1NC—T Curtail A. Interpretation The topic requires the affirmative to reduce surveillance itself, not to just limit the methods of surveillance 1. CURTAIL MEANS DECREASE Burton's 7 Burton's Legal Thesaurus, 4E. Copyright © 2007 by William C. Burton. Used with permission of The McGraw-Hill Companies, Inc. http://legaldictionary.thefreedictionary.com/curtail curtail verb abate, abbreviate, abridge, clip, coartare, cut, cut down, cut short, decrease, diminish, halt, lessen, lop, make smaller, minuere, pare, pare down, retrench, shorten, subtract, trim See also: abate, abridge, allay, arrest, attenuate, bowdlerize, commute, condense, decrease, diminish, discount, lessen, minimize, palliate, reduce, restrain, retrench, stop 2. SURVEILLANCE IS PROCESS OF GATHERING INFORMATION, AS DISTINGUISHED FROM THE TECHNIQUES OF GATHERING Webster's New World Law 10 Webster's New World Law Dictionary Copyright © 2010 by Wiley Publishing, Inc., Hoboken, New Jersey. Used by arrangement with John Wiley & Sons, Inc. http://www.yourdictionary.com/surveillance surveillance - Legal Definition n A legal investigative process entailing a close observing or listening to a person in effort to gather evidentiary information about the commission of a crime, or lesser improper behavior (as with surveillance of wayward spouse in domestic relations proceedings). Wiretapping, eavesdropping, shadowing, tailing, and electronic observation are all examples of this lawenforcement technique. B. 2 violations 1) Getting rid of backdoors gets rid of a technique for surveillance, but not the process itself. Nothing under the plan stops gathering information in other ways 2) They don’t decrease net surveillance—their plan just calls for the USFG to support encryption C. Standards 1. Limits are necessary for negative preparation and clash, and their interpretation makes the topic too big. Permitting limits on methods of surveillance, but not surveillance itself, permits the affirmative to avoid the issues of less surveillance and forces the negative to debate a huge number of different techniques Constitution Committee 9 Constitution Committee, House of Lords, Parliament, UK 2009, Session 2008-09 Publications on the internet, Constitution Committee - Second Report, Surveillance: Citizens and the State Chapter 2 http://www.publications.parliament.uk/pa/ld200809/ldselect/ldconst/18/1804.htm 18. The term "surveillance" is used in different ways. A literal definition of surveillance as "watching over" indicates monitoring the behaviour of persons, objects, or systems. However surveillance is not only a visual process which involves looking at people and things. Surveillance can be undertaken in a wide range of ways involving a variety of technologies. The instruments of surveillance include closed-circuit television (CCTV), the interception of telecommunications ("wiretapping"), covert activities by human agents, heat-seeking and other sensing devices, body scans, technology for tracking movement, and many others. 2. Ground—only getting rid of surveillance mechanisms allows the aff to spike out all Ks, CPs and disads that are predicated on a reduction of surveillance. That takes away almost all negative ground 3. Effects T - At best the aff is effects T because getting rid of a method of surveillance might lead to a decrease of surveillance in the future but not directly. 4. Extra Topicality – They garner advantages of fully supporting encryption standards which is obviously not curtailing surveillance. D. T IS A VOTER for fairness and education 1NC—T Domestic Interpretation: Domestic surveillance is surveillance done on US persons in US territory Jordan 6 DAVID ALAN JORDAN, LL.M., New York University School of Law (2006); J.D., cum laude, Washington and Lee University School of Law (2003). Member of the District of Columbia Bar. Boston College Law Review May, 2006 47 B.C. L. Rev 505 ARTICLE: DECRYPTING THE FOURTH AMENDMENT: WARRANTLESS NSA SURVEILLANCE AND THE ENHANCED EXPECTATION OF PRIVACY PROVIDED BY ENCRYPTED VOICE OVER INTERNET PROTOCOL lexis n100 See FISA, 50 U.S.C. § 1801(f). Section 1801(f) of FISA defines four types of conduct that are considered "electronic surveillance" under FISA. Signals collection operations that target U.S. persons outside the United States do not fit within any of these four definitions. The first three definitions require the targeted individual to be located inside of the United States to be considered "electronic surveillance." The fourth definition applies only to the use of surveillance devices within the United States. Therefore, the NSA's signals monitoring stations in the United Kingdom, Canada, Australia, and New Zealand are not regulated by FISA. U.S. personnel located at these foreign stations presumably may monitor U.S. persons who are outside the United States, and that conduct technically would not be considered electronic surveillance under FISA's definitions. This highlights the fact that FISA was meant to govern only domestic surveillance taking place within U.S. borders. Although such efforts would not fall under FISA's definition of "electronic surveillance," USSID 18's minimization procedures still would apply and offer some protection to the rights of U.S. persons abroad. See generally USSID 18, supra note 13. The NSA can collect data from backdoors on foreign companies Mathis-Lilley 14 (Ben editor for Slatest 6/12/14“NSA Reportedly Intercepts, Bugs, Repackages Network Equipment Being Sold Abroad” http://www.slate.com/blogs/the_slatest/2014/05/12/nsa_router_bugging_glenn_greenwald.html) An excerpt of investigative reporter Glenn Greenwald's new book No Place to Hide published today in The Guardian asserts that the National Security Agency "routinely" bugs computer network equipment made in the United States and sent to customers abroad:¶ A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers, and other computer network devices being exported from the US before they are delivered to the international customers.¶ The agency then implants backdoor surveillance tools, repackages the devices with a factory seal, and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some "SIGINT tradecraft … is very hands-on (literally!)". 2 Violations: 1. The NSA surveils foreign people in and out of United States territory 2. The plan eliminates the use of backdoors—that means that applies to the NSA’s usage of backdoors in countries not located in the US Standards: 1. Limits: They make the domestic limit meaningless. All surveillance becomes topical by their standards which gives them access to a huge number of international impacts that aren’t feasible under the resolution. 2. Ground: We lose core negative arguments like circumvention which are core neg ground because the aff could just argue foreign countries don’t have the ability to circumvent. 3. The aff is extra T, the aff gets rid of backdoors in foreign airports D. T IS A VOTER for fairness and education 1NC—Neolib The aff’s criticism of state surveillance reproduces neoliberal social relations – privacy protection is undergirded by the assumption of economic individualism – that papers over the coercive functions of the market and prevents use of the state to challenge corporate power Fuchs 11 Christian Fuchs 11, Professor of Social Media at University of Westminster, “Towards an alternative concept of privacy,” Journal of Information, Communication and Ethics in Society, Vol. 9, Iss. 4, p. 232-3, fwang Etzioni (1999) stresses that liberal privacy concepts typically focus on privacy invasions by the state, but ignore privacy invasions by companies. The contemporary undermining of public goods by overstressing privacy rights would not be caused by the state, but rather stem: [...] from the quest for profit by some private companies. Indeed, I find that these corporations now regularly amass detailed accounts about many aspects of the personal lives of millions of individuals, profiles of the kind that until just a few years ago could be compiled only by the likes of the East German Stasi. [...] Consumers, employees, even patients and children have little protection from marketeers, insurance companies, bankers, and corporate surveillance (Etzioni, 1999, p. 9f). The task of a socialist privacy conception is to go beyond the focus of privacy concepts as protection from state interference into private spheres, but to identify