maximizing the loss of life is key among al Qaeda’s goals. Thus
their use of conventional means of attack presently appears to be a result of their current capabilities
and not a function of their pure preference (Western Europe, 2005).
31
Terrorism Disadvantage (N, JV, & V Only)
SLUDL/NAUDL 2015-16
AQAP is a threat
AQAP has the intent and capability to strike the US homeland
Zimmerman 2012 (Katherine Zimmerman, senior analyst and the al Qaeda and Associated Movements
Team Lead for the American Enterprise Institute’s Critical Threats Project, October 19, 2012, “Al Qaeda in
Yemen: Countering the Threat from the Arabian Peninsula,” AEI Critical Threats,
http://www.criticalthreats.org/yemen/zimmerman-qaeda-yemen-countering-threat-arabian-peninsula-october19-2012)
The evolution of AQAP into an insurgent group aiming at controlling and governing territory in Yemen
could seem to indicate that the threat the group poses to the U.S. directly is declining. The devotion of
resources to AQAP’s internal operations, it could be argued, subtracts resources from its efforts to attack
Americans outside of Yemen. One might even suggest that American interests could be served by
encouraging AQAP, in a sense, to focus on its insurgent activities. Events do not support such a conclusion,
however. AQAP has demonstrated that it retains both the will and the capability to attempt attacks on the
U.S. homeland even as it seeks to expand territorial control within Yemen.¶ AQAP operatives mailed
bombs disguised as printer cartridges to a Chicago synagogue in October 2010 while the campaign
against Yemeni military and security targets was picking up speed.[13] The bombs were discovered after
they were already en route to the U.S. AQAP attempted another attack in May 2012, improving on the bomb
design used in the December 25, 2009 attack by Umar Farouk Abdulmutallab (which AQAP had also
planned, resourced, and directed).[14] The attempt shows that AQAP still seeks to conduct international
attacks, even though the details of the attack were purported to be known to American and other
intelligence agencies before it became fully operational.[15] Should AQAP succeed in holding a
significant territorial safe haven in Yemen, of course, its ability to plan and conduct attacks abroad
could increase considerably.
32
Download