those cases, where political regulation is needed for the protection of the rights of consumers and workers. It is time to break with the liberal tradition in privacy studies and to think about alternatives. The Swedish socialist privacy concepts imply “that one cannot only own self and personal things, but also means of production” and that the consequence is “a very closed society, clogged because of the idea of business secret, bank privacy, etc.” (Tännsjo¨, 2010, p. 186). Tännsjö argues that power structures should be made transparent and not be able to hide themselves and operate secretly protected by privacy rights. He imagines based on utopian socialist ideas an philosopher Torbjörn Tännsjö (2010) stresses that liberal open society that is democratic and fosters equality so that (Tännsjö, 2010, pp. 191-8) in a democratic socialist society, there is, as Tännsjö indicates, no need for keeping power structures secret and therefore no need for a liberal concept of privacy. However, this does in my view not mean that in a society that is shaped by participatory democracy, all forms of privacy vanish. There are some human acts and situations, such as defecation (Moore, 1984), in which humans tend to want to be alone. Many humans would both in a capitalist and a socialist society feel embarrassed having to defecate next to others, for example by using toilets that are arranged next to each other without separating walls. So solitude is not a pure ideology, but to a certain desire also a human need that should be guaranteed as long as it does not result in power structures that harm others. This means that it is necessary to question the liberal-capitalist privacy ideology, to struggle today for socialist privacy that protects workers and consumers, limits the right and possibility of keeping power structures secret and makes these structures transparent. In a qualitatively different society, we require a qualitatively different concept of privacy, but not the end of privacy. Torbjrn Tännsjö’s work is a powerful reminder that it is necessary not to idealize privacy, but to think about its contradictions and its relation to private property The impact is extinction – neoliberal social organization ensures extinction from resource wars, climate change, and structural violence – only accelerating beyond neoliberalism can resolve its impacts Williams & Srnicek 13 (Alex, PhD student at the University of East London, presently at work on a thesis entitled 'Hegemony and Complexity', Nick, PhD candidate in International Relations at the London School of Economics, Co-authors of the forthcoming Folk Politics, 14 May 2013, http://criticallegalthinking.com/2013/05/14/accelerate-manifesto-for-an-accelerationistpolitics/) At the begin-ning of the second dec-ade of the Twenty-First Cen-tury, global civilization faces a new breed of cataclysm. These com-ing apo-ca-lypses ridicule the norms and organ-isa-tional struc-tures of the polit-ics which were forged in the birth of the nation-state, the rise of cap-it-al-ism, and a Twen-ti-eth Cen-tury of unpre-ced-en-ted wars. 2. Most significant is the break-down of the planetary climatic system. In time, this threatens the continued existence of the present global human population. Though this is the most crit-ical of the threats which face human-ity, a series of lesser but potentially equally destabilising problems exist along-side and inter-sect with it. Terminal resource depletion, especially in water and energy reserves, offers the prospect of mass starvation, collapsing economic paradigms, and new hot and cold wars. Continued financial crisis has led governments to embrace the para-lyz-ing death spiral policies of austerity, privatisation of social welfare services, mass unemployment, and stagnating wages. Increasing automation in production processes includ­ing ‘intel­lec-tual labour’ is evidence of the secular crisis of capitalism, soon to render it incapable of maintaining current standards of living for even the former middle classes of the global north. 3. In con-trast to these ever-accelerating cata-strophes, today’s politics is beset by an inability to generate the new ideas and modes of organisation necessary to transform our societies to confront and resolve the coming annihilations. While crisis gath-ers force and speed, polit-ics with-ers and retreats. In this para-lysis of the polit-ical ima-gin-ary, the future has been cancelled. 4. Since 1979, the hegemonic global political ideology has been neoliberalism, found in some vari-ant through-out the lead-ing eco-nomic powers. In spite of the deep struc-tural chal-lenges the new global prob-lems present to it, most imme-di-ately the credit, fin-an-cial, and fiscal crises since 2007 – 8, neoliberal programmes have only evolved in the sense of deep-en-ing. This continuation of the neo-lib-eral pro-ject, or neo-lib-er-al-ism 2.0, has begun to apply another round of structural adjustments, most sig-ni-fic-antly in the form of encour-aging new and aggress-ive incur-sions by the private sec-tor into what remains of social demo-cratic insti-tu-tions and ser-vices. This is in spite of the immediately negative eco-nomic and social effects of such policies, and the longer term fun-da-mental bar-ri-ers posed by the new global crises. The alternative articulates a “counter-conduct” – voting neg pushes towards a cooperative conduct that organizes individuals around a collectively shared commons – affirming this conduct creates a new heuristic that de-couples government from the demand for competition and production Dardot & Laval 13 (Pierre Dardot, philosopher and specialist in Hegel and Marx, Christian Laval, professor of sociology at the Universite Paris Ouest Nanterre La Defense, The New Way of the World: On Neoliberal Society, pgs. 318-321) This indicates to what extent we must take on board in our own way the main lesson of neoliberalism: the subject is always to be constructed. The whole question is then how to articulate subjectivation with resistance to power. Now, precisely this issue is at the heart of all of Foucault’s thought. However, as Jeffrey T. Nealon has recently shown, part of the North American secondary literature has, on the contrary, stressed the alleged break between Foucault’s research on power and that of his last period on the history of subjectivity.55 According to the ‘Foucault consensus’, as Nealon aptly dubs it, the successive impasses of the initial neo-structuralism, and then of the totalizing analysis of panoptical power, led the ‘last Foucault’ to set aside the issue of power and concern himself exclusively with the aesthetic invention of a style of existence bereft of any political dimension. Furthermore, if we follow this de-politicizing reading of Foucault, the aestheticization of ethics anticipated the neo-liberal mutation precisely by making self-invention a new norm. In reality, far from being oblivious of one another, the issues of power and the subject were always closely articulated, even in the last work on modes of subjectivation. If one concept played a decisive role in this respect, it was ‘counter-conduct’, as developed in the lecture of 1 March 1978.56 ‘forms of resistance of conduct’ that are the correlate of the pastoral mode of power. If such forms of resistance are said to be ‘of conduct’, it is because they are forms of resistance to power as conduct and, as such, are themselves forms of conduct opposed to this ‘power-conduct’. The term ‘conduct’ in fact admits of two meanings: an activity that consists in conducting others, or ‘conduction’; and the way one conducts oneself under the influence of this activity of conduction.57 The idea of ‘counter-conduct’ therefore has the advantage of directly signifying a ‘struggle against the procedures implemented for conducting others’, unlike the term ‘misconduct’, which only refers to the passive sense of the word.58 Through ‘counter-conduct’, people seek both to escape conduction by others and to define a way of conducting themselves towards others.¶ What relevance might this observation have for a reflection on resistance to neo-liberal governmentality? It will be said that the concept is introduced in the context of an analysis of the pastorate, not government. Governmentality, at least in its specifically neo-liberal form, precisely makes conducting others through their conduct towards themselves its real goal. The peculiarity of this conduct towards oneself, conducting oneself as a personal enterprise, is that it immediately and directly induces a certain conduct towards others: competition with others, regarded as so many personal enterprises. Consequently, counter-conduct as a form of resistance to this governmentality must correspond to a conduct that is indivisibly a conduct towards oneself and a conduct towards others. One cannot struggle against such an indirect mode of conduction by appealing for rebellion against an authority that supposedly operates through compulsion external to individuals. If ‘politics is nothing more and nothing less than that which is born with resistance to governmentality, the first revolt, the first confrontation’,59 it means that ethics and politics are absolutely inseparable.¶ To the subjectivation-subjection represented by ultrasubjectivation, we must oppose a subjectivation by forms of counter-conduct. To neo-liberal governmentality as a specific way of conducting the conduct of others, we must therefore oppose a no less specific double refusal: a refusal to conduct oneself towards oneself as a This lecture was largely focused on the crisis of the pastorate. It involved identifying the specificity of the ‘revolts’ or personal enterprise and a refusal to conduct oneself towards others in accordance with the norm of competition. As such, the double refusal is not ‘passive disobedience’.60 For, if it is true that the personal enterprise’s relationship to the self immediately and directly determines a certain kind of relationship to others – generalized competition – conversely, the refusal to function as a personal enterprise, which is self-distance and a refusal to line up in the race for performance, can only practically occur on condition of establishing cooperative relations with others, sharing and pooling. In fact, where would be the sense in a self-distance severed from any cooperative practice? At worst, a cynicism tinged with contempt for those who are dupes. At best, simulation or double dealing, possibly dictated by a wholly justified concern for self-preservation, but ultimately exhausting for the subject. Certainly not a counter-conduct. All the more so in that such a game could lead the subject, for want of anything better, to take refuge in a compensatory identity, which at least has the advantage of some stability by contrast with the imperative of indefinite self-transcendence. Far from threatening the neo-liberal order, fixation with identity, whatever its nature, looks like a fall-back position for subjects weary of themselves, for all those who have abandoned the race or been excluded from it from the outset. Worse, it recreates the logic of competition at the level of relations between ‘little communities’. Far from being valuable in itself, independently of any articulation with politics, individual subjectivation is bound up at its very core with collective subjectivation. In this sense, sheer aestheticization of ethics is a pure and simple abandonment of a genuinely ethical attitude. The invention of new forms of existence can only be a collective act, attributable to the multiplication and intensification of cooperative counter-conduct. A collective refusal to ‘work more’, if only local, is a good example of an attitude that can pave the way for such forms of counter-conduct. In effect, it breaks what André Gorz quite rightly called the ‘structural complicity’ that binds the worker to capital, in as much as ‘earning money’, ever more money, is the decisive goal for both. It makes an initial breach in the ‘immanent constraint The genealogy of neo-liberalism attempted in this book teaches us that the new global rationality is in no wise an inevitable fate shackling humanity. Unlike Hegelian Reason, it is not the reason of human history. It is itself wholly historical – that is, relative to strictly singular conditions that cannot legitimately be regarded as untranscendable. The main thing is to understand that nothing can release us from the task of promoting a different rationality. That is why the belief that the of the “ever more”, “ever more rapidly”‘.61¶ financial crisis by itself sounds the death-knell of neo-liberal capitalism is the worst of beliefs. It is possibly a source of pleasure to those who think they are witnessing reality running ahead of their desires, without them having to move their little finger. It certainly comforts those for whom it is an opportunity to celebrate their own past ‘clairvoyance’. At bottom, it is the least acceptable form of intellectual and political abdication. Neo-liberalism is not falling like a ‘ripe fruit’ on account of its internal There are only human beings who act in given conditions and seek through their action to open up a future for themselves. It is up to us to enable a new sense of possibility to blaze a trail. The government of human beings can be aligned with horizons other than those of maximizing performance, unlimited production and generalized control. It can sustain itself with selfgovernment that opens onto different relations with others than that of competition between ‘self-enterprising actors’. The practices of ‘communization’ of knowledge, mutual aid and cooperative work can delineate the features of a different world reason. Such an alternative reason cannot be better designated than by the term reason of the commons. contradictions; and traders will not be its undreamed-of ‘gravediggers’ despite themselves. Marx had already made the point powerfully: ‘History does nothing’.62 Specifically, the alternative re-appropriates the Internet to create collective responsibility and empathy – dismantles neoliberal individualism and inequality Warf 11 – [Barney – Professor of Geography @ University of Kansas] [Google Bombs, Warblogs, and Hacktivism The Internet as Agent for Progressive Social Change] (http://tinyurl.com/p24kcfj) (accessed 7-17-15) //MC More broadly, the internet may help to foster a relational ontology of space and place and corresponding alternative geographic imaginaries, in which identity is defined through lines of power and feelings of belonging and responsibility rather than simple proximity (Bennett, 2003; Massey, 2009). Vivid pictures and films of atrocities and injustices circulating over the internet can have powerful impacts in raising awareness about a variety of issues. Indeed, formal ideologies, political parties, and elections may be giving way to network-based identity and lifestyle politics. In facilitating rhizomatic networks of power, the internet can be an agent for the generation of geographies of compassion and empathy that stand in sharp contrast to xenophobic discourses of hate and exclusion. Such a view is in keeping with the emerging literature on geographies of care and the ethics of responsibility (Lawson, 2007), particularly in the face of the neoliberal assault on state-funded interventions in the sphere of reproduction and the associated growth of dis-courses of individual, rather than collective, responsibility. In such a context, the moral community to which each person owes an obligation is, by definition, worldwide, generating an obligation to “care at a distance,” in which the concerns of distant strangers are held to be as important as those of people nearby (cf. Ginzburg, 1994; Corbridge, 1998). 1NC—Cybercrime Terrorists cannot steal nuclear weapons from Russia KAMP 1996 (Karl-Heinz, heads the foreign and security policy section of the Konrad-Adenauer-Stiftung in Sankt Agustin, Bulletin of the Atomic Scientists, July) the military organizations responsible for nuclear weapon security in the former Soviet Union have proven more reliable than feared a few years ago. There has been no illegal passing on of complete nuclear weapons or key components. And none of the reports about the marketing of ex-Soviet nuclear materials has involved critical items taken from weapon stocks. There seem to be two decisive reasons for the stability of the ex-Soviet nuclear weapons sector, particularly in Russia. First, even if Russian leaders did not take Western fears about nuclear-weapon security seriously, they would still be concerned about the risks that uncontrolled nuclear proliferation could pose to their own country. As far as possible, resources have been channeled into the nuclear armed forces sector to guarantee its workability. Soldiers in this sector are better paid and facilities have been better maintained than in other areas. Second, the military's nuclear elites have met very high standards in the past. It is hard to imagine that nuclear units trained during the Soviet era would neglect their tasks under hostile conditions and abuse the goods placed under their command. It would be extremely difficult for terrorists to steal complete nuclear weapons from depots or to obtain them with the help of security personnel. Of course, there is no guarantee that the current stability in the military nuclear Well, maybe. But it must be noted that sector will continue in the indefinite future. One in three billion chance of nuclear terrorism Mueller 10 John, professor of political science at Ohio State University, Calming Our Nuclear Jitters, Issues in Science & Technology, Winter2010, Vol. 26, Issue 2 In contrast to these predictions, terrorist groups seem to have exhibited only limited desire and even less progress in going atomic. This may be because, after brief exploration of the possible routes, they, unlike generations of alarmists, have discovered that the tremendous effort required is scarcely likely to be successful. The most plausible route for terrorists, according to most experts, would be to manufacture an atomic device themselves from purloined fissile material (plutonium or, more likely, highly enriched uranium). This task, however, remains a daunting one, requiring that a considerable series of difficult hurdles be conquered and in sequence. Outright armed theft of fissile material is exceedingly unlikely not only because of the resistance of guards, but because chase would be immediate. A more promising approach would be to corrupt insiders to smuggle out the required substances. However, this requires the terrorists to pay off a host of greedy confederates, including brokers and money-transmitters, any one of whom could turn on them or, either out of guile or incompetence, furnish them with stuff that is useless. Insiders might also consider the possibility that once the heist was accomplished, the terrorists would, as analyst Brian Jenkins none too delicately puts it, "have every incentive to cover their trail, beginning with eliminating their confederates." If terrorists were somehow successful at obtaining a sufficient mass of relevant material, they would then probably have to transport it a long distance over unfamiliar terrain and probably while being pursued by security forces. Crossing international borders would be facilitated by following established smuggling routes, but these are not as chaotic as they appear and are often under the watch of suspicious and careful criminal regulators. If border personnel became suspicious of the commodity being smuggled, some of them might find it in their interest to disrupt passage, perhaps to collect the bounteous reward money that would probably be offered by alarmed governments once the uranium theft had been discovered. Once outside the country with their precious booty, terrorists would need to set up a large and well-equipped machine shop to manufacture a bomb and then to populate it with a very select team of highly skilled scientists, technicians, machinists, and administrators. The group would have to be assembled and retained for the monumental task while no consequential suspicions were generated among friends, family, and police about their curious and sudden absence from normal pursuits back home. Members of the bomb-building team would also have to be utterly devoted to the cause, of course, and they would have to be willing to put their lives and certainly their careers at high risk, because after their bomb was discovered or exploded they would probably become the targets of an intense worldwide dragnet operation. Some observers have insisted that it would be easy for terrorists to assemble a crude bomb if they could get enough fissile material. But Christoph Wirz and Emmanuel Egger, two senior physicists in charge of nuclear issues at Switzerland's Spiez Laboratory, bluntly conclude that the task "could hardly be accomplished by a subnational group." They point out that precise blueprints are required, not just sketches and general ideas, and that even with a good blueprint the terrorist group would most certainly be forced to redesign. They also stress that the work is difficult, dangerous, and extremely exacting, and that the technical requirements in several fields verge on the unfeasible. Stephen Younger, former director of nuclear weapons research at Los Alamos Laboratories, has made a similar argument, pointing out that uranium is "exceptionally difficult to machine" whereas "plutonium is one of the most complex metals ever discovered, a material whose basic properties are sensitive to exactly how it is processed." Stressing the "daunting problems associated with material purity, machining, and a host of other issues," Younger concludes, "to think that a terrorist group, working in isolation with an unreliable supply of electricity and little access to tools and supplies" could fabricate a bomb "is farfetched at best." Under the best circumstances, the process of making a bomb could take months or even a year or more, which would, of course, have to be carried out in utter secrecy. In addition, people in the area, including criminals, may observe with increasing curiosity and puzzlement the constant coming and going of technicians unlikely to be locals. If the effort to build a bomb was successful, the finished product, weighing a ton or more, would then have to be transported to and smuggled into the relevant target country where it would have to be received by collaborators who are at once totally dedicated and technically proficient at handling, maintaining, detonating, and perhaps assembling the weapon after it arrives. The financial costs of this extensive and extended operation could easily become monumental. There would be expensive equipment to buy, smuggle, and set up and people to pay or pay off. Some operatives might work for free out of utter dedication to the cause, but the vast conspiracy also requires the subversion of a considerable array of criminals and opportunists, each of whom has every incentive to push the price for cooperation as high as possible. Any criminals competent and capable enough to be effective allies are also likely to be both smart enough to see boundless opportunities for extortion and psychologically equipped by their profession to be willing to exploit them. Those who warn about the likelihood of a terrorist bomb contend that a terrorist group could, if with great difficulty, overcome each obstacle and that doing so in each although it may not be impossible to surmount each individual step, the likelihood that a group could surmount a series of them quickly becomes vanishingly small. case is "not impossible." But Table 1 attempts to catalogue the barriers that must be overcome under the scenario considered most likely to be successful. In contemplating the task before them, would-be atomic terrorists would effectively be required to go though an exercise that looks much like this. If and when they do, they will undoubtedly conclude that their prospects are daunting and accordingly uninspiring or even terminally dispiriting. Adopting probability estimates that purposely and heavily bias the case in the terrorists' favor — for example, assuming the terrorists have a 50% chance of overcoming each of the 20 obstacles — the chances that a concerted effort would be successful comes out to be less than one in a million. If one assumes, somewhat more realistically, that their chances at each barrier are one in three, the cumulative odds that they will be able to pull off the deed drop to one in well over three billion . It is possible to calculate the chances for success. Other routes would-be terrorists might take to acquire a bomb are even more problematic. They are unlikely to be given or sold a bomb by a generous like-minded nuclear state for delivery abroad because the risk would be high, even for a country led by extremists, that the bomb (and its source) would be discovered even before delivery or that it would be exploded in a manner and on a target the donor would not approve, including on the donor itself. Another concern would be that the terrorist group might be infiltrated by foreign intelligence. Cybersecurity is a particular manifestation of securitization that is enhanced by technical discourse --- their framing translates into further surveillance measures Jin et al 14 Dal Yong Jin et al, Andrew Feenberg, Catherine Hart, *Associate Professor at the School of Communication at Simon Fraser University, **Canada Research Chair in Philosophy of Technology in the School of Communication, ***masters student in the School of Communication at Simon Fraser University, “The Insecurity of Innovation: A Critical Analysis of Cybersecurity in the United States,” International Journal of Communication, Vol. 8, p. 2863-4, fwang Further cementing the influence of hegemonic power structures are cybersecurity’s focus on “hypothetical futures” or estimations of risk and threat (Buzan et al., 1998), and the reliance in security and technical fields on “experts” who are not always held accountable. Bigo remarked on the “lack of precision required for threats identified by the professionals who know some secrets. Amateurs always need to prove their claims, whereas professionals, whether international, national, or local, corporate or public, can evoke without demonstrating” (2002, p. 74). Indeed, Hansen and Nissenbaum (2009, p. 1168) argue that although cybersecurity is not uniquely reliant on technical, expert discourse, it is the field where “[technifications] have been able to take on a more privileged position than in any other security sector,” as computer security often requires knowledge that is unavailable to the general public. This is important because the effect of “technifications,” as speech acts similar to securitization, is that “they construct an issue as reliant upon technical, expert knowledge, but they also simultaneously presuppose a politically and normatively neutral agenda, that technology serves” (ibid., p. 1167). The simultaneous use of both securitization and technification in cybersecurity discourse is therefore significant because they “work to prevent it from being politicized in that it is precisely through rational, technical discourse that securitization may ‘hide’ its own political roots” (ibid., p. 1168). security agencies and law enforcement advance the securitizing argument. Resultant attempts to control the development of networked computing reflect a desire to know and to secure that is central to both the security of the state and society’s normalization and productive functioning. Foucault discussed this as governmentality, a method of governance that protects, controls, and fosters economic expansion, and as such is inextricable from economic liberalism (2007). Surveillance in response to insecurity is a way of knowing a population, rendering it calculable and thereby manageable. It not only informs state action but also influences the way Increasingly, subjects think about themselves. This is evident in Foucault’s illustration of the panopticon: surveillance (or the assumption of surveillance) induces in the subject “a state of conscious and permanent visibility that assures the automatic functioning of power” (1995, p. 201). Theoretically, this produces a disciplined, ordered, productive society Neocleous addressed police as a form of governmental power for the administration of society and active fabrication of social order without the need to enforce, punish, or necessarily carry out the surveillance in the first place. Similarly, (2000, p. 14). Nuke terror has a small impact Mueller, professor of political science at the University of Rochester, and Karl Mueller, assistant professor of Comparative Military Studies at the School of Advanced Airpower Studies at Maxwell Air Force Base, May/June 1999, Foreign Affairs, “Sanctions of Mass Destruction,” p. Lexis John Nuclear weapons clearly deserve the “weapons of mass destruction” designation because they can indeed destroy masses of people in a single blow. Even so, it is worth noting any nuclear weapons acquired by terrorist groups or rogue states, at least initially, are likely to be small. Contrary to exaggerated Indian and Pakistani claims, for example, independent analyses of their May 1998 nuclear tests have concluded that the yields were Hiroshima-sized or smaller. Such bombs can cause horrible though not apocalyptic damage. Some 70,000 people died in Hiroshima and 40,000 in Nagasaki. People three miles away from the blast sites received only superficial wounds even when fully exposed, and those inside bomb shelters at Nagasaki were uninjured even though they that were close to ground zero. Some buildings of steel and concrete survived, even when they were close to the blast centers, and most municipal services were restored within A Hiroshima-sized bomb exploded in a more fire-resistant modern city would likely be considerably less devastating. Used against well-prepared, dug-in, and dispersed troops, a small bomb might actually cause only limited damage. If a single such bomb or even a few of them were to fall into dangerous hands, therefore, it would be terrible, though it would hardly threaten the end of civilization. days. Even if terrorists got Russian bombs, security features would prevent usage John Mueller, Department of Political Science at Ohio State University, 1/1/2008, The Atomic Terrorist: Assessing the Likelihood, p. http://polisci.osu.edu/faculty/jmueller/APSACHGO.PDF Russia has an intense interest in controlling any weapons on its territory since it is likely to be a prime target of any illicit use by terrorist groups, particularly, of course, Chechen ones with whom it has been waging an vicious on-andoff war for over a decade (Cameron 2004, 84). Officials there insist that all weapons have either been destroyed or are secured, and the experts polled by Linzer (2004) point out that "it would be very difficult for terrorists to figure out on their own how to work a Russian or Pakistan bomb" even if they did obtain one because even the simplest of these "has some security features that would have to be defeated before it could be used" (see also Kamp 1996, 34; Wirz and Egger 2005, 502; Langewiesche 2007, 19). One of the experts, Charles Ferguson, stresses You'd have to run it through a specific sequence of events, including changes in temperature, pressure and environmental conditions before the weapon would allow itself to be armed, for the fuses to fall into place and then for it to allow itself to be fired. You don't get off the shelf, enter a code and have it go off. Moreover, continues Linzer, most bombs that could conceivably be stolen use plutonium which emits a great deal of radiation that could relatively easily be detected by passive sensors at ports and other points of transmission. It might be added that Russian nuclear security is strong FROST 2005 (Robin, teaches political science at Simon Fraser University, British Colombia, “Nuclear Terrorism after 9/11,” Adelphi Papers, December) Russian nuclear weapons appear to be under the generally good control of élite troops. There is no evidence in open-source material that a single nuclear warhead, from any national arsenal or another source, has ever made its way into the world's illegal arms bazaars, let alone into terrorist hands. No actual or aspiring nuclear-weapon state has ever claimed to have nuclear weapons without also having all of the technical infrastructure necessary to produce them ab initio, although they could, if the ‘loose nukes’ arguments were sound, easily have bought a few on the black market. Even the extravagant sums sometimes mentioned as the alleged asking price for stolen weapons would be tiny fractions of the amount required to develop an indigenous nuclear-weapon capability, yet circumstances seem to have compelled states to choose the more expensive course. Russian nuclear weapons. Most likely response would be conventional – 9/11 proves. Ayson ‘10 Robert Ayson, Centre for Strategic Studies, Victoria University of Wellington. “After a Terrorist Nuclear Attack: Envisaging Catalytic Effects”. Studies in Conflict & Terrorism, Volume 33, Issue 7 July 2010 , pages 571 – 593. InformaWorld. Even if the actual perpetrators of the nuclear violence and any leaders of the terrorist group were identified and could be targeted militarily, it does not necessarily follow that such a reaction would need to be enormously violent. One possible option would be an attempt to seize the terrorist leadership alive and have them tried for crimes against humanity, even if some sort of retrospective international legal arrangements might be needed to cover the actions of a non-state group. Another option would be a “surgical” strike, including perhaps by the use of drones, if the attacked country still felt it necessarily to highlight an asymmetry between the indiscriminate and illegitimate violence of the attackers and the carefully crafted response of the attacked country. Any violent action against states that had been harboring or assisting the terrorists might also be limited so as to protect the international reputation of the victim . The importance of limiting the use of force might grow if there was some uncertainty about the identity of the attacking group and their state (and nonstate) supporters, to reduce the political costs should that identification later prove to have been erroneous. Alternatively if the terrorist group was thought to possess additional nuclear weapons, some might counsel a cautious military response in case any violent response led to further attacks. However, one would expect this last argument to get fairly short shrift: few would want to be accused of appeasing proven nuclear terrorists. Of course the state victim of the nuclear attack might well decide to use much higher levels force against the terrorist group and any of its state supporters, (and especially if any of the latter were considered to have helped the group acquire the nuclear weapon that had been used). If the leadership of the terrorist group that authorized the attack were thought to be operating from a particular overseas location, one might expect aerial bombing and missile attacks, the deployment of a battle group task force offshore (depending on the geography) and then perhaps the insertion of larger numbers of regular forces. Of course, this begs the assumption that the state victim was a country such as the United States whose armed forces do have the global reach these options could require (although there is also the very real possibility that the United States might respond in this way even if it the precedent of the international response to the 9/11 attacks suggests that a large international military coalition in support of the state victim could be organized reasonably quickly. But it is not obvious that had not been the direct victim of the nuclear terrorist attack). Indeed, this coalition would be presented with a carbon copy of the Al Qaeda-Taliban nexus as a readily available target for its mission. In any case, it is likely that a number of governments would want to join together in what would amount to a significant show of force. 1NC—Cybervulnerability Privacy violations inevitable – tech and corporations Goldsmith, 2015 Jack the Henry L. Shattuck Professor at Harvard Law School, The Ends of Privacy, The New Rambler, Apr. 06, 2015 (reviewing Bruce Schneier, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (2015)). Published Version http://newramblerreview.com/images/files/Jack- Goldsmith_Review-of-Bruce-Schneier.pdf The truth is that consumers love the benefits of digital goods and are willing to give up traditionally private information in exchange for the manifold miracles that the Internet and big data bring. Apple and Android each offer more than a million apps, most of which are built upon this model, as are countless other Internet services. More generally, big data promises huge improvements in economic efficiency and productivity, and in health care and safety. Absent abuses on a scale we have not yet seen, the public’s attitude toward giving away personal information in exchange for these benefits will likely persist, even if the government requires firms to make more transparent how they collect and use our data. One piece of evidence for this is that privacy-respecting search engines and email services do not capture large market shares. In general these services are not as easy to use, not as robust, and not as efficacious as their personal-dataheavy competitors. Schneier understands and discusses all this. In the end his position seems to be that we should deny ourselves some (and perhaps a lot) of the benefits big data because the costs to privacy and related values are just too high. We “have to stop the slide” away from privacy, he says, not because privacy is “profitable or efficient, but because it is moral.” But as Schneier also recognizes, privacy is not a static moral concept. “Our personal definitions of privacy are both cultural and situational,” he acknowledges. Consumers are voting with their computer mice and smartphones for more digital goods in exchange for more personal data. The culture increasingly accepts the giveaway of personal information for the benefits of modern computerized life. This trend is not new. “The idea that privacy can’t be invaded at all is utopian,” says Professor Charles Fried of Harvard Law School. “There are amounts and kinds of information which previously were not given out and suddenly they have to be given out. People adjust their behavior and conceptions accordingly.” That is Fried in the 1970 Newsweek story, responding to an earlier generation’s panic about big data and data mining. The same point applies today, and will apply as well when the Internet of things makes today’s data mining seem as quaint as 1970s-era computation. Creating zones of privacy against state intrusion reinforces rather than challenges the security state Henry 13 (PhD candidate at Carleton University reading Sociology and Political Economy) (Aaron, Socialist Studies / Études socialistes 9 (2) Winter 2013, THE PERPETUAL OBJECT OF REGULATION: PRIVACY AS PACIFICATION) There is a conviction today that privacy is in a state of irretrievable crisis. In addition to the collection and sale of day-to-day personal activity by telecommunications services and social networking sites, programmes of surveillance and registration have allegedly eroded what were previously understood as the firm borders between public and private spheres of relations. That this has happened or is in the process of materializing has taken on the weight and opacity of a social fact. Yet, while privacy is said to be in a state of crisis, the ‘right to privacy’ is often trumpeted by liberals as the counterweight to balance the intrusion of state projects into the lives of individuals . Indeed, this appears to be the general sentiment that rests behind initiatives like the ‘Orwell Award’ given to companies that have violated privacy, or the American Civil Liberties Union recent mobilization against Drones as a privacy concern. Thus, privacy is presented as means to make intrusions into the life of the individual proportional to the objectives of security projects, and in some instances security projects are legitimized for the forms of privacy they safeguard (Cavoukian, 1999, 13). To this end, privacy is subject to a rather peculiar positioning as both a relation threatened by security and as a regulative principle capable of ensuring the ‘acceptable’ limits of security projects. What I want to demonstrate in this paper is that the relation of privacy to security as both an object threatened by security and as a means of regulating security projects is the product of a longstanding relation between privacy, security and capital. This relation is expressed in two ways. First, while privacy has been invoked as a means to resist projects of security, I argue that privacy is in fact deployed as a means to structure the fields of relations through which security interventions are made.2 In this sense, when the power of state or capital intervenes upon the individual, privacy emerges as a concept. Privacy, a retroactive concept, exists as a means to assuage individuals that the duration and scope of security projects will be ‘reasonable or proportional’; thus, security presupposes and delimits privacy. Second, in the course of defending the individual's freedom and autonomy over their inner world, privacy reinforces private property and private life, the very relations projects of security safeguard. Thus, privacy acclimatizes us to a mode of existence where we are alienated from our collective social power, and so we confront relations of domination and exploitation as private individuals. This commodification of our selves is, I suggest, part of the condition of pacification. First, I attempt to theorize how security and its relation to capital render it not only generative of privacy but structure its perimeters. I demonstrate the formation of this relationship between security and privacy through a critical reading of Thomas Hobbes’ Leviathan. Second, I offer a contemporary example of this relation between privacy and security through an analysis of the Passenger Name Record (PNR) agreement between the United States and the EU. Finally, I conclude by reviewing how privacy as desirable form of existence constitutes a form of pacification insofar as it not only fails to challenge capital but has further entrenched the logics of security into social life. Internet freedom is used to crush dissent Siegel 11 (Lee Siegel, a columnist and editor at large for The New York Observer, is the author of “Against the Machine: How the Web Is Reshaping Culture and Commerce — and Why It Matters. “‘The Net Delusion’ and the Egypt Crisis”, February 4, 2011, http://artsbeat.blogs.nytimes.com/2011/02/04/the-net-delusion-and-the-egyptcrisis) Morozov takes the ideas of what he calls “cyber-utopians” and shows how reality perverts them in one political situation after another. In Iran, the regime used the internet to crush the internet-driven protests in June 2009. In Russia, neofascists use the internet to organize pogroms. And on and on. Morozov has written hundreds of pages to make the point that technology is amoral and cuts many different ways. Just as radio can bolster democracy or — as in Rwanda — incite genocide, so the internet can help foment a revolution but can also help crush it. This seems obvious, yet it has often been entirely lost as grand claims are made for the internet’s positive, liberating qualities. ¶And suddenly here are Tunisia and, even more dramatically, Egypt, simultaneously proving and refuting Morozov’s argument. In both cases, social networking allowed truths that had been whispered to be widely broadcast and commented In Tunisia and Egypt — and now across the Arab world — Facebook and Twitter have made people feel less alone in their rage at the governments that stifle their lives. There is nothing more upon. politically emboldening than to feel, all at once, that what you have experienced as personal bitterness is actually an objective condition, a universal affliction in your society that Yet at the same time, the Egyptian government shut off the internet, misinformation is being spread through Facebook — as it was in Iran — just as real information was shared by anti-government protesters. This is the “dark side of internet freedom” that Morozov is warning against. It is the freedom to wantonly crush the forces of freedom. ¶All this should not surprise anyone. It seems that, just as with every other type of technology of communication, the internet is not a solution to human conflict but an amplifier for all aspects of a conflict. As you read about pro-government agitators charging into crowds of protesters on horseback and camel, you realize that nothing has changed in our new internet age. The human situation is the same as it always was, except that it therefore can be universally opposed. ¶ which is an effective way of using the internet. And according to one Egyptian blogger, is the same in a newer and more intense way. Decades from now, we will no doubt be celebrating a spanking new technology that promises to liberate us from the internet. And the argument joined by Morozov will occur once again. No Moral Objections to Surveillance – even new concerns don’t assume the strength of activist potential Sagar 15—Rahul Sagar, Assistant Professor of Politics at Princeton University, 2015 (“Against Moral Absolutism: Surveillance and Disclosure After Snowden,” Cambridge Journals Online, June 12th, Available online at http://journals.cambridge.org/action/displayAbstract?fromPage=online&aid=9749725&fileId=S 0892679415000040, Accessed on 7/15/15) I have challenged the conspiratorial view that state surveillance serves to reinforce the hegemony of a shadowy elite. A basic premise of the discussion that follows is that in contemporary liberal democracies, communications surveillance is a legitimate activity. What, then, ought to be the bounds of such surveillance and how far can we be confident that these bounds are being observed? In order to ascertain the rightful bounds on communications surveillance we need to weigh the interests it furthers against those it threatens. The interest it furthers is national security. Greenwald questions this link on a number of grounds. He argues that surveillance is a disproportionate response to the threat of terrorism, which has been “plainly exaggerated” because the “risk of any American dying reat of terrorism is real, surveillance isunjustified because to “venerate physical safety above all other values” means accepting “a life of ed to further other national or commercial interests. He asks how, for instance, does “spying on negotiation sessions at an economic miss the mark. That terrorist plots thus far have been amateurish does not mean that terrorists will not learn and eventually succeed in The terror in terrorism comes from the unpredictability and the brutality of the violence inflicted on civilians. There is a difference between voluntarily undertaking a somewhat risky bicycle ride in rush hour traffic and being unexpectedly blown to bits while commuting to work. Finally, it is widely accepted that countries have a right to pursue their national interests, subject of course to relevant countervailing ethical considerations. It is not hard to imagine how intercepting Chancellor Angela Merkel’s conversation could serve the United States’ national security interests (for example, it could provide intelligence on Europe’s dealings with Russia). What are the countervailing values that have been overlooked in this case? The President’s Review Group on Intelligence and Communications Technologies, set up in the wake of Snowden’s disclosures, warns that surveillance of foreign leaders must be “respectful.” But the justification offered is strategic rather than moral: the group urges caution out of recognition for “the importance of cooperative relati American allies, including Germany, reportedly engage in similar practices acknowledges, the NSA’s surveillance of foreign leaders is “unremarkable” because “countries have spied on heads of state for warns that mass surveillance undermines national security because “it swamps the intelligence agencies with so much data that they cannot possibly it has little to show in terms of success in combating terrorism. But these criticisms are equally unpersuasive. It is certainly possible that a surveillance program could generate so much raw data that an important piece of information is overlooked. But in such a case the appropriate response would not be to shut down the programbut rather to bulk up the processing power and manpower devoted to it. Finally, both the President’s Review Group and the Privacy and Civil Liberties Oversight Board have examined the efficacy of the NSA’s programs. Both report that the NSA’s foreign surveillance programs have contributed to more than fifty counterterrorism investigations, leading them to conclude that the NSA “does in fact play an important role in the nation’s effort to prevent terrorist ational security is not the only value liberal democracies and their citizens deem important. Hence we need to consider how far communications surveillance impinges on other important interests and values. Greenwald identifies two major harms. The first is political in nature. Mass surveillance is said to stifle dissent because “a citizenry that is aware of always being watched quickly becomes a compliant and fearful one.” Compliance occurs because, anticipating being shamed or condemned for nonconformist behavior, individuals who know they are being watched “think only in line with what is expected and demanded.” “indifference or support of those who think themselves exempt invariably allows for the misuse of power to spread far beyond its se claims strike me as overblown. The more extreme claim, that surveillance furthers thought control, is neither logical nor supported by the facts. It is logically flawed because accusing someone of trying to control your mind proves that they have not succeeded in doing so. On a more practical level, the fate met by states that have tried to perfect mass control—the Soviet Union and the German Democratic Republic, for example—suggests that surveillance cannot eliminate dissent. It is also not clear that surveillance can undermine dissident movements as easily as Greenwald posits. The United States’ record, he writes, “is suffused with examples of groups and individuals being placed under government surveillance by virtue of their dissenting views and activism—Martin Luther King, Jr., the civil rights t surveillance did not prevent the end of segregation, retreat from Vietnam, and the rise of environmental consciousness. This record suggests that dissident movements that have public opinion on their side are not easily intimidated by state surveillance (a point reinforced by the Arab Spring). Surveillance may make it harder for individuals to associate with movements on the far ends of the political spectrum. But why must a liberal democracy refrain from monitoring extremist groups such as neo-Nazis and anarchists? There is the danger that officials could label as “extreme” legitimate movements seeking to challenge the prevailing order. Yet the possibility that surveillance programs could expand beyond their original ambit does not constitute a good reason to end surveillance altogether. A more proportionate response is to see that surveillance powers are subject to oversight. The second harm Greenwald sees surveillance posing is personal in nature. Surveillance is said to undermine the very essence of human freedom because the “range of choices people consider when they believe that others are watching is . . . far more limited than what they might do when acting in a private realm -based surveillance is viewed as especially damaging in this respect because this is “where virtually everything is done” in our day, making it the place “where we develop and express our very personality and sense of self.” Hence, “to permit surveillance to take root on the Internet would mean subjecting virtually all forms of human interaction, planning, and even thought itself to comprehensive sta it exaggerates the extent to which our self-development hinges upon electronic communication channels and other related activities that leave electronic traces. The arrival of the Internet certainly opens new vistas, but it does not entirely close earlier ones. A person who fears what her browsing habits might communicate to the authorities can obtain texts offline. Similarly, an individual who fears transmitting materials electronically can do so in person, as Snowden did when communicating with Greenwald. There are costs to communicating in such “old-fashioned” ways, but these costs are neither new nor prohibitive. Second, a substantial part of our self-development takes place in public. We become who we are through personal, social, and intellectual engagements, but these engagements do not always have to be premised on anonymity. Not everyone wants to hide all the time, which is why public engagement—through social media or blogs, for instance—is such a central aspect of the contemporary Internet. 1NC—Solvency The Aff can’t undo the overwhelming perception of US surveillance Fontaine 14 (President of the Center for a New American Security) (Richard, Bringing Liberty Online: Reenergizing the Internet Freedom Agenda in a Post-Snowden Era, SEPTEMBER 2014, Center for New American Security) Such moves are destined to have only a modest effect on foreign reactions. U.S. surveillance will inevitably continue under any reasonably likely scenario (indeed, despite the expressions of outrage, not a single country has said that it would cease its surveillance activities). Many of the demands – such as for greater transparency – will not be met, simply due to the clandestine nature of electronic espionage. Any limits on surveillance that a govern- ment might announce will not be publicly verifiable and thus perhaps not fully credible. Nor will there be an international “no-spying” convention to reassure foreign citizens that their communications are unmonitored. As it has for centuries, state- sponsored espionage activities are likely to remain accepted international practice, unconstrained by international law. The one major possible shift in policy following the Snowden affair – a stop to the bulk collection of telecommunications metadata in the United States – will not constrain the activity most disturbing to foreigners; that is, America’s surveillance of them. At the same time, U.S. offi- cials are highly unlikely to articulate a global “right to privacy” (as have the U.N. High Commissioner for Human Rights and some foreign officials), akin to that derived from the U.S. Constitution’s fourth amendment, that would permit foreigners to sue in U.S. courts to enforce such a right.39 The Obama administration’s January 2014 presidential directive on signals intelligence refers, notably, to the “legiti- mate privacy interests” of all persons, regardless of nationality, and not to a privacy “right.”40 Loopholes still exist that allow the NSA access EFF, 14 (Electronic Freedom Foundation, “Security Backdoors are Bad News—But Some Lawmakers Are Taking Action to Close Them,” 12-9-14, https://www.eff.org/deeplinks/2014/12/securitybackdoors-are-bad-news-some-lawmakers-are-taking-action-close-them, BC) The legislation isn’t comprehensive, of course. As some have pointed out, it only prohibits agencies from requiring a company to build a backdoor. The NSA can still do its best to convince companies to do so voluntarily. And sometimes, the NSA’s “best convincing” is a $10 million contract with a security firm like RSA.∂ The legislation also doesn’t change the Communications Assistance for Law Enforcement Act (CALEA.) CALEA, passed in 1994, is a law that forced telephone companies to redesign their network architectures to make it easier for law enforcement to wiretap telephone calls. In 2006, the D.C. Circuit upheld the FCC's reinterpretation of CALEA to also include facilities-based broadband Internet access and VoIP service, although it doesn't apply to cell phone manufacturers. Other countries won’t follow—Australia proves Hanson 10/25/12, Nonresident Fellow, Foreign Policy, Brookings http://www.brookings.edu/research/reports/2012/10/25-ediplomacy-hanson-internet-freedom Another challenge is dealing with close partners and allies who undermine internet freedom. In August 2011, in the midst of the Arab uprisings, the UK experienced a different connection technology infused movement, the London Riots. On August 11, in the heat of the crisis, Prime Minister Cameron told the House of Commons: Free flow of information can be used for good. But it can also be used for ill. So we are working with the police, the intelligence services and industry to look at whether it would be right to stop people communicating via these websites and services when we know they are plotting violence, disorder and Mubarak, ordered the shut-down of Egypt’s largest ISPs and the cell phone network, a move the United States had heavily criticized. Now the UK was contemplating the same move and threatening to create a rationale criminality. This policy had far-reaching implications. As recently as January 2011, then President of Egypt, Hosni for authoritarian governments everywhere to shut down communications networks when they threatened “violence, disorder and like Australia are also pursuing restrictive internet policies. As OpenNet reported it: When these allies pursue policies so clearly at odds with the U.S. internet freedom agenda, several difficulties arise. It undermines the U.S. position that an open and free internet is something free societies naturally want. It also gives repressive authoritarian governments an excuse for their own monitoring and filtering activities. To an extent, criminality.” Other allies “Australia maintains some of the most restrictive Internet policies of any Western country…” U.S. internet freedom policy responds even-handedly to this challenge because the vast bulk of its grants are for open source circumvention tools that can be just as readily used by someone in London as Beijing, but so far, the United States has been much more discreet about criticising the restrictive policies of allies than authoritarian states.